-
2
-
-
34249865012
-
Research on intrusion detection and response: A survey
-
Kabiri, P., Ghorbani, A.A. (2005) "Research on intrusion detection and response: A survey," International Journal of Network, Security, vol 1, (2), pp. 84-102.
-
(2005)
International Journal of Network, Security
, vol.1
, Issue.2
, pp. 84-102
-
-
Kabiri, P.1
Ghorbani, A.A.2
-
3
-
-
0034838197
-
Data Mining Methods for Detection of New Malicious Executables
-
Schultz, M., Eskin, E., Zadok, E., and Stolfo, S. (2001) Data Mining Methods for Detection of New Malicious Executables, Proceedings of the IEEE Symposium on Security and Privacy, 2001, pp. 178-184.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, vol.2001
, pp. 178-184
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.4
-
4
-
-
18844362133
-
-
Abou-Assaleh, T, Cercone, N, Keselj, V, and Sweidan, R, 2004) N-gram based Detection of New Malicious Code, Proceedings of the 28th Annual International Computer Software and Applications Conference COMPSAC'04
-
Abou-Assaleh, T., Cercone, N., Keselj, V., and Sweidan, R. (2004) N-gram based Detection of New Malicious Code, Proceedings of the 28th Annual International Computer Software and Applications Conference (COMPSAC'04)
-
-
-
-
5
-
-
12244279567
-
-
Kolter, J.Z. and Matoof, M.A.(2004). Learning to detect malicious executables in the wild. In Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 470-478. New York, NY: ACM Press.
-
Kolter, J.Z. and Matoof, M.A.(2004). Learning to detect malicious executables in the wild. In Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 470-478. New York, NY: ACM Press.
-
-
-
-
6
-
-
0742276097
-
Slammer Worm Dissection: Inside the Slammer Worm
-
July-August, 3
-
Moore D., Paxson V., Savage S., and Shannon C., Staniford S., and Weaver N. (2003) Slammer Worm Dissection: Inside the Slammer Worm, IEEE Security and Privacy, Vol 1 No. 4, July-August 2003, 3:3-39,
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 3-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
7
-
-
17644421307
-
-
Kienzle, D.M. and Elder, M.C. (2003) Recent worms: a survey and trends. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, pages 1-10. ACM Press, October 27, 2003.
-
Kienzle, D.M. and Elder, M.C. (2003) Recent worms: a survey and trends. In Proceedings of the 2003 ACM Workshop on Rapid Malcode, pages 1-10. ACM Press, October 27, 2003.
-
-
-
-
8
-
-
0141762461
-
Code Red: A ease study on the spread and victims of an internet worm
-
Marseille, France, November
-
Moore, D., Shannon, C., and Brown, J. (2002) Code Red: a ease study on the spread and victims of an internet worm, Proceedings of the Internet Measurement Workshop 2002, Marseille, France, November, 2002.
-
(2002)
Proceedings of the Internet Measurement Workshop 2002
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
9
-
-
12244311689
-
-
Weaver, N. Paxson, V. Staniford, and S. Cunningham, R. (2003) A Taxonomy of Computer Worms, Proceedings of the 2003 ACM workshop on Rapid Malcode, Washington, DC, October 2003, pages 11-18
-
Weaver, N. Paxson, V. Staniford, and S. Cunningham, R. (2003) A Taxonomy of Computer Worms, Proceedings of the 2003 ACM workshop on Rapid Malcode, Washington, DC, October 2003, pages 11-18
-
-
-
-
10
-
-
34548794669
-
-
CERT, CERT Advisory CA-2000-04, Love Letter Worm, http://www.cert.org/ advisories/ca-2000-04.html
-
CERT, CERT Advisory CA-2000-04, Love Letter Worm, http://www.cert.org/ advisories/ca-2000-04.html
-
-
-
-
11
-
-
84940104123
-
-
Lee, W., Stolfo, S.J. and Mok, K.W. (1999). A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999
-
Lee, W., Stolfo, S.J. and Mok, K.W. (1999). A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999
-
-
-
-
12
-
-
1642416386
-
The 1998 DARPA/AFRL Off-Line Intrusion Detection Evaluation
-
Louvain-la-Neuve, Belgium
-
Richard P. Lippmann, Isaac Graf, Dan Wyschogrod, Seth E. Webster, Dan J. Weber, and Sam Gorton, "The 1998 DARPA/AFRL Off-Line Intrusion Detection Evaluation," First International Workshop on Recent Advances in Intrusion Detection (RAID), Louvain-la-Neuve, Belgium, 1998.
-
(1998)
First International Workshop on Recent Advances in Intrusion Detection (RAID)
-
-
Lippmann, R.P.1
Graf, I.2
Wyschogrod, D.3
Webster, S.E.4
Weber, D.J.5
Gorton, S.6
-
13
-
-
0009011405
-
Detecting novel network intrusions using bayes estimators
-
Chicago, USA
-
Barbara, D., Wu, N., Jajodia, S. (2001) "Detecting novel network intrusions using bayes estimators," in Proceedings of the First SIAM International Conference on Data Mining (SDM 2001), Chicago, USA
-
(2001)
Proceedings of the First SIAM International Conference on Data Mining (SDM
-
-
Barbara, D.1
Wu, N.2
Jajodia, S.3
-
14
-
-
2442526701
-
-
Ste. Zanero and Sergio M. Savaresi, Unsupervised, learning techniques for an intrusion detection system, in Proceedings of the 2004 ACM symposium on Applied computing, pp. 412-419, Nicosia, Cyprus, Mar. 2004. ACM Press.
-
Ste. Zanero and Sergio M. Savaresi, "Unsupervised, learning techniques for an intrusion detection system," in Proceedings of the 2004 ACM symposium on Applied computing, pp. 412-419, Nicosia, Cyprus, Mar. 2004. ACM Press.
-
-
-
-
15
-
-
17544388668
-
-
H. Gunes Kayacik, A. Nur Zincir-Heywoodi and Malcolm I. Heywood, On the capability of a som based intrusion detection System, in Proceedings of the International Joint Conference on Neural Networks, 3, pp. 1808-1813. IEEE, IEEE, July 2003.
-
H. Gunes Kayacik, A. Nur Zincir-Heywoodi and Malcolm I. Heywood, On the capability of a som based intrusion detection System, in Proceedings of the International Joint Conference on Neural Networks, vol. 3, pp. 1808-1813. IEEE, IEEE, July 2003.
-
-
-
-
16
-
-
4544251643
-
Network intrusion detection using an improved competitive learning neural network
-
IEEE-Computer Society, IEEE, May
-
J. Z. Lei and Ali Ghorbani, "Network intrusion detection using an improved competitive learning neural network," in Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR04), pp. 190-197. IEEE-Computer Society, IEEE, May 2004.
-
(2004)
Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR04)
, pp. 190-197
-
-
Lei, J.Z.1
Ghorbani, A.2
-
17
-
-
0141459790
-
Predicting intrusions with local linear model
-
IEEE, IEEE, July
-
P. Z. Hu and Malcolm I. Heywood, Predicting intrusions with local linear model, in Proceedings of the International Joint Conference on Neural Networks, vol. 3, pp. 1780-1785. IEEE, IEEE, July 2003.
-
(2003)
Proceedings of the International Joint Conference on Neural Networks
, vol.3
, pp. 1780-1785
-
-
Hu, P.Z.1
Heywood, M.I.2
-
18
-
-
0033681199
-
Fuzzy network profiling for intrusion detection
-
Atlanta, USA, July
-
John E. Dickerson and Julie A. Dickerson, "Fuzzy network profiling for intrusion detection," in Proceedings of NAFIPS 19th International Conference of the North American Fuzzy Information Processing: Society, pp. 301-306, Atlanta, USA, July 2000.
-
(2000)
Proceedings of NAFIPS 19th International Conference of the North American Fuzzy Information Processing: Society
, pp. 301-306
-
-
Dickerson, J.E.1
Dickerson, J.A.2
-
19
-
-
34548786592
-
-
Susan M. Bridges and M, Vaughn Rayford, Fuzzy data mining and genetic algorithms applied to intrusion detection, in Proceedings of the Twenty-third National Information Systems Security Conference. National Institute of Standards and Technology, Oct. 2000.
-
Susan M. Bridges and M, Vaughn Rayford, "Fuzzy data mining and genetic algorithms applied to intrusion detection," in Proceedings of the Twenty-third National Information Systems Security Conference. National Institute of Standards and Technology, Oct. 2000.
-
-
-
-
20
-
-
0038103911
-
Utilising fuzzy logic and trend analysis for effective intrusion detection
-
M. Botha and R. von Solms, "Utilising fuzzy logic and trend analysis for effective intrusion detection," Computers & Security, vol. 22, no. 5, pp. 423-434, 2003.
-
(2003)
Computers & Security
, vol.22
, Issue.5
, pp. 423-434
-
-
Botha, M.1
von Solms, R.2
-
21
-
-
34548786001
-
-
(133/2006) Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Yisrael Fermat, Yuval Shahar, and Yuval Elovici, Host Based Intrusion Detection Using Machine Learning, Faculty of Engineering, Ben Gurion Unversity, Israel (2006).
-
(133/2006) Robert Moskovitch, Ido Gus, Shay Pluderman, Dima Stopel, Yisrael Fermat, Yuval Shahar, and Yuval Elovici, Host Based Intrusion Detection Using Machine Learning, Faculty of Engineering, Ben Gurion Unversity, Israel (2006).
-
-
-
-
22
-
-
0003592399
-
The VTrace tool: Building a system tracer for Windows NT and Windows 2000
-
October
-
Lorch, J. and Smith, A. J. (2000), The VTrace tool: building a system tracer for Windows NT and Windows 2000. MSDN Magazine, 15(10):86-102, October 2000.
-
(2000)
MSDN Magazine
, vol.15
, Issue.10
, pp. 86-102
-
-
Lorch, J.1
Smith, A.J.2
-
23
-
-
0003957032
-
-
2nd Edition, Morgan Kaufmann, San Francisco
-
Witten, I.H. and Frank E., Data Mining: Practical machine learning: tools and techniques, 2nd Edition, Morgan Kaufmann, San Francisco, 2005.
-
(2005)
Data Mining: Practical machine learning: tools and techniques
-
-
Witten, I.H.1
Frank, E.2
-
24
-
-
34548731194
-
C4.5: Programs for machine learning
-
San Francisco, CA, USA
-
Quinlan, J.R. (1993). C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
-
(1993)
Morgan Kaufmann Publishers Inc
-
-
Quinlan, J.R.1
-
26
-
-
4644347255
-
A Selective Sampling Approach to Active Selection
-
H Liu, H Motoda and L YU, A Selective Sampling Approach to Active Selection, Artificial Intelligence, 159 (2004) 49-74.
-
(2004)
Artificial Intelligence
, vol.159
, pp. 49-74
-
-
Liu, H.1
Motoda, H.2
YU, L.3
-
27
-
-
0031269184
-
On the optimality of simple Bayesian classifier under zero-one loss
-
Domingos, P., and Pazzani, M. (1997) On the optimality of simple Bayesian classifier under zero-one loss, Machine Learning, 29:103-130.
-
(1997)
Machine Learning
, vol.29
, pp. 103-130
-
-
Domingos, P.1
Pazzani, M.2
-
28
-
-
46149134436
-
Fusion, propagation, and structuring in belief networks
-
Pearl J., (1986) Fusion, propagation, and structuring in belief networks. Artificial Intelligence 29(3):241-288.
-
(1986)
Artificial Intelligence
, vol.29
, Issue.3
, pp. 241-288
-
-
Pearl, J.1
-
30
-
-
34548709532
-
-
Demuth, H. and Beale, (1998) M. Neural Network toolbox for use with Matlab. The Mathworks Inc., Natick, MA.
-
Demuth, H. and Beale, (1998) M. Neural Network toolbox for use with Matlab. The Mathworks Inc., Natick, MA.
-
-
-
-
31
-
-
85164392958
-
A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection
-
Kohavi, R., (1995) A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection, International Joint Conference in Artificial Intelligence, 1137-1145, 1995
-
(1995)
International Joint Conference in Artificial Intelligence
, pp. 1137-1145
-
-
Kohavi, R.1
|