-
2
-
-
0345389037
-
-
The MITRE Corporation, August 2001
-
Bloedorn, E., Christiansen, A. D., Hill, W., Skorupka C., Talbot, L. M., and Tivel, J. (2001). "Data Mining for Network Intrusion Detection: How to Get Started", available at: www.mitre.org/support/papers/archive01.shtml, The MITRE Corporation, August 2001.
-
(2001)
Data Mining for Network Intrusion Detection: How to Get Started
-
-
Bloedorn, E.1
Christiansen, A.D.2
Hill, W.3
Skorupka, C.4
Talbot, L.M.5
Tivel, J.6
-
3
-
-
0000231655
-
Artificial Neural Networks for Misuse Detection
-
October 5-8 1998, Arlington, VA
-
Cannady, J. (1998). "Artificial Neural Networks for Misuse Detection", Proceedings of the 1998 National Information Systems Security Conference (NISSC'98), pp. 443-456, October 5-8 1998, Arlington, VA.
-
(1998)
Proceedings of the 1998 National Information Systems Security Conference (NISSC'98)
, pp. 443-456
-
-
Cannady, J.1
-
4
-
-
0004113854
-
An Off-The-Shelf PSO
-
Indianapolis, IN
-
Carlisle, A. and Dozier, G. (2001). "An Off-The-Shelf PSO", Proceedings of the 2001 Workshop on Particle Swarm Optimization, pp. 1-6, Indianapolis, IN.
-
(2001)
Proceedings of the 2001 Workshop on Particle Swarm Optimization
, pp. 1-6
-
-
Carlisle, A.1
Dozier, G.2
-
6
-
-
0002511642
-
An Overview of Artificial Immune Systems and Their Applications
-
D. Dasgupta, ed., Springer
-
Dasgupta, D. (1999). "An Overview of Artificial Immune Systems and Their Applications", Artificial Immune Systems and Their Applications, D. Dasgupta, ed., pp. 3-21, Springer.
-
(1999)
Artificial Immune Systems and Their Applications
, pp. 3-21
-
-
Dasgupta, D.1
-
7
-
-
0036613083
-
An Immunity-Based Technique to Characterize Intrusions in Computer Networks
-
IEEE Press
-
Dasgupta, D. and Gonzalez, F. (2002)., "An Immunity-Based Technique to Characterize Intrusions in Computer Networks", IEEE Transactions on Evolutionary Computation, Vol. 6, No. 3, pp. 281-291. IEEE Press.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 281-291
-
-
Dasgupta, D.1
Gonzalez, F.2
-
8
-
-
0000308566
-
Real-Coded Genetic Algorithms and Interval-Schemata
-
L. Darrell Whitley, ed., Morgan Kaufmann
-
Eshelman, L. and Schaffer, J. D. (1992). "Real-Coded Genetic Algorithms and Interval-Schemata", Proceedings of the 1992 Foundations of Genetic Algorithms (FOGA-2), L. Darrell Whitley, ed., pp. 187-202, Morgan Kaufmann.
-
(1992)
Proceedings of the 1992 Foundations of Genetic Algorithms (FOGA-2)
, pp. 187-202
-
-
Eshelman, L.1
Schaffer, J.D.2
-
10
-
-
0002819121
-
A Comparative Analysis of Selection Schemes Used in Genetic Algorithms
-
Gregory J. E. Rawlins, ed., Morgan Kaufmann Publishers
-
Goldberg, D. E. and Deb, K. (1989). "A Comparative Analysis of Selection Schemes Used in Genetic Algorithms", Foundations of Genetic Algorithms (1989), Gregory J. E. Rawlins, ed., pp. 69-93, Morgan Kaufmann Publishers.
-
(1989)
Foundations of Genetic Algorithms (1989)
, pp. 69-93
-
-
Goldberg, D.E.1
Deb, K.2
-
12
-
-
33846797155
-
Immunity by Design: An Artificial Immune System
-
Morgan-Kaufmann, San Francisco
-
Hofmeyr, S., and Forrest, S. (1999). "Immunity by Design: An Artificial Immune System", The Proceedings of the 1999 Genetic and Evolutionary Computation Conference (GECCO-1999), pp. 1289-1296, Morgan-Kaufmann, San Francisco.
-
(1999)
The Proceedings of the 1999 Genetic and Evolutionary Computation Conference (GECCO-1999)
, pp. 1289-1296
-
-
Hofmeyr, S.1
Forrest, S.2
-
13
-
-
0002467033
-
Architecture for an Artificial Immune System
-
Hofmeyr, S., and Forrest, S. (1999). "Architecture for an Artificial Immune System", Evolutionary Computation, 7(1):45-68.
-
(1999)
Evolutionary Computation
, vol.7
, Issue.1
, pp. 45-68
-
-
Hofmeyr, S.1
Forrest, S.2
-
16
-
-
1642343496
-
Artificial Immunity Using Constraint-Based Detectors
-
TSI Press
-
Hou, H., Zhu, J., and Dozier, G. (2002). "Artificial Immunity Using Constraint-Based Detectors", Proceedings of the 2002 World Automation Congress (WAG'02), vol. 13, pp. 239-244, TSI Press.
-
(2002)
Proceedings of the 2002 World Automation Congress (WAG'02)
, vol.13
, pp. 239-244
-
-
Hou, H.1
Zhu, J.2
Dozier, G.3
-
22
-
-
0004250162
-
-
New Riders
-
Northcutt, S., Cooper, M., Fearnow M., and Frederick, K. (2001). Intrusion Signatures and Analysis, New Riders.
-
(2001)
Intrusion Signatures and Analysis
-
-
Northcutt, S.1
Cooper, M.2
Fearnow, M.3
Frederick, K.4
-
23
-
-
84957039800
-
Principles of a Computer Immune System
-
Somayaji, A., Hofmeyr, S., and Forrest, S. (1997). "Principles of a Computer Immune System", The 1997 New Security Paradigm Workshop, pp. 75-82.
-
(1997)
The 1997 New Security Paradigm Workshop
, pp. 75-82
-
-
Somayaji, A.1
Hofmeyr, S.2
Forrest, S.3
|