-
1
-
-
0007473204
-
An Introduction to Intrusion Detection [J]
-
Aurobindo Sundaram. An Introduction to Intrusion Detection [J]. Crossroads, 1996, 2 (4): 3-7.
-
(1996)
Crossroads
, vol.2
, Issue.4
, pp. 3-7
-
-
Sundaram, A.1
-
2
-
-
2342633897
-
Measuring normality in http traffic for anomaly-based intrusion detection [J]
-
Juan M. Estévez-Tapiador. Measuring normality in http traffic for anomaly-based intrusion detection [J]. Computer networks, 2004, 45: 175-193.
-
(2004)
Computer networks
, vol.45
, pp. 175-193
-
-
Estévez-Tapiador, J.M.1
-
3
-
-
0037142572
-
Anomaly intrusion detection method based on HMM [J]
-
Y.Qiao,X.W.Xin,Y.Bin and S.Ge. Anomaly intrusion detection method based on HMM [J]. Electronics letters, 2002, 38(13): 663-664.
-
(2002)
Electronics letters
, vol.38
, Issue.13
, pp. 663-664
-
-
Qiao, Y.1
Xin, X.W.2
Bin, Y.3
Ge, S.4
-
4
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection [J]
-
Yihua Liao. Use of k-nearest neighbor classifier for intrusion detection [J]. Computers & security, 2002,21(5): 439-448.
-
(2002)
Computers & security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
-
6
-
-
0036798199
-
An evolutionary technique based on K-Means algorithm for optimal clustering in RN[J]
-
Sanghamitra Bandyopadhyay, Ujjwal Maulik. An evolutionary technique based on K-Means algorithm for optimal clustering in RN[J]. Information Sciences, 2002, 146:221 -237.
-
(2002)
Information Sciences
, vol.146
, pp. 221-237
-
-
Bandyopadhyay, S.1
Maulik, U.2
-
7
-
-
0041328214
-
k*-Means: A new generalized k-means clustering algorithm [J]
-
Yiu-Ming Cheung. k*-Means: A new generalized k-means clustering algorithm [J], Pattern Recognition Letters ,2003,24:2883 - 2893.
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 2883-2893
-
-
Cheung, Y.1
-
9
-
-
0242468747
-
An anomaly intrusion detection method by clustering normal user behavior [J]
-
Sang Hyun Oh, et al. An anomaly intrusion detection method by clustering normal user behavior [J]. Computer & security, 2003,22(7):596-612.
-
(2003)
Computer & security
, vol.22
, Issue.7
, pp. 596-612
-
-
Sang Hyun, O.1
-
12
-
-
24944449841
-
Genetic SOM Clustering Algorithm for Intrusion Detection [J]
-
Zhenying ma. A Genetic SOM Clustering Algorithm for Intrusion Detection [J]. Lecture notes in computer science, ISNN2005, 3498:421-427.
-
Lecture notes in computer science
, vol.ISNN2005
, Issue.3498
, pp. 421-427
-
-
Zhenying ma, A.1
-
13
-
-
33644860127
-
A clustering-based method for unsupervised intrusion detections
-
ShengYi Jiang , Xiaoyu Song,A clustering-based method for unsupervised intrusion detections , Pattern Recognition Letters 2006,27:802 - 810
-
(2006)
Pattern Recognition Letters
, vol.27
, pp. 802-810
-
-
Jiang, S.1
Song, X.2
-
14
-
-
0026853956
-
-
Donald E. Brown. A Practical Application of Simulated Annealing to Clustering [J]. Pattern Recognition,1992,25(4):401-412.
-
Donald E. Brown. A Practical Application of Simulated Annealing to Clustering [J]. Pattern Recognition,1992,25(4):401-412.
-
-
-
-
15
-
-
33847164386
-
-
KDD-99 Cup Data Set. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
-
KDD-99 Cup Data Set
-
-
|