-
3
-
-
17444432965
-
-
S.T. Sarasamma, Q.A. Zhu, J. Huff, Hierarchical Kohonen Net for Anomaly Detection in Network Security, IEEE Transactions in Systems, Man and Cybernetics, Part B: Cybernetics, 35(2), pp. 302-312, April 2005.
-
S.T. Sarasamma, Q.A. Zhu, J. Huff, "Hierarchical Kohonen Net for Anomaly Detection in Network Security", IEEE Transactions in Systems, Man and Cybernetics, Part B: Cybernetics, vol.35(2), pp. 302-312, April 2005.
-
-
-
-
4
-
-
0033703441
-
The Growing Hierarchical Self-Organizing Map
-
July
-
M. Dittenbach, D. Merkl, A. Rauber, "The Growing Hierarchical Self-Organizing Map", Neural Networks, 2000. IJCNN 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, vol. 6, pp. 15-19, July 2000.
-
(2000)
Neural Networks, 2000. IJCNN 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks
, vol.6
, pp. 15-19
-
-
Dittenbach, M.1
Merkl, D.2
Rauber, A.3
-
5
-
-
24944513966
-
Clustering High-Dimensional Data Using Growing SOM
-
Springer
-
J. Zhou, Y. Fu, "Clustering High-Dimensional Data Using Growing SOM", Advances in Neural Networks ISNN 2005, Springer (2005), vol.3497, pp. 63-68.
-
(2005)
Advances in Neural Networks ISNN 2005
, vol.3497
, pp. 63-68
-
-
Zhou, J.1
Fu, Y.2
-
6
-
-
33845565901
-
A Wireless Intrusion Detection Method Based on Dynamic Growing Neural Network
-
April
-
Y. Liu, D. Tian, B. Li, "A Wireless Intrusion Detection Method Based on Dynamic Growing Neural Network", Computer and Computational Sciences, 2006. IMSCCS '06. First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06), vol. 2, pp. 611-615, April 2006.
-
(2006)
Computer and Computational Sciences, 2006. IMSCCS '06. First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06)
, vol.2
, pp. 611-615
-
-
Liu, Y.1
Tian, D.2
Li, B.3
-
7
-
-
0003704318
-
-
Irvine, CA: University of California. Department of Information and Computer Science
-
S. Hettich, S.D. Bay, The UCI KDD Archive, Irvine, CA: University of California. Department of Information and Computer Science, http://kdd.ics.uci.edu. 1999.
-
(1999)
The UCI KDD Archive
-
-
Hettich, S.1
Bay, S.D.2
-
8
-
-
0032676506
-
A Data Mining Framework for Building Intrusion Detection Models
-
W. Lee, S. Stolfo, K. Mok, "A Data Mining Framework for Building Intrusion Detection Models", Proceedings of the 1999 IEEE Sypmposium on Security and Privacy, pp. 120-132, 1999.
-
(1999)
Proceedings of the 1999 IEEE Sypmposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
9
-
-
0002602585
-
Context Learning with the Self-Organizing Map
-
Helsinki University of Technology, pp
-
M. Varsta, J. Heikkonnen, J. D. R. Millan, "Context Learning with the Self-Organizing Map", Proceedings of Workshop on Self-Organizing Maps, Helsinki University of Technology, pp. 197-202, 1997.
-
(1997)
Proceedings of Workshop on Self-Organizing Maps
, pp. 197-202
-
-
Varsta, M.1
Heikkonnen, J.2
Millan, J.D.R.3
-
10
-
-
0141574623
-
-
MIT Lincoln Lab, Information Systems Technology Group, March 1998
-
The Intrusion Detection Off-Line Evaluation Plan, MIT Lincoln Lab., Information Systems Technology Group, http://www.ll.mit.edu/IST/ideval/ docs/1998/id98-eval-ll.txt, March 1998.
-
The Intrusion Detection Off-Line Evaluation Plan
-
-
-
11
-
-
40949129000
-
-
T. Kohonen, Self-Organizing Maps,M Ed., Springer-Verlag. ISBN 3-540-67921-9, 2000.
-
T. Kohonen, Self-Organizing Maps,M Ed., Springer-Verlag. ISBN 3-540-67921-9, 2000.
-
-
-
-
12
-
-
0027187261
-
The Temporal Kohonen Map
-
G. J. Chappell, J. G. Taylor, "The Temporal Kohonen Map", Neural Networks, vol. 6, pp. 441-445, 1995.
-
(1995)
Neural Networks
, vol.6
, pp. 441-445
-
-
Chappell, G.J.1
Taylor, J.G.2
-
13
-
-
0004063090
-
-
2nd Ed, Prentice Hall. pp
-
S. Haykin, Neural Networks; 2nd Ed., Prentice Hall. pp. 446, 1999.
-
(1999)
Neural Networks
, pp. 446
-
-
Haykin, S.1
-
14
-
-
0141797880
-
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
-
Chapter 4, D. Barbara and S. Jajodia editors, Kluwer, ISBN 1-4020-7054-3
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data", in Applications of Data Mining in Computer Security, Chapter 4, D. Barbara and S. Jajodia (editors), Kluwer, ISBN 1-4020-7054-3, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
15
-
-
85019691440
-
Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
-
J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory". ACM Transactions on Information and System Security, 3(4), pp. 262-294, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
|