-
2
-
-
43249087997
-
-
Enterasys Networks Inc
-
Enterasys Networks Inc., "Dragon Intrusion Detection System." http://www.enterasys.com/products/ids/DSHSS7/.
-
Dragon Intrusion Detection System
-
-
-
3
-
-
43249130910
-
-
S. International, NIDES (Next-Generation Intrusion Detection Expert System). http://www.csl.sri.com/projects/nides/.
-
S. International, "NIDES (Next-Generation Intrusion Detection Expert System)." http://www.csl.sri.com/projects/nides/.
-
-
-
-
5
-
-
0141540496
-
Y-means: A clustering method for intrusion detection
-
Montreal, Que, Canada, May
-
Y. Guan, A. A. Ghorbani, and N. Belacel, "Y-means: a clustering method for intrusion detection," in Proceedings of CCECE 2003 - Canadian Conference on Electrical and Computer Engineering Toward a Caring and Humane Technology, 2, pp. 1083-6, (Montreal, Que., Canada), May 2003.
-
(2003)
Proceedings of CCECE 2003 - Canadian Conference on Electrical and Computer Engineering Toward a Caring and Humane Technology
, vol.2
, pp. 1083-1086
-
-
Guan, Y.1
Ghorbani, A.A.2
Belacel, N.3
-
6
-
-
28444477388
-
Intrusion detection based on clustering genetic algorithm
-
Guangzhou, China, August
-
J.-L. Zhao, J.-F. Zhao, and J.-J. Li, "Intrusion detection based on clustering genetic algorithm," in Proceedings of 2005 International Conference on Machine Learning and Cybernetics, 6, pp. 3911-14, (Guangzhou, China), August 2005.
-
(2005)
Proceedings of 2005 International Conference on Machine Learning and Cybernetics
, vol.6
, pp. 3911-3914
-
-
Zhao, J.-L.1
Zhao, J.-F.2
Li, J.-J.3
-
7
-
-
33846017643
-
Intrusion detection based on clustering a data stream
-
Mount Pleasant, MI, USA, August
-
S.-H. Oh, J.-S. Kang, Y.-C. Byun, G.-L. Park, and S.-Y. Byun, "Intrusion detection based on clustering a data stream," in Proceedings of Third ACIS International Conference on Software Engineering Research, Management and Applications, pp. 220-7, (Mount Pleasant, MI, USA), August 2005.
-
(2005)
Proceedings of Third ACIS International Conference on Software Engineering Research, Management and Applications
, pp. 220-227
-
-
Oh, S.-H.1
Kang, J.-S.2
Byun, Y.-C.3
Park, G.-L.4
Byun, S.-Y.5
-
9
-
-
0037832491
-
Fuzzy clustering for intrusion detection
-
St Louis, MO, USA, May
-
H. Shah, J. Undercoffer, and A. Joshi, "Fuzzy clustering for intrusion detection," in Proceedings of the 12th IEEE International Conference on Fuzzy Systems, 2, pp. 1274-8, (St Louis, MO, USA), May 2003.
-
(2003)
Proceedings of the 12th IEEE International Conference on Fuzzy Systems
, vol.2
, pp. 1274-1278
-
-
Shah, H.1
Undercoffer, J.2
Joshi, A.3
-
10
-
-
33644860127
-
A clustering-based method for unsupervised intrusion detections
-
May
-
S. Jiang, X. Song, H. Wang, J.-J. Han, and Q.-H. Li, "A clustering-based method for unsupervised intrusion detections," Pattern Recognition Letters 27, pp. 802-10, May 2006.
-
(2006)
Pattern Recognition Letters
, vol.27
, pp. 802-810
-
-
Jiang, S.1
Song, X.2
Wang, H.3
Han, J.-J.4
Li, Q.-H.5
-
12
-
-
26944450506
-
USAID: Unifying Signature-based and Anomaly-based Intrusion Detection
-
Hanoi, Viet Nam, May
-
Z. Li, A. Das, and J. Zhou, "USAID: Unifying Signature-based and Anomaly-based Intrusion Detection," in Proceedings of 9th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD 2005, pp. 702-712, (Hanoi, Viet Nam), May 2005.
-
(2005)
Proceedings of 9th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, PAKDD
, pp. 702-712
-
-
Li, Z.1
Das, A.2
Zhou, J.3
-
13
-
-
43249096714
-
White paper: Deciphering detection techniques: Part ii anomaly-based intrusion detection
-
D. F. Gong, "White paper: Deciphering detection techniques: Part ii anomaly-based intrusion detection," Network Associates, 2003.
-
(2003)
Network Associates
-
-
Gong, D.F.1
-
14
-
-
33751530473
-
Effective intrusion detection model through the combination of a signaturebased intrusion detection system and a machine learning-based intrusion detection system
-
I.-Y. Weon, D. H. Song, and C.-H. Lee, "Effective intrusion detection model through the combination of a signaturebased intrusion detection system and a machine learning-based intrusion detection system," Journal of Information Science and Engineering 22(6), pp. 1447-1464, 2006.
-
(2006)
Journal of Information Science and Engineering
, vol.22
, Issue.6
, pp. 1447-1464
-
-
Weon, I.-Y.1
Song, D.H.2
Lee, C.-H.3
-
15
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
O. Depren, M. Topallar, E. Anarim, and M. K. Ciliz, "An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks," Expert Systems with Applications 29(4), pp. 713-22, 2005.
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
17
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
Honolulu, HI, USA, May
-
S. Mukkamala, G. Janoski, and A. Sung, "Intrusion detection using neural networks and support vector machines," in Proceedings of 2002 International Joint Conference on Neural Networks (IJCNN), 2, pp. 1702-7, (Honolulu, HI, USA), May 2002.
-
(2002)
Proceedings of 2002 International Joint Conference on Neural Networks (IJCNN)
, vol.2
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
18
-
-
3042595031
-
Adaptive neuro-fuzzy intrusion detection systems
-
Las Vegas, NV, USA, April
-
S. Chavan, K. Shah, N. Dave, S. Mukherjee, A. Abraham, and S. Sanyal, "Adaptive neuro-fuzzy intrusion detection systems," in Proceedings of ITCC 2004. International Conference on Information Technology: Coding and Computing, 1, pp. 70-4, (Las Vegas, NV, USA), April 2004.
-
(2004)
Proceedings of ITCC 2004. International Conference on Information Technology: Coding and Computing
, vol.1
, pp. 70-74
-
-
Chavan, S.1
Shah, K.2
Dave, N.3
Mukherjee, S.4
Abraham, A.5
Sanyal, S.6
-
19
-
-
69949123786
-
A Data Clustering Algorithm for Mining Patterns from Event Logs
-
Kansas City, MO, USA, October
-
R. Vaarandi, "A Data Clustering Algorithm for Mining Patterns from Event Logs," in Proceedings of the 3rd IEEE Workshop on IP Operations and Management (IPOM 2003), pp. 119-26, (Kansas City, MO, USA), October 2003.
-
(2003)
Proceedings of the 3rd IEEE Workshop on IP Operations and Management (IPOM 2003)
, pp. 119-126
-
-
Vaarandi, R.1
-
20
-
-
43249100285
-
Case Study: Defending the Nation's Lawmakers Against Cyber Threats and Attacks
-
"Case Study: Defending the Nation's Lawmakers Against Cyber Threats and Attacks," Network Associates, 2003.
-
(2003)
Network Associates
-
-
-
23
-
-
58049158700
-
-
MIT Lincoln Laboratory
-
MIT Lincoln Laboratory, "1999 DARPA Intrusion Detection Evaluation Data Set," 1999. http://www.ll.mit.edu/IST/ideval/data/1999/ 1999_data_index.html.
-
(1999)
DARPA Intrusion Detection Evaluation Data Set
-
-
|