-
3
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transaction Information and System Security 3 (2000) 186-205
-
(2000)
ACM Transaction Information and System Security
, vol.3
, pp. 186-205
-
-
Axelsson, S.1
-
4
-
-
0037004647
-
Network-based intrusion detection using neural networks
-
p. 579-84
-
Bivens A., Palagiri C., Smith R., Szymanski B., and Embrechts M. Network-based intrusion detection using neural networks. Intelligent engineering systems through artificial neural networks vol. 12 (2002) p. 579-84
-
(2002)
Intelligent engineering systems through artificial neural networks
, vol.12
-
-
Bivens, A.1
Palagiri, C.2
Smith, R.3
Szymanski, B.4
Embrechts, M.5
-
7
-
-
49849087234
-
-
Cong B. Implementation of real time intelligent intrusion detection systems. Proceedings of the ISCA 17th international conference computers and their applications; 2002. p. 450-3.
-
Cong B. Implementation of real time intelligent intrusion detection systems. Proceedings of the ISCA 17th international conference computers and their applications; 2002. p. 450-3.
-
-
-
-
8
-
-
0026850007
-
-
Debar Hervé, Becker Monique, Siboni Didier. A neural network component for an intrusion detection. Proceedings of the IEEE computer society symposium detection system; May 1992. p. 240-50.
-
Debar Hervé, Becker Monique, Siboni Didier. A neural network component for an intrusion detection. Proceedings of the IEEE computer society symposium detection system; May 1992. p. 240-50.
-
-
-
-
9
-
-
0033681199
-
Fuzzy network profiling for intrusion detection
-
Dickerson J.E., and Dickerson J.A. Fuzzy network profiling for intrusion detection. IEEE Network (2000) 301-306
-
(2000)
IEEE Network
, pp. 301-306
-
-
Dickerson, J.E.1
Dickerson, J.A.2
-
10
-
-
0036082886
-
-
Draelos T, Duggan D, Collins M, Wunsch D. Adaptive critic designs for host-based intrusion detection. Proceedings of the 2002 international joint conference on neural networks. IJCNN'02 (Cat. No.02CH37290), vol. 2; 2002. p. 1720-5.
-
Draelos T, Duggan D, Collins M, Wunsch D. Adaptive critic designs for host-based intrusion detection. Proceedings of the 2002 international joint conference on neural networks. IJCNN'02 (Cat. No.02CH37290), vol. 2; 2002. p. 1720-5.
-
-
-
-
11
-
-
0021522087
-
Generalized means as model of compensative connectives
-
Dyckhoff H., and Pedrycz W. Generalized means as model of compensative connectives. Fuzzy Sets and Systems 14 (1984) 143-154
-
(1984)
Fuzzy Sets and Systems
, vol.14
, pp. 143-154
-
-
Dyckhoff, H.1
Pedrycz, W.2
-
12
-
-
27544495468
-
-
Estevez-Tapiador Juan M, Garcia-Teodoro Pedro, Diaz-Verdejo Jesus E. Detection of web-based attacks through markovian protocol parsing. ISCC, 10th IEEE symposium on computers and communications (ISCC'05); 2005. p. 457-62.
-
Estevez-Tapiador Juan M, Garcia-Teodoro Pedro, Diaz-Verdejo Jesus E. Detection of web-based attacks through markovian protocol parsing. ISCC, 10th IEEE symposium on computers and communications (ISCC'05); 2005. p. 457-62.
-
-
-
-
14
-
-
0024984013
-
-
Heberlein L, Dias G, Levitt K, Mukherjee B, Wood J, Wolber D. A network security monitor. Proceedings of the 1990 IEEE symposium on research in security and privacy; May 1990. p. 296-304.
-
Heberlein L, Dias G, Levitt K, Mukherjee B, Wood J, Wolber D. A network security monitor. Proceedings of the 1990 IEEE symposium on research in security and privacy; May 1990. p. 296-304.
-
-
-
-
15
-
-
0029278204
-
Optimal design of neural networks using the Taguchi method
-
Khaw J.F.C., Lim B.S., and Lim L.E.N. Optimal design of neural networks using the Taguchi method. Neurocomputing 7 3 (April, 1995) 225-245
-
(1995)
Neurocomputing
, vol.7
, Issue.3
, pp. 225-245
-
-
Khaw, J.F.C.1
Lim, B.S.2
Lim, L.E.N.3
-
16
-
-
0001127525
-
Methodology of preform design considering workability in metal forming by the artificial neural network and Taguchi method
-
Ko D.C., Kim D.H., Kim B.M., and Choi J.C. Methodology of preform design considering workability in metal forming by the artificial neural network and Taguchi method. Journal of Materials Processing Technology 80-81 (August 1, 1998) 487-492
-
(1998)
Journal of Materials Processing Technology
, vol.80-81
, pp. 487-492
-
-
Ko, D.C.1
Kim, D.H.2
Kim, B.M.3
Choi, J.C.4
-
17
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
Kruegel C., Vigna G., and Robertson W. A multi-model approach to the detection of web-based attacks. Computer Networks 48 (2005) 717-738
-
(2005)
Computer Networks
, vol.48
, pp. 717-738
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
20
-
-
33745898601
-
Application of fuzzy neural networks to intrusion detection
-
Li Z.T., and Li J.C. Application of fuzzy neural networks to intrusion detection. Mini-Micro Systems 23 10 (2002) 1235-1238
-
(2002)
Mini-Micro Systems
, vol.23
, Issue.10
, pp. 1235-1238
-
-
Li, Z.T.1
Li, J.C.2
-
22
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Lippmann R.P., and Cunningham R.K. Improving intrusion detection performance using keyword selection and neural networks. Computer Network 34 (2000) 597-603
-
(2000)
Computer Network
, vol.34
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
23
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation computer networks
-
Lippmann R., Haines J.W., Fried D.J., Korba J., and Das K. The 1999 DARPA off-line intrusion detection evaluation computer networks. Computer Networks The International Journal of Computer and Telecommunications Networking 34 4 (2000) 579-595
-
(2000)
Computer Networks The International Journal of Computer and Telecommunications Networking
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
24
-
-
0036082885
-
-
Liu Z, Florez F, Bridges SM. A comparison of input representations in neural networks: a case study in intrusion detection. Proceedings of the 2002 international joint conference on neural networks (IJCNN'02), vol. 2; 2002. p. 1708-13.
-
Liu Z, Florez F, Bridges SM. A comparison of input representations in neural networks: a case study in intrusion detection. Proceedings of the 2002 international joint conference on neural networks (IJCNN'02), vol. 2; 2002. p. 1708-13.
-
-
-
-
25
-
-
84864228244
-
-
Lunt TF, Tamaru A, Gilham F. IDES: a progress report. Proceedings of the sixth annual computer security applications conference, Tucson, AZ; December 1990. p. 273-85.
-
Lunt TF, Tamaru A, Gilham F. IDES: a progress report. Proceedings of the sixth annual computer security applications conference, Tucson, AZ; December 1990. p. 273-85.
-
-
-
-
26
-
-
49849096201
-
-
MATLAB Quick-Start Guide. Available from: http://web.mit.edu/vchudnov/www/matlab.html.
-
MATLAB Quick-Start Guide. Available from: http://web.mit.edu/vchudnov/www/matlab.html.
-
-
-
-
29
-
-
49849094253
-
-
Nessus. Available from: http://www.nessus.org; 2004.
-
Nessus. Available from: http://www.nessus.org; 2004.
-
-
-
-
30
-
-
0029341720
-
Using Taguchi's method of experimental design to control errors in layered perceptrons
-
Peterson G.E., St Clair D.C., Aylward S.R., and Bond W.E. Using Taguchi's method of experimental design to control errors in layered perceptrons. IEEE Transactions on Neural Networks 6 4 (1995) 949-961
-
(1995)
IEEE Transactions on Neural Networks
, vol.6
, Issue.4
, pp. 949-961
-
-
Peterson, G.E.1
St Clair, D.C.2
Aylward, S.R.3
Bond, W.E.4
-
32
-
-
49849099349
-
-
RFC 2616 Hypertext Transfer Protocol-HTTP/1.1.
-
RFC 2616 Hypertext Transfer Protocol-HTTP/1.1.
-
-
-
-
35
-
-
49849096325
-
-
Snapp SR, Brentano J, Dias GV, Heberlein LT, Ho C, Levitt KN, Mukherjee B. DIDS - motivation, architecture, and an early prototype. Proceedings of the 14th national computer security conference, Baltimore, MD; Oct. 1991. p. 167-76.
-
Snapp SR, Brentano J, Dias GV, Heberlein LT, Ho C, Levitt KN, Mukherjee B. DIDS - motivation, architecture, and an early prototype. Proceedings of the 14th national computer security conference, Baltimore, MD; Oct. 1991. p. 167-76.
-
-
-
-
36
-
-
49849102796
-
-
Snort. Available from: http://www.snort.org/.
-
Snort. Available from: http://www.snort.org/.
-
-
-
-
38
-
-
84943383590
-
-
Sung AH, Mukkamala S. Identifying important features for intrusion detection using support vector machines and neural networks. Proceedings 2003 symposium on applications and the Internet; 2003. p. 209-16.
-
Sung AH, Mukkamala S. Identifying important features for intrusion detection using support vector machines and neural networks. Proceedings 2003 symposium on applications and the Internet; 2003. p. 209-16.
-
-
-
-
39
-
-
0037105910
-
Intrusion detection techniques and approaches
-
Verwoerd T., and Hunt R. Intrusion detection techniques and approaches. Computer Communications 25 15 (September 2002) 1356-1365
-
(2002)
Computer Communications
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
40
-
-
0032049586
-
Neural-Taguchi method for robust design analysis
-
Wang G.-J., Tsai J.-C., Tseng P.-C., and Chen T.-C. Neural-Taguchi method for robust design analysis. Journal of the Chinese Society of Mechanical Engineers 19 2 (1998) 223-230
-
(1998)
Journal of the Chinese Society of Mechanical Engineers
, vol.19
, Issue.2
, pp. 223-230
-
-
Wang, G.-J.1
Tsai, J.-C.2
Tseng, P.-C.3
Chen, T.-C.4
-
41
-
-
49849097199
-
-
Winpcap. Available from: http://winpcap.polito.it/.
-
Winpcap. Available from: http://winpcap.polito.it/.
-
-
-
-
42
-
-
0036659222
-
Internet intrusion detection based on intelligent neural network system
-
Xiao Y., Li T., Wang X., Leng L., Liu F., and Yin P. Internet intrusion detection based on intelligent neural network system. High Technology Letters 12 7 (2002) 45-47
-
(2002)
High Technology Letters
, vol.12
, Issue.7
, pp. 45-47
-
-
Xiao, Y.1
Li, T.2
Wang, X.3
Leng, L.4
Liu, F.5
Yin, P.6
-
43
-
-
24744455037
-
-
Yamada Akira, Miyake Yutaka, Takemori Keisuke, Tanaka Toshiaki. Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data. Proceedings of the international conference on information technology: coding and computing (ITCC'05); 2005.
-
Yamada Akira, Miyake Yutaka, Takemori Keisuke, Tanaka Toshiaki. Intrusion detection system to detect variant attacks using learning algorithms with automatic generation of training data. Proceedings of the international conference on information technology: coding and computing (ITCC'05); 2005.
-
-
-
-
44
-
-
49849105685
-
-
Zhang Jin-Wei. The study and implementation of intrusion detection and security policy management system based on network topology, Master thesis, National Cheng Kung University, Taiwan; July 2007.
-
Zhang Jin-Wei. The study and implementation of intrusion detection and security policy management system based on network topology, Master thesis, National Cheng Kung University, Taiwan; July 2007.
-
-
-
-
45
-
-
0040431304
-
Data mining for network intrusion detection: a comparison of alternative methods
-
Zhu D., Premkumar G., Zhang X., and Chu C.H. Data mining for network intrusion detection: a comparison of alternative methods. Decision Sciences Journal 32 4 (2001) 635-660
-
(2001)
Decision Sciences Journal
, vol.32
, Issue.4
, pp. 635-660
-
-
Zhu, D.1
Premkumar, G.2
Zhang, X.3
Chu, C.H.4
|