-
1
-
-
33745163595
-
Learning intrusion detection: Supervised or unsupervised?
-
P. Laskov, P. Dussel, C. Schafer, and K. Rieck, "Learning intrusion detection: supervised or unsupervised?," in Proc. Int. Conf. on Image Analysis and Processing, ICIAP 2005, pp. 50-57, 2005.
-
(2005)
Proc. Int. Conf. on Image Analysis and Processing, ICIAP
, pp. 50-57
-
-
Laskov, P.1
Dussel, P.2
Schafer, C.3
Rieck, K.4
-
3
-
-
2942666805
-
Intrusion detection using support vector machines
-
S. Mukkamala, G.I. Janoski, and A.H. Sung, "Intrusion detection using support vector machines," in Proc. High Performance Computing Symposium, HPC 2002, pp. 178-183, 2002.
-
(2002)
Proc. High Performance Computing Symposium, HPC
, pp. 178-183
-
-
Mukkamala, S.1
Janoski, G.I.2
Sung, A.H.3
-
4
-
-
0037142572
-
Anomaly intrusion detection method based on HMM
-
June
-
Y. Qiao, X.W. Xin, Y. Bin, and S. Ge, "Anomaly intrusion detection method based on HMM," Elect. Letters, vol. 38, no. 13, pp. 663-664, June 2002.
-
(2002)
Elect. Letters
, vol.38
, Issue.13
, pp. 663-664
-
-
Qiao, Y.1
Xin, X.W.2
Bin, Y.3
Ge, S.4
-
5
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
October
-
Y. Liao and V.R. Vemuri, "Use of k-nearest neighbor classifier for intrusion detection," Comput. Security, vol. 21, no. 5, pp. 439-448, October 2002.
-
(2002)
Comput. Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
6
-
-
27244448490
-
Network intrusion detection by a multi-stage classification system
-
Cagliari, Italy, pp
-
th Int. Workshop, Cagliari, Italy, pp. 324-333, 2004.
-
(2004)
th Int. Workshop
, pp. 324-333
-
-
Cordella, L.P.1
Limongiello, A.2
Sansone, C.3
-
7
-
-
17444432965
-
Hierarchical Kohonen net for anomaly detection in network security
-
April
-
S.T. Sarasamma, A.Z. Qiuming, and J. Huff, "Hierarchical Kohonen net for anomaly detection in network security," IEEE Trans. on SMC - part B: cybernetics, vol. 35, no. 2, April 2005.
-
(2005)
IEEE Trans. on SMC - part B: Cybernetics
, vol.35
, Issue.2
-
-
Sarasamma, S.T.1
Qiuming, A.Z.2
Huff, J.3
-
9
-
-
32244436344
-
An anomaly intrusion detection system based on vector quantization
-
January
-
J. Zheng, and M. Hu, "An anomaly intrusion detection system based on vector quantization," ICIE Trans. on Inf. & Syst., vol. E89-D, no. 1, January 2006.
-
(2006)
ICIE Trans. on Inf. & Syst
, vol.E89-D
, Issue.1
-
-
Zheng, J.1
Hu, M.2
-
10
-
-
33646252706
-
Detecting compounded anomalous SNMP situations using unsupervised pattern recognition
-
Proc. Int. Conf. on Artificial Neural Networks, ICANN 2005, Springer
-
E. Corchado, A. Herrero, and J.M. Sáiz, "Detecting compounded anomalous SNMP situations using unsupervised pattern recognition," in Proc. Int. Conf. on Artificial Neural Networks, ICANN 2005, Springer - LNCS, vol. 3697. pp. 905-910, 2005.
-
(2005)
LNCS
, vol.3697
, pp. 905-910
-
-
Corchado, E.1
Herrero, A.2
Sáiz, J.M.3
-
11
-
-
0026113980
-
Nonlinear principal component analysis using autoassociative neural networks
-
February
-
M.A. Kramer, "Nonlinear principal component analysis using autoassociative neural networks," AIChE Journal, vol. 37, no. 2 February 1991.
-
(1991)
AIChE Journal
, vol.37
, Issue.2
-
-
Kramer, M.A.1
-
12
-
-
50049092455
-
-
Cisco Secure Consulting: Vulnerability statistics report. 2000
-
Cisco Secure Consulting: Vulnerability statistics report. 2000
-
-
-
-
13
-
-
84944222170
-
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
-
rd International Workshop on Recent Advances in Intrusion Detection, Springer
-
rd International Workshop on Recent Advances in Intrusion Detection, Springer - LNCS, vol. 1907. pp. 162 -182, 2000.
-
(2000)
LNCS
, vol.1907
, pp. 162-182
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
14
-
-
1642355954
-
Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context
-
June
-
M. Sabhnani and G. Serpen, "Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context," in Proc. 2003 Int Conference on Machine Learning, Models, Technologies and Applications, pp. 623-630, June 2003.
-
(2003)
Proc. 2003 Int Conference on Machine Learning, Models, Technologies and Applications
, pp. 623-630
-
-
Sabhnani, M.1
Serpen, G.2
-
16
-
-
0013114810
-
Mining in a data-flow environment: Experience in network intrusion detection
-
ACM, pp
-
W. Lee, S. J. Stolfo, and K. W. Mok. "Mining in a data-flow environment: Experience in network intrusion detection," in Proc. 5th International Conference on Knowledge Discovery and Data Mining (KDD-99), ACM, pp. 114-124, 1999.
-
(1999)
Proc. 5th International Conference on Knowledge Discovery and Data Mining (KDD-99)
, pp. 114-124
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
17
-
-
0034455983
-
Adaptive intrusion detection: A data mining approach
-
Lee, W., S. J. Stolfo, and K. W. Mok, "Adaptive intrusion detection: A data mining approach," Artificial Intelligence Review, vol. 14, no. 6, pp. 533-567, 2000.
-
(2000)
Artificial Intelligence Review
, vol.14
, Issue.6
, pp. 533-567
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
19
-
-
0024880831
-
Multilayer feedforward networks are universal approximators
-
K. Hornik, M. Stinchcombe and H. White, "Multilayer feedforward networks are universal approximators," Neural Networks, vol. 2, no. 5, pp. 359-366, 1989.
-
(1989)
Neural Networks
, vol.2
, Issue.5
, pp. 359-366
-
-
Hornik, K.1
Stinchcombe, M.2
White, H.3
-
20
-
-
0024861871
-
Approximation by superposition of a sigmoidal function
-
BB. G. Cybenko, "Approximation by superposition of a sigmoidal function," Math. Control, Signals, Systems, vol. 2, 303-314, 1989.
-
(1989)
Math. Control, Signals, Systems
, vol.2
, pp. 303-314
-
-
Cybenko, B.G.1
-
21
-
-
0000325341
-
On lines and planes of closest fit to systems of points in space
-
K. Pearson, "On lines and planes of closest fit to systems of points in space," Philosophical Magazine, vol. 2, pp. 559-572, 1901.
-
(1901)
Philosophical Magazine
, vol.2
, pp. 559-572
-
-
Pearson, K.1
-
22
-
-
58149421595
-
Analysis of a complex of statistical variables into principal components
-
H. Hotelling, "Analysis of a complex of statistical variables into principal components," Journal of Education Psychology, vol. 24, pp. 417-444, 1933.
-
(1933)
Journal of Education Psychology
, vol.24
, pp. 417-444
-
-
Hotelling, H.1
-
23
-
-
33750729985
-
Outlier resistant PCA ensembles
-
th Int. Conf. on Knowledge-Based & Intelligent Information & Engineering Systems, Springer
-
th Int. Conf. on Knowledge-Based & Intelligent Information & Engineering Systems, Springer - LNCS, vol. 4253, pp. 432-440, 2006.
-
(2006)
LNCS
, vol.4253
, pp. 432-440
-
-
Gabrys, B.1
Baruque, B.2
Corchado, E.3
-
24
-
-
0028378798
-
An efficient implementation of BP on RISC-based workstations
-
D. Anguita, GC. Parodi, and R. Zunino, "An efficient implementation of BP on RISC-based workstations," Neurocomputing, vol. 6, pp.57-65, 1994.
-
(1994)
Neurocomputing
, vol.6
, pp. 57-65
-
-
Anguita, D.1
Parodi, G.C.2
Zunino, R.3
-
25
-
-
0001160588
-
What size net gives valid generalization?
-
E. B. Baum and H. David, "What size net gives valid generalization?," Neural Computation, vol. 1, no. 1, pp. 151-60, 1989.
-
(1989)
Neural Computation
, vol.1
, Issue.1
, pp. 151-160
-
-
Baum, E.B.1
David, H.2
-
26
-
-
0025488663
-
30 years of adaptive neural networks: Perceptron, Madaline and Backpropagation
-
B. Widrow and M.A. Lehr, "30 years of adaptive neural networks: Perceptron, Madaline and Backpropagation," Proc. IEEE, vol. 78, no. 9, pp. 1415-1442, 1990.
-
(1990)
Proc. IEEE
, vol.78
, Issue.9
, pp. 1415-1442
-
-
Widrow, B.1
Lehr, M.A.2
|