-
2
-
-
34247391599
-
System Approach to Intrusion Detection Using Hidden Markov Model
-
July 3-6, Vancouver, British Columbia, Canada, pp
-
Rahul Khanna, Huaping Liu. System Approach to Intrusion Detection Using Hidden Markov Model, IWCMC'06, July 3-6, 2006, Vancouver, British Columbia, Canada, pp.349-354.
-
(2006)
IWCMC'06
, pp. 349-354
-
-
Khanna, R.1
Liu, H.2
-
3
-
-
33750906132
-
-
October 2-6, Torremolinos, Malaga, Spain, pp
-
A. H. M. Rezaul Karim, R. M. A. P. Rajatheva, and Kazi M. Ahmed. An Efficient Collaborative Intrusion Detection System for MANET Using Bayesian Approach, MSWiM'06, October 2-6, 2006, Torremolinos, Malaga, Spain, pp.187-190.
-
(2006)
An Efficient Collaborative Intrusion Detection System for MANET Using Bayesian Approach, MSWiM'06
, pp. 187-190
-
-
Rezaul Karim, A.H.M.1
Rajatheva, R.M.A.P.2
Ahmed, K.M.3
-
4
-
-
38049121550
-
-
Witcha Chimphlee, Mohd Noor Md Sap, Abdul Hanan Abdullah, Siriporn Chimphlee, and Surat Srinoy. To Identify Suspicious Activity in Anomaly Detection Based on Soft Computing, Proceedings of the 24th IASTED International Mutli-Conference ARTIFIVAL INTELLIGENCE AND APPLICATIONS, February,13-16,2006, Innsbruck, Austria, pp. 359-364.
-
Witcha Chimphlee, Mohd Noor Md Sap, Abdul Hanan Abdullah, Siriporn Chimphlee, and Surat Srinoy. To Identify Suspicious Activity in Anomaly Detection Based on Soft Computing, Proceedings of the 24th IASTED International Mutli-Conference ARTIFIVAL INTELLIGENCE AND APPLICATIONS, February,13-16,2006, Innsbruck, Austria, pp. 359-364.
-
-
-
-
5
-
-
33847406678
-
A hierarchical intrusion detection model based on the PCA neural networks
-
Guisong Liu, Zhang Yi, Shangming Yang. A hierarchical intrusion detection model based on the PCA neural networks, Neurocomputing, 70 (2007), pp. 1561-1568.
-
(2007)
Neurocomputing
, vol.70
, pp. 1561-1568
-
-
Liu, G.1
Yi, Z.2
Yang, S.3
-
6
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
November, Washington, DC, USA, pp
-
Wagner D, Soto P. Mimicry attacks on host-based intrusion detection systems. Proceedings of the ninth ACM Conference on Computer and Communications Security (2002), November, 2002, Washington, DC, USA, pp.18-22.
-
(2002)
Proceedings of the ninth ACM Conference on Computer and Communications Security
, pp. 18-22
-
-
Wagner, D.1
Soto, P.2
-
7
-
-
0036613003
-
An Artificial Immune System Architecture for Computer Security Applications
-
June
-
P.K. Karmer, P.D. Williams, and G.H. Gunsch, et al. An Artificial Immune System Architecture for Computer Security Applications. IEEE Transactions on Evolutionary Computation, Vol.6, No.3, pp.252-280, June, 2002.
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, Issue.3
, pp. 252-280
-
-
Karmer, P.K.1
Williams, P.D.2
Gunsch, G.H.3
-
8
-
-
1642355954
-
Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context[C]. Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications
-
June, Las Vegas, Nevada, USA, pp
-
Maheshkumar Sabhnani, Gürsel Serpen. Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context[C]. Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications. MLMTA'03, June, 2003, Las Vegas, Nevada, USA, pp.209-215.
-
(2003)
MLMTA'03
, pp. 209-215
-
-
Sabhnani, M.1
Serpen, G.2
-
9
-
-
33847156085
-
PNrule: A new Framework for Learning Classifier Models in Data Mining( A Case-Study in Network Intrusion Detection) [A]
-
Chicago, USA
-
Agarwal, M. V. Joshi. PNrule: A new Framework for Learning Classifier Models in Data Mining( A Case-Study in Network Intrusion Detection) [A]. Proceedings of the First SIAM Conference on Data Mining [C]. Chicago, USA, 2001.
-
(2001)
Proceedings of the First SIAM Conference on Data Mining
, vol.100
-
-
Agarwal, M.V.J.1
-
11
-
-
24944586818
-
-
Dong Seong Kim, Jong Sou Park. Network-based Intrusion Detection with Support Vector Machines. ICOIN 2003, New York: Springer, 2003, pp.747-756.
-
Dong Seong Kim, Jong Sou Park. Network-based Intrusion Detection with Support Vector Machines. ICOIN 2003, New York: Springer, 2003, pp.747-756.
-
-
-
-
16
-
-
12344273544
-
Object detection using feature subset selection
-
Sun, Z., Bebis, G., & Miller, R.. Object detection using feature subset selection. Pattern Recognition, 27, 2004, pp. 2165-2176.
-
(2004)
Pattern Recognition
, vol.27
, pp. 2165-2176
-
-
Sun, Z.1
Bebis, G.2
Miller, R.3
-
17
-
-
0001001098
-
Feature selection for SVMs
-
Weston, J., Mukherjee, S., Chapelle, O., et al. Feature selection for SVMs NIPS 12, 2000, pp. 668-674.
-
(2000)
NIPS
, vol.12
, pp. 668-674
-
-
Weston, J.1
Mukherjee, S.2
Chapelle, O.3
-
18
-
-
50249091608
-
-
KDD cup 99 data set, hhttp://kdd.ics.uci.edu/database/kddcup99/i.
-
KDD cup 99 data set, hhttp://kdd.ics.uci.edu/database/kddcup99/i.
-
-
-
-
21
-
-
84940104123
-
-
W.Lee, S. Stolfo and K. Mok. A data mining framework for building intrusion detection models. Proceedings of the 1999 IEEE Symposium on Security and Privacy', pp.120-132.
-
W.Lee, S. Stolfo and K. Mok. A data mining framework for building intrusion detection models. Proceedings of the 1999 IEEE Symposium on Security and Privacy', pp.120-132.
-
-
-
|