-
2
-
-
0033293396
-
Towards a Taxonomy of Intrusion Detection Systems, IBM Technical Paper
-
April
-
Herv Debar, Marc Dacier, and Andreas Wespi, "Towards a Taxonomy of Intrusion Detection Systems", IBM Technical Paper, Computer Networks, Vol. 39, Issue 9, pp. 805-822, April 1999.
-
(1999)
Computer Networks
, vol.39
, Issue.9
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
3
-
-
0038223829
-
-
NIST Special Publication on Intrusion Detection System, 31 November
-
R. Bace and P. Mell, "Intrusion Detection Systems", NIST Special Publication on Intrusion Detection System, 31 November 2001.
-
(2001)
Intrusion Detection Systems
-
-
Bace, R.1
Mell, P.2
-
6
-
-
0009956176
-
Machine Learning techniques for the computer Security
-
PhD thesis, Purdue University
-
T. Lane, "Machine Learning techniques for the computer Security", PhD thesis, Purdue University, 2000.
-
(2000)
-
-
Lane, T.1
-
7
-
-
34547568079
-
A new intrusion detection method based on discriminant analysis
-
May
-
Madori Asaka, Takefumi Onabuta, Tadashi Inoue, Shunji Okazawa, and Shigeki Goto, "A new intrusion detection method based on discriminant analysis", Oakland, pp. 130-143, May 2001.
-
(2001)
Oakland
, pp. 130-143
-
-
Asaka, M.1
Onabuta, T.2
Inoue, T.3
Okazawa, S.4
Goto, S.5
-
8
-
-
6344223434
-
Using Statistical Analysis and Support Vector Machine Classification to Detection Complicated Attacks
-
Shanghai, China, August 26-29
-
Ming Tang, Song-Can Chen, Yi Zhuang and Jia Liu, "Using Statistical Analysis and Support Vector Machine Classification to Detection Complicated Attacks", Proc. Of the Third International Conference on Machine Learning and Cybernetics IEEE Computer Society, Shanghai, China, August 26-29, 2004.
-
(2004)
Proc. Of the Third International Conference on Machine Learning and Cybernetics IEEE Computer Society
-
-
Tang, M.1
Chen, S.-C.2
Zhuang, Y.3
Liu, J.4
-
11
-
-
50949111971
-
-
J. Twycross, Immune Systems, Danger Theory and Intrusion Detection, presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
-
J. Twycross, Immune Systems, "Danger Theory and Intrusion Detection", presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004.
-
-
-
-
12
-
-
33645961388
-
An artificial immune system for fuzzy-rule induction in data mining
-
R.T. Alves, M.R.B.S. Delgado, H.S. Lopes, A.A. Freitas, "An artificial immune system for fuzzy-rule induction in data mining", Lecture Notes in Computer Science, Berlin: Springer-Verlag, Vol. 3242, 2004, pp. 1011-1020.
-
(2004)
Lecture Notes in Computer Science, Berlin: Springer-Verlag
, vol.3242
, pp. 1011-1020
-
-
Alves, R.T.1
Delgado, M.R.B.S.2
Lopes, H.S.3
Freitas, A.A.4
-
15
-
-
13544269338
-
Application of SVM and ANN for intrusion, Computers & Operations Research
-
W.H. Chen, S.H. Hsu, and H.P. Shen, "Application of SVM and ANN for intrusion, Computers & Operations Research", ELSEVIER, Vol. 32, No. 10, 2005, pp. 2617-2634.
-
(2005)
ELSEVIER
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.H.1
Hsu, S.H.2
Shen, H.P.3
-
16
-
-
1542284996
-
-
K.L. Li, H.K. Huang, S.F. Tian, and W. Xu, "Improving oneclass SVM for anomaly detection, International Conference on Machine Learning and Cybernetics", Vol. 5, 2003, pp. 3077-3081.
-
(2003)
Improving oneclass SVM for anomaly detection, International Conference on Machine Learning and Cybernetics
, vol.5
, pp. 3077-3081
-
-
Li, K.L.1
Huang, H.K.2
Tian, S.F.3
Xu, W.4
-
18
-
-
33744522522
-
Intrusion Detection System Based on Multi-class SVM
-
H. Lee, J. Song, D. Park, "Intrusion Detection System Based on Multi-class SVM", RSFDGrC, Vol. 2, 2005, pp. 511-519.
-
(2005)
RSFDGrC
, vol.2
, pp. 511-519
-
-
Lee, H.1
Song, J.2
Park, D.3
-
19
-
-
50949086987
-
-
A. Abraham, R. Jain, Soft Computing Models for Network Intrusion Detection Systems CoRRcs, CR/0405046, 2004.
-
A. Abraham, R. Jain, "Soft Computing Models for Network Intrusion Detection Systems CoRRcs", CR/0405046, 2004.
-
-
-
-
21
-
-
50949102776
-
-
B. Schoelkopf, C. Burges, and V. Vapnik., Extracting support data for a given task. In U.M. Fayyad, and R. Uthurusamy, editors, Proceedings, First International Conference on Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA, 1995.
-
B. Schoelkopf, C. Burges, and V. Vapnik., "Extracting support data for a given task". In U.M. Fayyad, and R. Uthurusamy, editors, Proceedings, First International Conference on Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA, 1995.
-
-
-
-
22
-
-
50949090836
-
-
S. Knerrr, L. Personnaz, and G. Dreyfus, Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network, In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
-
S. Knerrr, L. Personnaz, and G. Dreyfus, "Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network", In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
-
-
-
-
23
-
-
24944586818
-
Network-Based Intrusion Detection with Support Vector Machines
-
D. S. Kim, J. S. Park, "Network-Based Intrusion Detection with Support Vector Machines", ICOIN, 2003, pp. 747-756.
-
(2003)
ICOIN
, pp. 747-756
-
-
Kim, D.S.1
Park, J.S.2
-
25
-
-
0008568526
-
AntClass: Discovery of clusters in numeric data by an hybridization of an ant colony with k-means algorithm
-
Internal Report no. 213, Laboratoire d'Informatique de l'Universite de January
-
Monmarche N., Silmane M., and Venturini G., "AntClass: discovery of clusters in numeric data by an hybridization of an ant colony with k-means algorithm", Internal Report no. 213, Laboratoire d'Informatique de l'Universite de January 1999.
-
(1999)
-
-
Monmarche, N.1
Silmane, M.2
Venturini, G.3
-
26
-
-
50949096523
-
-
KDD data set, 1999; http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
-
(1999)
-
-
-
27
-
-
84874124494
-
Visualization of anomaly detection using prediction sensitivity
-
April
-
P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, "Visualization of anomaly detection using prediction sensitivity", Proc. of Sicherheit, April 2005, 197-208.
-
(2005)
Proc. of Sicherheit
, pp. 197-208
-
-
Laskov, P.1
Rieck, K.2
Schäfer, C.3
Müller, K.R.4
-
30
-
-
50949106581
-
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
-
W. Chimphlee, Abdul Hanan Abdullah, Mohd Noor Md Sap and S. Chimphlee, "Unsupervised Anomaly Detection with Unlabeled Data Using Clustering", Proc. Int. Conf. on ICT-Mercu Buana ICT 2005. 42-49.
-
(2005)
Proc. Int. Conf. on ICT-Mercu Buana ICT
, pp. 42-49
-
-
Chimphlee, W.1
Hanan Abdullah, A.2
Noor, M.3
Sap, M.4
Chimphlee, S.5
-
31
-
-
19544384880
-
A comparative study of anomaly detection schemes in network intrusion detection
-
A. Lazarevic, A. Ozgur, L. Ertoz, J. Srivastava, and V. Kumar, A comparative study of anomaly detection schemes in network intrusion detection. In SIAM International Conference on Data Mining, 2003.
-
(2003)
SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
-
33
-
-
5044228031
-
A Fuzzy Data Mining Based Intrusion Detection System
-
Suzhou, China, May 26-28
-
H. Jin, J. Sun, H. Chen, and Z. Han, A Fuzzy Data Mining Based Intrusion Detection System, Proc. of 10th International Workshop on future Trends in Distributed Computing Systems (FTDCS04) IEEE Computer Society, Suzhou, China, May 26-28, 2004, 191-197.
-
(2004)
Proc. of 10th International Workshop on future Trends in Distributed Computing Systems (FTDCS04) IEEE Computer Society
, pp. 191-197
-
-
Jin, H.1
Sun, J.2
Chen, H.3
Han, Z.4
|