-
1
-
-
51649103091
-
Autonomic Network Security Management: Design and Evaluation
-
S. Hariri, G. Qu, H. Chen, Y. Al-Nashif, M. Yousif, "Autonomic Network Security Management: Design and Evaluation", ACM Transactions on Autonomous and Adaptive Systems - Special Issue on Adaptive Learning in Autonomic Communication, 2007.
-
(2007)
ACM Transactions on Autonomous and Adaptive Systems - Special Issue on Adaptive Learning in Autonomic Communication
-
-
Hariri, S.1
Qu, G.2
Chen, H.3
Al-Nashif, Y.4
Yousif, M.5
-
2
-
-
0003892692
-
USTAT: A Real-Time Intrusion Detection System for UNIX
-
Master Thesis, University of California, Santa Barbara, November
-
K. Ilgun. "USTAT: A Real-Time Intrusion Detection System for UNIX", Master Thesis, University of California, Santa Barbara, November 1992.
-
(1992)
-
-
Ilgun, K.1
-
6
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Richard P. Lippmann and Robert K. Cunningham, "Improving intrusion detection performance using keyword selection and neural networks", Computer Networks, 2000, 34:597-603.
-
(2000)
Computer Networks
, vol.34
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
7
-
-
0344095523
-
Integrating fuzzy logic with data mining methods for intrusion detection
-
Master's thesis, Department of Computer Science, Mississippi State University
-
Jianxiong Luo, "Integrating fuzzy logic with data mining methods for intrusion detection", Master's thesis, Department of Computer Science, Mississippi State University, 1999.
-
(1999)
-
-
Luo, J.1
-
9
-
-
0013029835
-
PNrule: A new framework for learning classifier models in data mining (a case-study in network intrusion detection)
-
00-015, Department of Computer Science, University of Minnesota
-
Ramesh Agarwal and Mahesh V. Joshi, "PNrule: A new framework for learning classifier models in data mining (a case-study in network intrusion detection)", Technical Report TR 00-015, Department of Computer Science, University of Minnesota, 2000.
-
(2000)
Technical Report TR
-
-
Agarwal, R.1
Joshi, M.V.2
-
10
-
-
51649084315
-
Smoteboost: Improving the prediction of minority class in boosting
-
Technical Report 2002-136, AHPCRC, 2002
-
Aleksander Lazarevic, Nitesh V. Chawla, Lawrence O. Hall, and Kevin W. Bowyer, "Smoteboost: Improving the prediction of minority class in boosting", Technical Report 2002-136, AHPCRC, 2002
-
-
-
Lazarevic, A.1
Chawla, N.V.2
Hall, L.O.3
Bowyer, K.W.4
-
11
-
-
29844441257
-
A data mining analysis of rtid alarms
-
West Lafayette, IN
-
Stefanos Manganaris, Marvin Christensen, Dan Zerkle, and Keith Hermiz, "A data mining analysis of rtid alarms", In Proceedings of the 2nd International Workshop on Recent Advances in Intrusion Detection RAID, West Lafayette, IN, 1999.
-
(1999)
Proceedings of the 2nd International Workshop on Recent Advances in Intrusion Detection RAID
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
12
-
-
51649085353
-
Evaluating boosting algorithms to classify rare classes: Comparison and improvements
-
San Jose, CA
-
Mahesh V. Joshi, Vipin Kumar, and Ramesh C. Agarwal, "Evaluating boosting algorithms to classify rare classes: Comparison and improvements", In ICDM, pages 257-264, San Jose, CA, 2001
-
(2001)
ICDM
, pp. 257-264
-
-
Joshi, M.V.1
Kumar, V.2
Agarwal, R.C.3
-
13
-
-
33745441630
-
The MINDS - Minnesota Intrusion Detection System
-
MIT Press
-
Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivastava, J., Kumar, V., Dokas, P., "The MINDS - Minnesota Intrusion Detection System", Next Generation Data Mining, MIT Press, 2004.
-
(2004)
Next Generation Data Mining
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.4
Srivastava, J.5
Kumar, V.6
Dokas, P.7
-
15
-
-
0004118981
-
The nides statistical component: Description and justification
-
Technical report, Computer Science Laboratory, SRI International
-
Harold S. Javitz and Alfonso Valdes, "The nides statistical component: Description and justification". Technical report, Computer Science Laboratory, SRI International, 1993.
-
(1993)
-
-
Javitz, H.S.1
Valdes, A.2
-
17
-
-
0037986866
-
Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system NIDES
-
Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International
-
D. Anderson, T. F. Lunt, H. Javitz, A. Tamaru, and A. Valdes, "Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system NIDES", Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, 1995.
-
(1995)
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
20
-
-
0003201842
-
A Markov Chain Model of Temporal Behavior for Anomaly Detection
-
Man, and Cybernetics
-
N. Ye, "A Markov Chain Model of Temporal Behavior for Anomaly Detection", Proceedings of the 2000 IEEE Systems, Man, and Cybernetics.
-
Proceedings of the 2000 IEEE Systems
-
-
Ye, N.1
-
21
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
Stuart Staniford, James A. Hoagland, and Joseph M. McAlerney, "Practical automated detection of stealthy portscans", Journal of Computer Security, 10:105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
22
-
-
4143149628
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Eleazar Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, and Sal Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data", Data Mining for Security Applications, 2002.
-
(2002)
Data Mining for Security Applications
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
23
-
-
0034832620
-
Outlier detection for high dimensional data
-
Charu C. Aggarwal and Philip S. Yu, "Outlier detection for high dimensional data". In SIGMOD Conference, 2001.
-
(2001)
SIGMOD Conference
-
-
Aggarwal, C.C.1
Yu, P.S.2
-
24
-
-
0038011179
-
Specification based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou, "Specification based anomaly detection: A new approach for detecting network intrusions", In ACM Conference on Computer and Communications Security, 2002.
-
(2002)
ACM Conference on Computer and Communications Security
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
25
-
-
34250801472
-
A hybrid machine learning approach to network anomaly detection
-
18 Sep
-
Shon, T. and Moon, J., "A hybrid machine learning approach to network anomaly detection" Inf. Sci. 177, 18 Sep. 2007, 3799-3821.
-
(2007)
Inf. Sci
, vol.177
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
-
26
-
-
27644496932
-
A new dependency and correlation analysis for features
-
G. Qu, S. Hariri, and M. S. Yousif, "A new dependency and correlation analysis for features." IEEE Trans. Knowl. Data Eng., vol. 17, no. 9, 2005 pp. 1199-1207.
-
(2005)
IEEE Trans. Knowl. Data Eng
, vol.17
, Issue.9
, pp. 1199-1207
-
-
Qu, G.1
Hariri, S.2
Yousif, M.S.3
-
27
-
-
51649105958
-
Autonomic Network Defense (AND) System: Design and Analysis
-
Submitted to
-
Y. Al-Nashif, G. Qu, H. Chen, S. Hariri, and A. Arun Kumar, "Autonomic Network Defense (AND) System: Design and Analysis", Submitted to IEEE Transactions on Secure and Dependable Computing.
-
IEEE Transactions on Secure and Dependable Computing
-
-
Al-Nashif, Y.1
Qu, G.2
Chen, H.3
Hariri, S.4
Arun Kumar, A.5
-
28
-
-
47949089659
-
Self-Configuration of Network Security
-
October
-
H. Chen, Y. Al-Nashif, G. Qu, and S. Hariri, "Self-Configuration of Network Security", the 11th IEEE International EDOC Conference, Annapolis, Maryland U.S.A. 15-19 October 2007.
-
(2007)
the 11th IEEE International EDOC Conference, Annapolis, Maryland U.S.A. 15-19
-
-
Chen, H.1
Al-Nashif, Y.2
Qu, G.3
Hariri, S.4
-
29
-
-
51649122514
-
Towards Runtime Protocol Anomaly Detection and Verification
-
Setubal, Portugal, 25-28 August
-
InSeon Yoo and Ulrich Ultes-Nitsche, "Towards Runtime Protocol Anomaly Detection and Verification", Proc. of the 1st International Conference on E-Business and Telecommunication Networks, Setubal, Portugal, 25-28 August, 2004.
-
(2004)
Proc. of the 1st International Conference on E-Business and Telecommunication Networks
-
-
Yoo, I.1
Ultes-Nitsche, U.2
-
30
-
-
51649083528
-
-
RFC793, Transmission control protocol, September 1981. DARPA Internet Program Protocol Specification.
-
RFC793, "Transmission control protocol", September 1981. DARPA Internet Program Protocol Specification.
-
-
-
-
33
-
-
84924223669
-
Static Analysis of Executables to Detect Malicious Patterns
-
Washington, D.C
-
Christodorescu, M. and S. Jha. "Static Analysis of Executables to Detect Malicious Patterns", In USENIX Security Symposium, Washington, D.C. 2003.
-
(2003)
USENIX Security Symposium
-
-
Christodorescu, M.1
Jha, S.2
-
35
-
-
0014814325
-
Space/time trade-offs in Hash Coding with Allowable Errors
-
Bloom, B.H., "Space/time trade-offs in Hash Coding with Allowable Errors", Communications of the ACM, 1970. 13(7): p. 422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
36
-
-
51649110692
-
-
IOS Firewall and Microsoft Windows Vista TCP Window Scaling, Document ID:71613, 2006-2007 Cisco Systems, Inc.
-
IOS Firewall and Microsoft Windows Vista TCP Window Scaling, Document ID:71613, 2006-2007 Cisco Systems, Inc.
-
-
-
-
37
-
-
51649122513
-
-
Network connectivity may fail when you try to use Windows Vista behind a firewall device, Article 1D:93443O, Sept. 26, 2007. Microsoft Corp.
-
Network connectivity may fail when you try to use Windows Vista behind a firewall device, Article 1D:93443O, Sept. 26, 2007. Microsoft Corp.
-
-
-
-
39
-
-
0009011405
-
Detecting novel network intrusions using bayes estimators
-
Chicago, IL
-
Daniel Barbara, Ningning Wu, and Sushil Jajodia, "Detecting novel network intrusions using bayes estimators", In Proceedings of First SIAM Conference on Data Mining, Chicago, IL, 2001.
-
(2001)
Proceedings of First SIAM Conference on Data Mining
-
-
Barbara, D.1
Wu, N.2
Jajodia, S.3
-
40
-
-
51649098173
-
-
W. W. Cohen. Fast effective rule induction, In Proceedings of the Twelfth International Conference on Machine Learning, Lake Tahoe, California, 1995
-
W. W. Cohen. "Fast effective rule induction", In Proceedings of the Twelfth International Conference on Machine Learning, Lake Tahoe, California, 1995
-
-
-
-
41
-
-
51649110436
-
-
Arash Partow, http://www.partow.net/programming/hashfunctions/ #AvailableHashFunctions
-
Arash Partow, http://www.partow.net/programming/hashfunctions/ #AvailableHashFunctions
-
-
-
|