-
1
-
-
0003907293
-
-
Intrusion Detection, http://en.wikipedia.org/wiki/Intrasion-Detection
-
Intrusion Detection
-
-
-
2
-
-
51849116646
-
-
Anderson, J.P., Computer Security Threat Monitoring and Surveillance, Technical report, James P. Anderson Co., Fort Washington, PA., April 1980
-
Anderson, J.P., Computer Security Threat Monitoring and Surveillance, Technical report, James P. Anderson Co., Fort Washington, PA., April 1980
-
-
-
-
5
-
-
0012061165
-
Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems
-
Bass, T., Multisensor Data Fusion for Next Generation Distributed Intrusion Detection Systems, IRIS National Symposium, 1999
-
(1999)
IRIS National Symposium
-
-
Bass, T.1
-
6
-
-
0038330235
-
Fusion of multiple Classifiers for Intrusion Detection in Computer Networks
-
Giacinto, G., Roli, F., Didaci, L., Fusion of multiple Classifiers for Intrusion Detection in Computer Networks, Pattern Recognition Letters, 24, pp. 1795-1803, 2003
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
7
-
-
30644460786
-
Intrusion detection in computer networks by multiple classifiers systems
-
Didaci, L., Giacinto, G., Roli, F., Intrusion detection in computer networks by multiple classifiers systems, International Conference on Pattern recognition, 2002
-
(2002)
International Conference on Pattern recognition
-
-
Didaci, L.1
Giacinto, G.2
Roli, F.3
-
8
-
-
43249093910
-
-
Wang, Y., Yang, H., Wang, X., Zhang, R., Distributed intrusion detection system based on data fusion method, Intelligent control and automation, WCICA 2004
-
(2004)
Distributed intrusion detection system based on data fusion method, Intelligent control and automation, WCICA
-
-
Wang, Y.1
Yang, H.2
Wang, X.3
Zhang, R.4
-
9
-
-
39749091030
-
Intrusion Detection Engine on Dempster-Shafer's Theory of Evidence
-
Jun
-
Hu, W, Li, J., Gao, Q., Intrusion Detection Engine on Dempster-Shafer's Theory of Evidence, Proceedings of International Conference on Communications , Circuits and Systems, vol.3, pp. 1627-1631, Jun 2006
-
(2006)
Proceedings of International Conference on Communications , Circuits and Systems
, vol.3
, pp. 1627-1631
-
-
Hu, W.1
Li, J.2
Gao, Q.3
-
10
-
-
12344304006
-
Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture
-
Siraj, A., Vaughn, R.B., Bridges, S.M., Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture, Proceedings of the 37th Hawaii international Conference on System Sciences, 2004
-
(2004)
Proceedings of the 37th Hawaii international Conference on System Sciences
-
-
Siraj, A.1
Vaughn, R.B.2
Bridges, S.M.3
-
11
-
-
0024738034
-
Optimal distributed decision fusion
-
Sep
-
Thomopolous, S.C.A., Viswanathan, R., Bougoulias, D.K., Optimal distributed decision fusion, IEEE Transactions on aerospace and electronic systems, vol. 25, No. 5, Sep. 1989
-
(1989)
IEEE Transactions on aerospace and electronic systems
, vol.25
, Issue.5
-
-
Thomopolous, S.C.A.1
Viswanathan, R.2
Bougoulias, D.K.3
-
12
-
-
35949000533
-
Selection of Intrusion Detection Threshold Bounds for effective Sensor Fusion
-
Florida, April
-
Thomas, C., Balakrishnan, N., Selection of Intrusion Detection Threshold Bounds for effective Sensor Fusion, SPIE Defense and Security Symposium, vol.6570, Florida, April 2007
-
(2007)
SPIE Defense and Security Symposium
, vol.6570
-
-
Thomas, C.1
Balakrishnan, N.2
-
13
-
-
33646037321
-
-
Perdisci, R., Giacinto, G., Roli, F., Alarm clustering for intrusion detection systems in computer networks, Engg. applications of Artificial intelligence, Elsevier publications, March 2006
-
Perdisci, R., Giacinto, G., Roli, F., Alarm clustering for intrusion detection systems in computer networks, Engg. applications of Artificial intelligence, Elsevier publications, March 2006
-
-
-
-
19
-
-
21944457574
-
A Comprehensive Approach to Intrusion Detection Alert Correlation
-
Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R., A Comprehensive Approach to Intrusion Detection Alert Correlation, In IEEE Transactions on Dependable and Secure Computing, 2004
-
(2004)
IEEE Transactions on Dependable and Secure Computing
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.4
-
22
-
-
51849136292
-
-
Snort Manual, www.snort.org/docs/snort_htmanuals/htmanual_260
-
Snort Manual
-
-
-
23
-
-
0023331258
-
An introduction to computing with Neural Nets
-
April
-
Lippmann, R.P., An introduction to computing with Neural Nets, IEEE ASSP Magazine, Vol.4, pp. 4-22, April 1987
-
(1987)
IEEE ASSP Magazine
, vol.4
, pp. 4-22
-
-
Lippmann, R.P.1
-
25
-
-
85019691440
-
Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA IDS evaluations as performed by Lincoln Laboratory
-
Nov
-
J. McHugh, Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA IDS evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security, vol.3, No.4, Nov. 2000
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
-
-
McHugh, J.1
-
26
-
-
51849122279
-
-
Mahoney,M.V., Chan,P.K. An analysis of the 1999 DARPA /Lincoln Laboratory evaluation data for network anomaly detection, Technical Report CS-2003-02
-
Mahoney,M.V., Chan,P.K. An analysis of the 1999 DARPA /Lincoln Laboratory evaluation data for network anomaly detection, Technical Report CS-2003-02
-
-
-
-
28
-
-
0038428854
-
Results of the KDD'99 classifier learning
-
Jan
-
Elkan, C., Results of the KDD'99 classifier learning, SIGKDD Explorations, Vol. 1, Issue 2, pp. 63-64, Jan 2000
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
|