-
1
-
-
51849122665
-
-
CERT
-
CERT, "CERT Statistics", http://www.cert.org/stats/#notes, 2007.
-
(2007)
CERT Statistics
-
-
-
2
-
-
84951717161
-
Statistics on Federal Incident Reports
-
The United States Computer Emergency Readiness Team US-CERT
-
"Statistics on Federal Incident Reports," The United States Computer Emergency Readiness Team (US-CERT) 2004.
-
(2004)
-
-
-
4
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks, 2007.
-
(2007)
Computer Networks
-
-
Patcha, A.1
Park, J.-M.2
-
6
-
-
2942751146
-
Experiences with Specification-Based Intrusion Detection
-
P. Uppuluri and R. Sekar, "Experiences with Specification-Based Intrusion Detection," in Recent Advances in Intrusion Detection : 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, 2001, p. 172.
-
(2001)
Recent Advances in Intrusion Detection : 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings
, pp. 172
-
-
Uppuluri, P.1
Sekar, R.2
-
7
-
-
34247500449
-
-
A.-S. Mohammad and Z. Mohammad, Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection, in 30th Annual International Computer Software and Applications Conference, 2006, pp. 325-332
-
A.-S. Mohammad and Z. Mohammad, "Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection," in 30th Annual International Computer Software and Applications Conference, 2006, pp. 325-332.
-
-
-
-
8
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: a rule-based intrusion detection approach," Software Engineering, IEEE Transactions on, vol. 21, pp. 181-199, 1995.
-
(1995)
Software Engineering, IEEE Transactions on
, vol.21
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
9
-
-
33846309260
-
Advances in artificial immune systems
-
D. Dipankar, "Advances in artificial immune systems," Computational Intelligence Magazine, IEEE, vol. 1, pp. 40-49, 2006.
-
(2006)
Computational Intelligence Magazine, IEEE
, vol.1
, pp. 40-49
-
-
Dipankar, D.1
-
10
-
-
0028201732
-
Tolerance, Danger, and the Extended Family
-
P. Matzinger, "Tolerance, Danger, and the Extended Family," Annual Review in Immunology, vol. 12, pp. 991-1045, 1994.
-
(1994)
Annual Review in Immunology
, vol.12
, pp. 991-1045
-
-
Matzinger, P.1
-
11
-
-
0032313923
-
Intrusion Detection Using Sequences of System Calls
-
S. Forrest, S. A. Hofmeyr, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls," Journal of Computer Security, vol. 6, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
13
-
-
3042601656
-
Protocol Analysis in Intrusion Detection using Decision Tree
-
T. Abbes, A. A. Bouhoula, and M. Rusinowitch, "Protocol Analysis in Intrusion Detection using Decision Tree," in Proc. International Conference on Information Technology, Coding, and Computing (ITCC '04), 2004, pp. 404-408.
-
(2004)
Proc. International Conference on Information Technology, Coding, and Computing (ITCC '04)
, pp. 404-408
-
-
Abbes, T.1
Bouhoula, A.A.2
Rusinowitch, M.3
-
14
-
-
34748870795
-
A Framework for an Adaptive Intrusion Detection System using Bayesian Network
-
F. Jemili, M. Zaghdoud, and M. B. Ahmed, "A Framework for an Adaptive Intrusion Detection System using Bayesian Network," in IEEE Intelligence and Security Informatics, 2007, pp. 66-70.
-
(2007)
IEEE Intelligence and Security Informatics
, pp. 66-70
-
-
Jemili, F.1
Zaghdoud, M.2
Ahmed, M.B.3
-
15
-
-
23944493926
-
A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems
-
A. El-Semary, J. Edmonds, J. Gonzalez, and M. Papa, "A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems," in The 14th IEEE International Conference on Fuzzy Systems, 2005, pp. 325-330.
-
(2005)
The 14th IEEE International Conference on Fuzzy Systems
, pp. 325-330
-
-
El-Semary, A.1
Edmonds, J.2
Gonzalez, J.3
Papa, M.4
-
16
-
-
33749404535
-
DIDMA: A distributed intrusion detection system using mobile agents
-
P. Kannadiga and M. Zulkernine, "DIDMA: a distributed intrusion detection system using mobile agents," in Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks 2005, pp. 238-245.
-
(2005)
Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks
, pp. 238-245
-
-
Kannadiga, P.1
Zulkernine, M.2
-
18
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, E. Spafford, and D. Zamboni, "An architecture for intrusion detection using autonomous agents," in Proceedings of the 14th Annual Computer Security Applications Conference, 1998, pp. 13-24.
-
(1998)
Proceedings of the 14th Annual Computer Security Applications Conference
, pp. 13-24
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
21
-
-
35048855121
-
Agent-Based Distributed Intrusion Alert System
-
A. Ghosh and S. Sen, "Agent-Based Distributed Intrusion Alert System," in Distributed Computing, 2004, pp. 240-251.
-
(2004)
Distributed Computing
, pp. 240-251
-
-
Ghosh, A.1
Sen, S.2
-
22
-
-
51849112131
-
A Novel Peer-to-Peer Intrusion Detection System
-
X. Kun, Z. Ji, W. Xin, and X. Xiangyang, "A Novel Peer-to-Peer Intrusion Detection System," in Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies 2005, pp. 441-445.
-
(2005)
Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 441-445
-
-
Kun, X.1
Ji, Z.2
Xin, W.3
Xiangyang, X.4
-
23
-
-
39649090735
-
A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture
-
E. Mosqueira-Rey, A. Alonso-Betanzos, B. del Rio, and J. Pineiro, "A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture," in Agent and Multi-Agent Systems: Technologies and Applications, 2007, pp. 466-475.
-
(2007)
Agent and Multi-Agent Systems: Technologies and Applications
, pp. 466-475
-
-
Mosqueira-Rey, E.1
Alonso-Betanzos, A.2
del Rio, B.3
Pineiro, J.4
-
24
-
-
0034300682
-
Intrusion detection using autonomous agents
-
E. H. Spafford and D. Zamboni, "Intrusion detection using autonomous agents," Computer Networks, vol. 34, pp. 547-570, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
25
-
-
23944512147
-
An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks
-
S. B. Jeong, Y. W. Choi, and S. Kim, "An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks," in Information Security Applications, 2005, pp. 204-210.
-
(2005)
Information Security Applications
, pp. 204-210
-
-
Jeong, S.B.1
Choi, Y.W.2
Kim, S.3
-
27
-
-
35248857893
-
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
-
M. V. Mahoney and P. K. Chan, "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection," in Recent Advances in Intrusion Detection, 2003, pp. 220-237.
-
(2003)
Recent Advances in Intrusion Detection
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
|