메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1068-1074

Signature based intrusion detection using latent semantic analysis

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER PROGRAMMING; GENETIC ALGORITHMS; GENETIC PROGRAMMING; INFORMATION THEORY; INTRUSION DETECTION; LINEAR PROGRAMMING; NEURAL NETWORKS; REAL TIME SYSTEMS; SECURITY OF DATA; SEMANTICS; SINGULAR VALUE DECOMPOSITION;

EID: 56349158810     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IJCNN.2008.4633931     Document Type: Conference Paper
Times cited : (10)

References (23)
  • 3
    • 0001926426 scopus 로고    scopus 로고
    • Tutoring Systems Based on Latent Semantic Analysis
    • S.P. Lajoie and M. Vivet Eds
    • B. Lemaire, "Tutoring Systems Based on Latent Semantic Analysis," In S.P. Lajoie and M. Vivet (Eds.), Artificial Intelligence in Education, 1999, 527-534.
    • (1999) Artificial Intelligence in Education , pp. 527-534
    • Lemaire, B.1
  • 4
    • 0033894473 scopus 로고    scopus 로고
    • Large vocabulary speech recognition with multispan statistical language models
    • J. R. Bellegarda, "Large vocabulary speech recognition with multispan statistical language models," IEEE Transactions on Speech and Audio Processing, 8(1), 2000, 76-84.
    • (2000) IEEE Transactions on Speech and Audio Processing , vol.8 , Issue.1 , pp. 76-84
    • Bellegarda, J.R.1
  • 5
    • 0000600219 scopus 로고    scopus 로고
    • A Solution to Plato's Problem: The Latent Semantic Analysis Theory of the Acquisition, Induction, and Representation of Knowledge
    • T. K. Landauer, T. S. Dumais, "A Solution to Plato's Problem: The Latent Semantic Analysis Theory of the Acquisition, Induction, and Representation of Knowledge," Psychological Review, 104, 1997, 211-240.
    • (1997) Psychological Review , vol.104 , pp. 211-240
    • Landauer, T.K.1    Dumais, T.S.2
  • 8
    • 29244443366 scopus 로고    scopus 로고
    • On the Use of Singular Value Decomposition for a Fast Intrusion Detection System
    • S. Rawat, A. Pujari, V. Gulati, "On the Use of Singular Value Decomposition for a Fast Intrusion Detection System," Electrical. Notes Theory Computer Science 142, 2006, 215-228.
    • (2006) Electrical. Notes Theory Computer Science , vol.142 , pp. 215-228
    • Rawat, S.1    Pujari, A.2    Gulati, V.3
  • 9
    • 0034730140 scopus 로고    scopus 로고
    • Singular value decomposition for genome-wide expression data processing and modeling
    • O. Alter, P. O. Brown, D. Botstein, "Singular value decomposition for genome-wide expression data processing and modeling," Proceedings of National Academy of Sciences. USA, 97, 2000, 10101-10106.
    • (2000) Proceedings of National Academy of Sciences. USA , vol.97 , pp. 10101-10106
    • Alter, O.1    Brown, P.O.2    Botstein, D.3
  • 10
    • 33646178879 scopus 로고    scopus 로고
    • Immunocomputing model of intrusion detection
    • Springer
    • Y. Melnikov, A. Tarakanov, "Immunocomputing model of intrusion detection," LNCS, 2776, Springer, 2003, 453-456.
    • (2003) LNCS , vol.2776 , pp. 453-456
    • Melnikov, Y.1    Tarakanov, A.2
  • 12
    • 33751582540 scopus 로고    scopus 로고
    • Multilinear image analysis for facial recognition
    • M. Vasilescu and D. Terzopoulos, "Multilinear image analysis for facial recognition," ICPR, 2002, 511-514.
    • (2002) ICPR , pp. 511-514
    • Vasilescu, M.1    Terzopoulos, D.2
  • 13
    • 33947265693 scopus 로고    scopus 로고
    • The Feature Selection and Intrusion Detection Problems
    • th Asian Computing Science Conference, Springer
    • th Asian Computing Science Conference, LNCS, 3321, Springer, 2004, 468-483.
    • (2004) LNCS , vol.3321 , pp. 468-483
    • Sung, A.H.1    Mukkamala, S.2
  • 14
    • 0004204715 scopus 로고    scopus 로고
    • A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems,
    • Master's Thesis, MIT
    • K. Kendall, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems," Master's Thesis, MIT, 1998.
    • (1998)
    • Kendall, K.1
  • 15
    • 0006890005 scopus 로고    scopus 로고
    • The Development and Analysis of Intrusion Detection Algorithms,
    • SM. Thesis, MIT
    • S. E. Webster, "The Development and Analysis of Intrusion Detection Algorithms," SM. Thesis, MIT, 1998.
    • (1998)
    • Webster, S.E.1
  • 17
    • 33750691647 scopus 로고    scopus 로고
    • Zoomed Clusters
    • Proceedings of The Thirteen International Conference on Neural Information Processing ICONIP, Springer
    • J. Lassez, T. Karadeniz, and S. Mukkamala , "Zoomed Clusters," Proceedings of The Thirteen International Conference on Neural Information Processing (ICONIP), LNCS, 4233, Springer, 2006, 824-830.
    • (2006) LNCS , vol.4233 , pp. 824-830
    • Lassez, J.1    Karadeniz, T.2    Mukkamala, S.3
  • 18
    • 15744380176 scopus 로고    scopus 로고
    • A Framework for Countering Denial of Service Attacks (Knowledge Discovery Approach)
    • Man, and Cybernetics
    • S. Mukkamala, A. H. Sung "A Framework for Countering Denial of Service Attacks (Knowledge Discovery Approach)," Proc. of IEEE International Conference Systems, Man, and Cybernetics, 2004, 3273-3278.
    • (2004) Proc. of IEEE International Conference Systems , pp. 3273-3278
    • Mukkamala, S.1    Sung, A.H.2
  • 19
    • 3042530277 scopus 로고
    • The Nature of Statistical Learning Theory
    • V. N. Vapnik, "The Nature of Statistical Learning Theory," Springer, 1995.
    • (1995) Springer
    • Vapnik, V.N.1
  • 21
    • 56349119316 scopus 로고    scopus 로고
    • Significant Feature Selection Using Computational Intelligent Techniques for Intrusion Detection
    • S. Bandyopadhyay, U. Maulik, L. Holder and D. Cook Eds, Springer
    • S. Mukkamala, A. H. Sung, "Significant Feature Selection Using Computational Intelligent Techniques for Intrusion Detection," Advanced Methods for Knowledge Discovery from Complex Data, S. Bandyopadhyay, U. Maulik, L. Holder and D. Cook (Eds.) Springer, 2005, 285-306.
    • (2005) Advanced Methods for Knowledge Discovery from Complex Data , pp. 285-306
    • Mukkamala, S.1    Sung, A.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.