-
1
-
-
0004048154
-
Computer Security Threat Monitoring and Surveillance, James P Anderson Co
-
Pennsylvania, April
-
J. P. Anderson.: Computer Security Threat Monitoring and Surveillance, James P Anderson Co.., Technicalreport, Fort Washington, Pennsylvania, April (1980)
-
(1980)
Technicalreport, Fort Washington
-
-
Anderson, J.P.1
-
3
-
-
0023294428
-
An Intrusion Detection Model
-
February
-
D.E. Denning, "An Intrusion Detection Model," IEEE Transaction on Software Engineering, Vol. 13, No. 2, pp. 222-232, February 1987
-
(1987)
IEEE Transaction on Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
4
-
-
0035402096
-
-
S. C. Lee and D. V. Heinbuch. Training a neural-network based intrusion detector to recognize novel attacks. IEEE Tr. on Systems, Man and Cybernetics, Part A, 31(4):294-299, 2001.
-
S. C. Lee and D. V. Heinbuch. Training a neural-network based intrusion detector to recognize novel attacks. IEEE Tr. on Systems, Man and Cybernetics, Part A, 31(4):294-299, 2001.
-
-
-
-
5
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
R. P. Lippmann and R. K. Cunningham. Improving intrusion detection performance using keyword selection and neural networks. Computer Networfa, 34(4):597-603, 2000.
-
(2000)
Computer Networfa
, vol.34
, Issue.4
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
6
-
-
0036085392
-
-
Honolulu
-
S. Mukkamala, G. Janoski, and A. Sung. Intrusion detection using neural networks and support vector machines. In Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2002), Honolulu, volume 2, pages 1702-1707, 2002.
-
(2002)
Intrusion detection using neural networks and support vector machines. In Proc. of the Int. Joint Conf. on Neural Networks (IJCNN
, vol.2
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
7
-
-
84964490822
-
Method of evolutionary neural network-based intrusion detection. In Y. X, Zhong
-
S. Cui, and Y. Wang, editors, Beijing
-
L. Wang, G. Yu, G. Wang, and D. Wang. Method of evolutionary neural network-based intrusion detection. In Y. X, Zhong, S. Cui, and Y. Wang, editors, Int. Conf. on Info-tech and Info-net (ICII 2001), Beijing, volume 5, pages 13-18,2001.
-
(2001)
Int. Conf. on Info-tech and Info-net (ICII
, vol.5
, pp. 13-18
-
-
Wang, L.1
Yu, G.2
Wang, G.3
Wang, D.4
-
8
-
-
84898944587
-
Intrusion detection with neural networks
-
M. Jordan, M. Kearns, and S. Solla, editors, MIT Press, Cambridge
-
J. Ryan, M.-J. Lin, and R. Miikkulainen. Intrusion detection with neural networks. In M. Jordan, M. Kearns, and S. Solla, editors, Advances in Neural Information Processing Systems, pages 943-949. MIT Press, Cambridge, 1998.
-
(1998)
Advances in Neural Information Processing Systems
, pp. 943-949
-
-
Ryan, J.1
Lin, M.-J.2
Miikkulainen, R.3
-
10
-
-
85132011160
-
An application of a recurrent network to an intrusion detection
-
Baltimore
-
H. Debar and B. Dorizzi. An application of a recurrent network to an intrusion detection. In Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 1992), Baltimore, volume 2, pages 478-483, 1992.
-
(1992)
Proc. of the Int. Joint Conf. on Neural Networks (IJCNN
, vol.2
, pp. 478-483
-
-
Debar, H.1
Dorizzi, B.2
-
11
-
-
27144507060
-
Intrusion detection in computer networks with neural and fuzzy classifiers. In Artificial Neural Networks and Neural Information Processing - ICANN/ICONIP 2003, Istanbul
-
A. Hofmann, C. Schmitz, and B. Sick. Intrusion detection in computer networks with neural and fuzzy classifiers. In Artificial Neural Networks and Neural Information Processing - ICANN/ICONIP 2003, Istanbul, Springer LNCS 2714, pages 316-324, 2003
-
(2003)
Springer LNCS
, vol.2714
, pp. 316-324
-
-
Hofmann, A.1
Schmitz, C.2
Sick, B.3
-
12
-
-
0033683805
-
A computer host-based user anomaly detection system using the self-organizing map
-
Como
-
A. J. Hoglund, K. Hatonen, and A. S. Sorvari. A computer host-based user anomaly detection system using the self-organizing map. In Proc. of the IEEE-INNS-ENNS Int. Joint Conf. on Neural Networks (IJCNN 2000), Como, volume 5, pages 411-416, 2000.
-
(2000)
Proc. of the IEEE-INNS-ENNS Int. Joint Conf. on Neural Networks (IJCNN
, vol.5
, pp. 411-416
-
-
Hoglund, A.J.1
Hatonen, K.2
Sorvari, A.S.3
-
14
-
-
0033362601
-
Evolving artificial neural networks
-
September
-
X. Yao, "Evolving artificial neural networks," Proceedings of the IEEE, 87(9):1423-1447, September 1999.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.9
, pp. 1423-1447
-
-
Yao, X.1
-
16
-
-
57849094144
-
-
http://www.sigkdd.org/kdd/l 999/tutorials/
-
-
-
-
17
-
-
33745163595
-
Learning intrusion detection: Supervised or unsupervised? Image Analysis and Processing - ICIAP 2005
-
September
-
P. Laskov, P. Düssel, C. Schäfer, K. Rieck. Learning intrusion detection: supervised or unsupervised? Image Analysis and Processing - ICIAP 2005, 13th International Conference, 50-57, September 2005.
-
(2005)
13th International Conference
, pp. 50-57
-
-
Laskov, P.1
Düssel, P.2
Schäfer, C.3
Rieck, K.4
|