-
1
-
-
18844370762
-
-
Springer, Berlin, Heidelberg
-
Aickelin U., Greensmith J., and Twycross J. Immune system approaches to intrusion detection - A review (2004), Springer, Berlin, Heidelberg
-
(2004)
Immune system approaches to intrusion detection - A review
-
-
Aickelin, U.1
Greensmith, J.2
Twycross, J.3
-
3
-
-
58349117590
-
-
Anderson, James P. (1980). Computer security threat monitoring and surveillance, technical report, James P. Anderson Co., Fort Washington, Pennsylvania.
-
Anderson, James P. (1980). Computer security threat monitoring and surveillance, technical report, James P. Anderson Co., Fort Washington, Pennsylvania.
-
-
-
-
4
-
-
58349114585
-
-
Bace, Rebecca G. (2002). NIST special publication on intrusion detection systems.
-
Bace, Rebecca G. (2002). NIST special publication on intrusion detection systems.
-
-
-
-
5
-
-
58349113771
-
-
Ben Amor, Nahla, Benferhat Rue, Salem, Elouedi, Zied. (2004). Nai{dotless}̈ve Bayes. vs. decision trees. In: Symposium on applied computing proceedings of the 2004 ACM symposium on applied computing.
-
Ben Amor, Nahla, Benferhat Rue, Salem, Elouedi, Zied. (2004). Nai{dotless}̈ve Bayes. vs. decision trees. In: Symposium on applied computing proceedings of the 2004 ACM symposium on applied computing.
-
-
-
-
6
-
-
58349116763
-
-
Confusion Matrix. .
-
Confusion Matrix. .
-
-
-
-
7
-
-
0023294428
-
-
Dorothy, Denning. 1987. An intrusion detection model. IEEE Transaction on Software Engineering.
-
Dorothy, Denning. 1987. An intrusion detection model. IEEE Transaction on Software Engineering.
-
-
-
-
8
-
-
58349111441
-
-
Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD). http://www.sdl.sri.com/projects/emerald/.
-
Event Monitoring Enabling Responses to Anomalous Live Disturbances (EMERALD). http://www.sdl.sri.com/projects/emerald/.
-
-
-
-
9
-
-
33745441630
-
-
MIT Press
-
Ertoz L., Eilertson E., Lazarevic A., Tan P., Srivastava J., Kumar V., et al. The MINDS - minnesota intrusion detection system. Next generation data mining (2004), MIT Press
-
(2004)
Next generation data mining
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.4
Srivastava, J.5
Kumar, V.6
-
12
-
-
33644860127
-
A clustering-based method for unsupervised intrusion detections
-
Jiang S.Y., et al. A clustering-based method for unsupervised intrusion detections. Pattern Recognition Letters (2006)
-
(2006)
Pattern Recognition Letters
-
-
Jiang, S.Y.1
-
13
-
-
58349112037
-
-
KDD Cup99 Winner. .
-
KDD Cup99 Winner. .
-
-
-
-
14
-
-
58349104486
-
-
Kuo-Hua Yang (2006). Intrusion Detection Systems based on Hybrid Hidden Markov Models and Naïve Bayes Classifiers. National Taiwan University of Science and Technology. URN: etd-0728106-205122. Master thesis.
-
Kuo-Hua Yang (2006). Intrusion Detection Systems based on Hybrid Hidden Markov Models and Naïve Bayes Classifiers. National Taiwan University of Science and Technology. URN: etd-0728106-205122. Master thesis.
-
-
-
-
15
-
-
58349104708
-
-
Libsvm. http://www.csie.ntu.edu.tw/~cjlin/libsvm/.
-
Libsvm. http://www.csie.ntu.edu.tw/~cjlin/libsvm/.
-
-
-
-
16
-
-
33745728475
-
-
Lu, C. -T., Boedihardjo, A. P., Manalwar, P. (2005). Exploiting efficient data mining techniques to enhance intrusion detection systems. in: Information Reuse and Integration, Conf 2005, IRI - 2005 IEEE International Conference on.
-
Lu, C. -T., Boedihardjo, A. P., Manalwar, P. (2005). Exploiting efficient data mining techniques to enhance intrusion detection systems. in: Information Reuse and Integration, Conf 2005, IRI - 2005 IEEE International Conference on.
-
-
-
-
17
-
-
34447280122
-
Network anomaly detection with incomplete audit data
-
Patcha A., and Park J.-M. Network anomaly detection with incomplete audit data. Elsevier Computer Networks 51 13 (2007)
-
(2007)
Elsevier Computer Networks
, vol.51
, Issue.13
-
-
Patcha, A.1
Park, J.-M.2
-
18
-
-
58349088629
-
-
Prelude. .
-
Prelude. .
-
-
-
-
21
-
-
0037105910
-
Intrusion detection techniques and approaches
-
Verwoerd T., and Hunt R. Intrusion detection techniques and approaches. Computer Communications 25 15 (2002) 1356-1365
-
(2002)
Computer Communications
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
22
-
-
58349119277
-
-
Weka. .
-
Weka. .
-
-
-
-
23
-
-
58349096820
-
-
Yu-Shan Hsu (2006). A Hybrid IDS Framework via Decision Trees and SVMs. National Taiwan University of Science and Technology. Master thesis.
-
Yu-Shan Hsu (2006). A Hybrid IDS Framework via Decision Trees and SVMs. National Taiwan University of Science and Technology. Master thesis.
-
-
-
|