-
2
-
-
27544512530
-
Data Mining for Intrusion Detection: A Critical Review
-
Kluwer Academic Publisher, Boston
-
K. Julisch, "Data Mining for Intrusion Detection: A Critical Review", Applications of Data Mining in Computer Security, Kluwer Academic Publisher, Boston, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Julisch, K.1
-
3
-
-
26844574201
-
Applying Data Mining To Intrusion Detection: The Quest For Automation, Efficiency, And Credibility
-
December
-
W. Lee, "Applying Data Mining To Intrusion Detection: The Quest For Automation, Efficiency, And Credibility", SIGKDD Explorations, Volume 4, Issue 2, December 2002.
-
(2002)
SIGKDD Explorations
, vol.4
, Issue.2
-
-
Lee, W.1
-
4
-
-
33746558025
-
Detection and Summarization of Novel Network Attacks Using Data Mining
-
Technical Report
-
L. Ertöz, E. Eilertson, A. Lazarevic, P. Tan, P. Dokas, V. Kumar, and J. Srivastava, "Detection and Summarization of Novel Network Attacks Using Data Mining", Technical Report, 2003.
-
(2003)
-
-
Ertöz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.4
Dokas, P.5
Kumar, V.6
Srivastava, J.7
-
5
-
-
0242637516
-
Adaptive Intrusion Detection With Data Mining
-
Washington, D.C, October
-
M. Hossain and S. M. Bridges, "Adaptive Intrusion Detection With Data Mining", In Proceedings of the 2003 IEEE international conference on systems, man & cybernetics (SMC'03) Washington, D.C., October 2003.
-
(2003)
Proceedings of the 2003 IEEE international conference on systems, man & cybernetics (SMC'03)
-
-
Hossain, M.1
Bridges, S.M.2
-
6
-
-
84964411176
-
Real Time Data Mining-based Intrusion Detection
-
June
-
W. Lee, S. Stolfo, P. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, and J. Zhang, "Real Time Data Mining-based Intrusion Detection", In DARPA Information Survivability Conference and Exposition II, June 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition
, vol.2
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
7
-
-
33746507819
-
A Data Mining And CIDF Based Approach For Detecting Novel And Distributed Intrusions
-
October
-
W. Lee, R. A. Nimbalkar, K. K. Yee, S. B. Patil, P. H. Desai, T. T. Tran, and S. J. Stolfo, "A Data Mining And CIDF Based Approach For Detecting Novel And Distributed Intrusions", In Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection, October 2000.
-
(2000)
Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection
-
-
Lee, W.1
Nimbalkar, R.A.2
Yee, K.K.3
Patil, S.B.4
Desai, P.H.5
Tran, T.T.6
Stolfo, S.J.7
-
10
-
-
59249088956
-
-
to be submitted to The First Annual Walter Lincoln Hawkins Graduate Research Conference, Troy, New York, October
-
R. Smith, A. Bivens, M. Embrechts, C. Palagiri, and B. Szymanski, "Clustering Approaches for Anomaly Based Intrusion Detection", to be submitted to The First Annual Walter Lincoln Hawkins Graduate Research Conference, Troy, New York, October 2002.
-
(2002)
Clustering Approaches for Anomaly Based Intrusion Detection
-
-
Smith, R.1
Bivens, A.2
Embrechts, M.3
Palagiri, C.4
Szymanski, B.5
-
11
-
-
3042635764
-
Identifying Outliers via Clustering for Anomaly Detection
-
Technical Report
-
M. H. Arshad and P. K. Chan, "Identifying Outliers via Clustering for Anomaly Detection", Technical Report, 2003.
-
(2003)
-
-
Arshad, M.H.1
Chan, P.K.2
-
13
-
-
0036575196
-
Grid and Dummy Cluster Based Learning of Normal and Intrusive Clusters for Computer Intrusion Detection
-
X. Li and N. Ye, "Grid and Dummy Cluster Based Learning of Normal and Intrusive Clusters for Computer Intrusion Detection", Quality and Reliability Engineering International, Vol. 18, No. 3, 2002.
-
(2002)
Quality and Reliability Engineering International
, vol.18
, Issue.3
-
-
Li, X.1
Ye, N.2
-
15
-
-
0141540496
-
Y-means: A clustering method for Intrusion detection
-
Montreal, Canada, May
-
Y. Guan, N. Belacel, and A. A. Ghorbani, "Y-means: a clustering method for Intrusion detection", Canadian Conference on Electrical and Computer Engineering, Montreal, Canada, May 2003.
-
(2003)
Canadian Conference on Electrical and Computer Engineering
-
-
Guan, Y.1
Belacel, N.2
Ghorbani, A.A.3
-
16
-
-
59249084775
-
-
Lincoln Laboratory ID Evaluation Website, MIT
-
Lincoln Laboratory ID Evaluation Website, MIT, http://www.ll.mit.edu/ IST/ideval/index.html.
-
-
-
-
17
-
-
37249031979
-
New Faster Normalized Neural Networks for Sub-Matrix Detection using Cross Correlation in the Frequency Domain and Matrix Decomposition
-
March
-
H. M. El-Bakry, "New Faster Normalized Neural Networks for Sub-Matrix Detection using Cross Correlation in the Frequency Domain and Matrix Decomposition," Applied Soft Computing journal, vol. 8, issue 2, March 2008, pp. 1131-1149.
-
(2008)
Applied Soft Computing journal
, vol.8
, Issue.2
, pp. 1131-1149
-
-
El-Bakry, H.M.1
-
18
-
-
84968470212
-
An algorithm for the machine calculation of complex Fourier series
-
J. W. Cooley, and J. W. Tukey, "An algorithm for the machine calculation of complex Fourier series," Math. Comput. 19, 297-301 (1965).
-
(1965)
Math. Comput
, vol.19
, pp. 297-301
-
-
Cooley, J.W.1
Tukey, J.W.2
-
20
-
-
33746246442
-
Complex-Valued Neural Networks Theories and Applications
-
Nov
-
A. Hirose, "Complex-Valued Neural Networks Theories and Applications", Series on innovative Intellegence, vol.5. Nov. 2003.
-
(2003)
Series on innovative Intellegence
, vol.5
-
-
Hirose, A.1
-
21
-
-
0001704820
-
Complex-valued Multistate Neural Associative Memory
-
S. Jankowski, A. Lozowski, M. Zurada, " Complex-valued Multistate Neural Associative Memory," IEEE Trans. on Neural Networks, vol.7, 1996, pp.1491-1496.
-
(1996)
IEEE Trans. on Neural Networks
, vol.7
, pp. 1491-1496
-
-
Jankowski, S.1
Lozowski, A.2
Zurada, M.3
-
22
-
-
33847708385
-
An Architecuture for Mining the Egyptian E-Government Network traffic for Intrusion Detection
-
Information Technology Institute, Cairo, Egypt, December
-
A. M. Riad, M. M. Fahmy and M. A. El-Sharkawy, " An Architecuture for Mining the Egyptian E-Government Network traffic for Intrusion Detection", International Conference on Information and Communication Technology (ICICT 2005), pp. 593-603, Information Technology Institute, Cairo, Egypt, December, 2005.
-
(2005)
International Conference on Information and Communication Technology (ICICT
, pp. 593-603
-
-
Riad, A.M.1
Fahmy, M.M.2
El-Sharkawy, M.A.3
-
23
-
-
59249101101
-
Intrusion Detection System Based on Data Mining techniques
-
Cairo Univ, December
-
A. M. Riad and M. M. Fahmy, "Intrusion Detection System Based on Data Mining techniques", Egyption Informatics Journal, Faculty of Computers and Information, Vol. 7, No 2, Cairo Univ., December 2006.
-
(2006)
Egyption Informatics Journal, Faculty of Computers and Information
, vol.7
, Issue.2
-
-
Riad, A.M.1
Fahmy, M.M.2
|