-
1
-
-
2442424268
-
Naive bayes vs decision trees in intrusion detection systems
-
New York. NY, USA, ACM
-
Nahla Ben Amor, Salem Benferhat, and Zied Elouedi, Naive bayes vs decision trees in intrusion detection systems. In SAC'04: Proceedings of the 2004 ACM symposium on Applied computing, pages 420-424, New York. NY, USA, 2004. ACM.
-
(2004)
SAC'04: Proceedings of the 2004 ACM symposium on Applied computing
, pp. 420-424
-
-
Ben Amor, N.1
Benferhat, S.2
Elouedi, Z.3
-
2
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Technical Report 99-15. Chalmers Univ, March
-
Stefan Axelsson. Intrusion detection systems: A survey and taxonomy. Technical Report 99-15. Chalmers Univ.. March 2000.
-
(2000)
-
-
Axelsson, S.1
-
5
-
-
58049117116
-
Classification features for detecting serverside and client-side web attacks
-
Milan. Italy
-
S. Benferhat and K. Tabia. Classification features for detecting serverside and client-side web attacks. In SEC2008 : 23rd International Security Conference. Milan. Italy, 2008.
-
(2008)
SEC2008 : 23rd International Security Conference
-
-
Benferhat, S.1
Tabia, K.2
-
6
-
-
33847218306
-
On the combination of naive bayes and decision trees for intrusion detection
-
Salem Benferhat and Karim Tabia. On the combination of naive bayes and decision trees for intrusion detection. In CIMCA05, pages 211-216, 2005.
-
(2005)
CIMCA05
, pp. 211-216
-
-
Benferhat, S.1
Tabia, K.2
-
8
-
-
60649091232
-
Detecting known and novel network intrusion
-
Sweden
-
Yacine Bouzida and Frédéric Cupens. Detecting known and novel network intrusion. In 21st IFIP international information security conference, 22-24 may, Karlstad University, Karlstad, Sweden, 2006.
-
(2006)
21st IFIP international information security conference, 22-24 may, Karlstad University, Karlstad
-
-
Bouzida, Y.1
Cupens, F.2
-
9
-
-
0003802343
-
-
Wadsworth and Brooks, Monterey, CA
-
L. Breiman, J. Friedman, R. Olshen, and C. Stone. Classification and Regression Trees. Wadsworth and Brooks, Monterey, CA, 1984.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.2
Olshen, R.3
Stone, C.4
-
10
-
-
0038428854
-
Results of the kdd'99 classifier learning
-
Charles Elkan. Results of the kdd'99 classifier learning. SIGKDD Explorations. 1 (2):63-64, 2000.
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
11
-
-
38149142569
-
Comparing anomaly detection techniques for http
-
Kenneth L. Ingham and Hajime Inoue. Comparing anomaly detection techniques for http. In RAID, pages 42-62, 2007.
-
(2007)
RAID
, pp. 42-62
-
-
Ingham, K.L.1
Inoue, H.2
-
13
-
-
0034301517
-
The 1999 darpa off-line intrusion detection evaluation
-
Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, and Kumar Das. The 1999 darpa off-line intrusion detection evaluation. Comput. Networks, 34 (4):579-595, 2000.
-
(2000)
Comput. Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
15
-
-
33744584654
-
Induction of decision trees
-
J. R. Quinlan. Induction of decision trees. Much. Learn., 1 (1), 1986.
-
(1986)
Much. Learn
, vol.1
, Issue.1
-
-
Quinlan, J.R.1
-
16
-
-
60649108144
-
-
J. Ross Quinlan. C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc.. San Francisco. CA. USA. 1993.
-
J. Ross Quinlan. C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc.. San Francisco. CA. USA. 1993.
-
-
-
-
17
-
-
0018015137
-
Modelling by the shortest data description
-
J Rissanen. Modelling by the shortest data description. Automatica, 14:465-471, 1978.
-
(1978)
Automatica
, vol.14
, pp. 465-471
-
-
Rissanen, J.1
-
18
-
-
60649105255
-
-
Abdallah Abbey Sebyala, Temitope Olukemi, and Lionel Sacks. Active platform security through intrusion detection using naive bayesian network for anomaly detection. In Proceedings of the London Communications Symposium 2002, 2002.
-
Abdallah Abbey Sebyala, Temitope Olukemi, and Lionel Sacks. Active platform security through intrusion detection using naive bayesian network for anomaly detection. In Proceedings of the London Communications Symposium 2002, 2002.
-
-
-
-
20
-
-
21644481499
-
A serial combination of anomaly and misuse idses applied to http traffic
-
Elvis Tombini, Herve Debar, Ludovic Me, and Mireille Ducasse. A serial combination of anomaly and misuse idses applied to http traffic. In ACSAC'04: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC04), pages 428-437, 2004.
-
(2004)
ACSAC'04: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC04)
, pp. 428-437
-
-
Tombini, E.1
Debar, H.2
Me, L.3
Ducasse, M.4
-
21
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
Alfonso Valdes and Keith Skinner. Adaptive, model-based monitoring for cyber attack detection. In Recent Advances in Intrusion Detection, pages 80-92, 2000.
-
(2000)
Recent Advances in Intrusion Detection
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
|