-
1
-
-
0009518853
-
A scalable clustering technique for intrusion signature recognition
-
US Military Academy, West Point, NY, 5-6 June
-
N. Ye, X. Li, A scalable clustering technique for intrusion signature recognition, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, US Military Academy, West Point, NY, 5-6 June 2001, pp. 1-4.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
, pp. 1-4
-
-
Ye, N.1
Li, X.2
-
2
-
-
10644266448
-
-
Doctoral dissertation, University of Rennes 1, Rennes, France
-
L. Mé, Audit de Sécurité par Algorithmes Génétique, Doctoral dissertation, University of Rennes 1, Rennes, France, 1994.
-
(1994)
Audit de Sécurité par Algorithmes Génétique
-
-
Mé, L.1
-
3
-
-
77956587752
-
Neural networks vs. decision trees for intrusion detection
-
MonAM, Tuebingen, Germany, 28-29 September
-
Y. Bouzida, F.Cuppens, Neural networks vs. decision trees for intrusion detection, in: IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM), Tuebingen, Germany, 28-29 September 2006.
-
(2006)
IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation
-
-
Bouzida, Y.1
Cuppens, F.2
-
4
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W., and Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3 4 (2000) 227-261
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
5
-
-
0344008570
-
Detecting Novel Attacks by Identifying Anomalous Network Packet Headers
-
Technical Report, Florida Institute of Technology, CS-2001-2
-
M.V. Mahoney, P.K. Chan, Detecting Novel Attacks by Identifying Anomalous Network Packet Headers, Technical Report, Florida Institute of Technology, CS-2001-2, 2001.
-
(2001)
-
-
Mahoney, M.V.1
Chan, P.K.2
-
6
-
-
4544373082
-
Detecting low-profile probes and novel denial-of-service attacks
-
United States Military Academy, West Point, NY, 5-6 June
-
R. Basu et al., Detecting low-profile probes and novel denial-of-service attacks, in: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, 5-6 June 2001.
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
-
-
Basu, R.1
-
7
-
-
10644257876
-
Modelling and solving the intrusion detection problem in computer networks
-
Beghdad R. Modelling and solving the intrusion detection problem in computer networks. Computers & Security Journal 23 8 (2004) 687-696
-
(2004)
Computers & Security Journal
, vol.23
, Issue.8
, pp. 687-696
-
-
Beghdad, R.1
-
8
-
-
61849152530
-
Selecting KDD features and using random classification tree for predicting attacks
-
Beghdad R. Selecting KDD features and using random classification tree for predicting attacks. International Scientific Journal of Computing 6 3 (2007) 115-123
-
(2007)
International Scientific Journal of Computing
, vol.6
, Issue.3
, pp. 115-123
-
-
Beghdad, R.1
-
9
-
-
61849164695
-
-
Available from:, accessed July 2006
-
KDD data set, 1999. Available from: (accessed July 2006).
-
(1999)
-
-
-
10
-
-
0004116989
-
-
MIT Press and McGraw-Hill ISBN 0-262-03293-7. Section 29.3: The simplex algorithm, pp.790-804
-
Cormen T.H., Leiserson C.E., Rivest R.L., and Stein C. Introduction to Algorithms. second ed. (2001), MIT Press and McGraw-Hill ISBN 0-262-03293-7. Section 29.3: The simplex algorithm, pp.790-804
-
(2001)
Introduction to Algorithms. second ed.
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
|