-
1
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Srilatha Chebrolu, Ajith Abraham, Johnson P. Thomas, "Feature deduction and ensemble design of intrusion detection systems", Computers & Security, 24, 295e307, 2005.
-
(2005)
Computers & Security
, vol.24
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
2
-
-
10244261530
-
EWMA forecast of normal system activity for computer intrusion Detection
-
Dec.
-
Nong Ye, Qiang Chen, Borror, CM., "EWMA forecast of normal system activity for computer intrusion Detection," IEEE Transactions on Reliability, Volume 53, Issue 4, Page(s):557 - 566, Dec. 2004.
-
(2004)
IEEE Transactions on Reliability
, vol.53
, Issue.4
, pp. 557-566
-
-
Ye, N.1
Chen, Q.2
Borror, C.M.3
-
3
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Chalmers University of Technology, Sweden. March
-
Axelsson S. Intrusion detection systems: a survey and taxonomy. Technical report no. 99-15, Department of Computer Engineering, Chalmers University of Technology, Sweden. March 2000.
-
(2000)
Technical Report No. 99-15, Department of Computer Engineering
-
-
Axelsson, S.1
-
4
-
-
33847144165
-
Artificial intelligence techniques applied to intrusion detection
-
Dec. 2005
-
Idris, N.B., Shanmugam, B., "Artificial Intelligence Techniques Applied to Intrusion Detection," Annual IEEE INDICON, 2005 11-13, Page(s):52 - 55, Dec. 2005.
-
(2005)
Annual IEEE INDICON
, vol.11-13
, pp. 52-55
-
-
Idris, N.B.1
Shanmugam, B.2
-
5
-
-
0036588773
-
Incorporating soft computing techniques into a probabilistic intrusion detection system
-
May
-
Sung-Bae Cho, "Incorporating soft computing techniques into a probabilistic intrusion detection system," IEEE Transactions on Systems, Man and Cybernetics, Part C, Volume 32, Issue 2, ,Page(s):154-160, May 2002.
-
(2002)
IEEE Transactions on Systems, Man and Cybernetics, Part C
, vol.32
, Issue.2
, pp. 154-160
-
-
Cho, S.-B.1
-
6
-
-
33745139496
-
Intrusion detection combining multiple decision trees by fuzzy logic
-
05-08 Dec.
-
Jun-feng Tian, Yue Fu, Ying Xu, Jian-ling Wang, "Intrusion Detection Combining Multiple Decision Trees by Fuzzy Logic," Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, Page(s):256 - 258, 05-08 Dec. 2005.
-
(2005)
Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies
, pp. 256-258
-
-
Tian, J.-F.1
Fu, Y.2
Xu, Y.3
Wang, J.-L.4
-
7
-
-
2942533003
-
SAD: Web session anomaly detection based on parameter estimation
-
June
-
Cho S. Cha S, "SAD: web session anomaly detection based on parameter estimation", Computers & Security, Vol.23, No.4, pp.265-351, June 2004.
-
(2004)
Computers & Security
, vol.23
, Issue.4
, pp. 265-351
-
-
Cho, S.1
Cha, S.2
-
8
-
-
28444441282
-
Ant colony optimization based network intrusion feature selection and detection
-
Guangzhou, 18-21 August
-
Hai-Hua Gao, Hui-Hua Yang, Xing-Yu Wang, "Ant Colony Optimization Based Network Intrusion Feature Selection and Detection", Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 18-21 August 2005.
-
(2005)
Proceedings of the Fourth International Conference on Machine Learning and Cybernetics
-
-
Gao, H.-H.1
Yang, H.-H.2
Wang, X.-Y.3
-
9
-
-
33750512162
-
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
-
T. Ozyer, R. Alhajj, K. Barker, "Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening," Journal of Network and Computer Applications 30, pp. 99-113, 2007.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, pp. 99-113
-
-
Ozyer, T.1
Alhajj, R.2
Barker, K.3
-
10
-
-
33750528950
-
Intrusion detection using a fuzzy genetics-based learning algorithm
-
M. Saniee Abadeh, J. Ffabibi, and C. Lucas, "Intrusion Detection Using a Fuzzy Genetics-Based Learning Algorithm," Journal of Network and Computer Applications, 414-428, 2007.
-
(2007)
Journal of Network and Computer Applications
, pp. 414-428
-
-
Saniee Abadeh, M.1
Ffabibi, J.2
Lucas, C.3
-
11
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson, "The base-rate fallacy and the difficulty of intrusion detection," ACM Trans. Informat. Syst. Security 3 (3), pp. 186-205, 2000.
-
(2000)
ACM Trans. Informat. Syst. Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
13
-
-
28444457043
-
An unsupervised anomaly intrusion detection algorithm based on swarm intelligence
-
Guangzhou, 18-21 August
-
Yong Feng, Zhong-Fu Wu, Kai-Gui Wu, Zhong-Yang Xiong, Ying Zhou, "An Unsupervised Anomaly Intrusion Detection Algorithm Based On Swarm Intelligence", Proceedings of the Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, 18-21 August 2005.
-
(2005)
Proceedings of the Fourth International Conference on Machine Learning and Cybernetics
-
-
Feng, Y.1
Wu, Z.-F.2
Wu, K.-G.3
Xiong, Z.-Y.4
Zhou, Y.5
-
15
-
-
84873993999
-
-
KDD-cup data set: http://kdd.ics.uci.edu/databases/kddcup99/task.html.
-
KDD-cup Data Set
-
-
-
16
-
-
35548992415
-
A parallel genetic local search algorithm for intrusion detection in computer networks
-
to be appeared in
-
M. Saniee Abadeh, J. Habibi, Z. Barzegar, M. Sergi, "A Parallel Genetic Local Search Algorithm for Intrusion Detection in Computer Networks", to be appeared in International Scientific Journal Engineering Applications of Artificial Intelligence, 2007.
-
(2007)
International Scientific Journal Engineering Applications of Artificial Intelligence
-
-
Abadeh, M.S.1
Habibi, J.2
Barzegar, Z.3
Sergi, M.4
-
17
-
-
0002197262
-
Distributed representation of fuzzy rules and its application to pattern classification
-
H. Ishibuchi, K. Nozaki, and H. Tanaka, "Distributed representation of fuzzy rules and its application to pattern classification," Fuzzy Sets and Systems, 52(1), pp. 21-32, 1992.
-
(1992)
Fuzzy Sets and Systems
, vol.52
, Issue.1
, pp. 21-32
-
-
Ishibuchi, H.1
Nozaki, K.2
Tanaka, H.3
-
18
-
-
0033329971
-
Improving the performance of fuzzy classifier systems for pattern classification problems with continuous attributes
-
Dec.
-
H. Ishibuchi, and T. Nakashima, "Improving the Performance of Fuzzy Classifier Systems for Pattern Classification Problems with Continuous Attributes", IEEE Transactions on Industrial Electronics, vol. 46, no. 6, Dec, 1999.
-
(1999)
IEEE Transactions on Industrial Electronics
, vol.46
, Issue.6
-
-
Ishibuchi, H.1
Nakashima, T.2
-
20
-
-
0004050245
-
-
Chap. Specific Acquired Immunity, Pub. Blackwell Science
-
Roitt, I., Essential Immunology: 9th Edition. Chap. Specific Acquired Immunity, pp. 22-39. Pub. Blackwell Science, 1997
-
(1997)
Essential Immunology: 9th Edition
, pp. 22-39
-
-
Roitt, I.1
-
21
-
-
0027434805
-
Somatic hypermutation in b-cells : An optimal control treatment
-
Kepler, T and Perelson, A., Somatic Hypermutation in B-cells : An Optimal Control Treatment. Journal of Theoretical Biology. 164. pp. 37-64, 1993.
-
(1993)
Journal of Theoretical Biology
, vol.164
, pp. 37-64
-
-
Kepler, T.1
Perelson, A.2
-
23
-
-
0015956495
-
Towards a network theory of the immune system
-
Jerne, N, "Towards a network theory of the immune system," Annals of Immunology (Inst.Pasteur). 125C. pp. 373 389, 1974.
-
(1974)
Annals of Immunology (Inst.Pasteur)
, vol.125 C
, pp. 373-389
-
-
Jerne, N.1
-
24
-
-
0034023975
-
An artificial immune system for data analysis
-
Timmis, J, Neal, M and Hunt, J., "An Artificial Immune System for Data Analysis," Biosystems. 55(1/3), pp. 143-150, 2000.
-
(2000)
Biosystems.
, vol.55
, Issue.1-3
, pp. 143-150
-
-
Timmis, J.1
Neal, M.2
Hunt, J.3
|