-
1
-
-
63249134846
-
-
DARPA Intrusion Detection Evaluation
-
DARPA Intrusion Detection Evaluation, http://www.ll.mit.edu/IST/ideval/ docs/docs-index.html, 1999.
-
(1999)
-
-
-
2
-
-
0032676506
-
A Data Mining Framework for Building Intrusion Detection Models
-
W. Lee, S. Stolfo, K. Mok, "A Data Mining Framework for Building Intrusion Detection Models", Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
7
-
-
0003846041
-
A Tutorial on Learning With Bayesian Networks, Microsoft Research
-
Technical Report MSRTR-95-06, March
-
D. Heckerman, A Tutorial on Learning With Bayesian Networks, Microsoft Research, Technical Report MSRTR-95-06, March 1995.
-
(1995)
-
-
Heckerman, D.1
-
8
-
-
63249108352
-
-
J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, 1993.
-
J. R. Quinlan. C4.5: Programs for Machine Learning. Morgan Kaufmann Publishers, 1993.
-
-
-
-
9
-
-
63249125123
-
-
KDD Cup 1999 data (network intrusion detection): http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.ht ml.
-
KDD Cup 1999 data (network intrusion detection): http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.ht ml.
-
-
-
-
10
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
M. Shyu, S. Chen, K. Sarinnapakorn, L. Chang, A novel anomaly detection scheme based on principal component classifier, pp. 172-179, ICDM workshop 2003.
-
(2003)
ICDM workshop
, pp. 172-179
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
11
-
-
17444432965
-
Hierarchical Kohonenen net for anomaly detection in network security
-
S.T. Sarasamma, Q.A. Zhu and J. Huff, Hierarchical Kohonenen net for anomaly detection in network security, IEEE Transactions on Systems, Man and Cybernetics, Part B, vol. 35, no.2, pp. 302-312, 2005.
-
(2005)
IEEE Transactions on Systems, Man and Cybernetics, Part B
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
12
-
-
37049002837
-
Processing of Massive Audit Data Streams for Real-Time Anomaly Intrusion Detection
-
W. Wang, X. Guan and X. Zhang, "Processing of Massive Audit Data Streams for Real-Time Anomaly Intrusion Detection". Computer Communications, vol. 31, no. 1, pp. 58-72, 2008.
-
(2008)
Computer Communications
, vol.31
, Issue.1
, pp. 58-72
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
13
-
-
63249099471
-
Building multiple behavioral models for network intrusion identification
-
W. Wang, S. Gombault, A. Bsila, "Building multiple behavioral models for network intrusion identification". 2nd IEEE Workshop on Monitoring, Attack Detection and Mitigation, pp. 31-36, 2007.
-
(2007)
2nd IEEE Workshop on Monitoring, Attack Detection and Mitigation
, pp. 31-36
-
-
Wang, W.1
Gombault, S.2
Bsila, A.3
-
15
-
-
51849104745
-
Towards Fast Detecting Intrusions: Using Key Attributes of Network Traffic
-
IEEE Computer society press, Bucharest, Romania, June 29, July 5
-
W. Wang, S. Gombault, and T. Guyet. "Towards Fast Detecting Intrusions: Using Key Attributes of Network Traffic". The Third International Conference on Internet Monitoring and Protection (ICIMP2008), IEEE Computer society press, Bucharest, Romania, June 29 - July 5, 2008.
-
(2008)
The Third International Conference on Internet Monitoring and Protection (ICIMP2008)
-
-
Wang, W.1
Gombault, S.2
Guyet, T.3
-
16
-
-
84943383590
-
Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks
-
A. H. Sung, S. Mukkamala, "Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks", Symposium on Applications and the Internet, 2003.
-
(2003)
Symposium on Applications and the Internet
-
-
Sung, A.H.1
Mukkamala, S.2
|