-
1
-
-
0038103911
-
Utilising fuzzy logic and trend analysis for effective intrusion detection
-
M. Botha and R.V. Solms, Utilising fuzzy logic and trend analysis for effective intrusion detection, Computers & Security, pp.423-434, 2003.
-
(2003)
Computers & Security
, pp. 423-434
-
-
Botha, M.1
Solms, R.V.2
-
2
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
S. Mukkamala, Andrew H. Sung and A. Abraham, Intrusion detection using an ensemble of intelligent paradigms, Computer Application, pp.167-182, 2005.
-
(2005)
Computer Application
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
3
-
-
0023294428
-
An intrusion-detection model
-
D. E. Denning, An intrusion-detection model, IEEE Trans. Software Eng., pp.222-232, 1987.
-
(1987)
IEEE Trans. Software Eng
, pp. 222-232
-
-
Denning, D.E.1
-
4
-
-
0037105910
-
Intrusion detection techniques and approaches
-
T. Verwoerd and R. Hunt, Intrusion detection techniques and approaches, Computer Communications, pp.1356-1365, 2002.
-
(2002)
Computer Communications
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
5
-
-
85090433665
-
Snort-lightweight intrusion detection for network
-
Seattle, Washington, pp
-
M. Roesch, Snort-lightweight intrusion detection for network, Proc. of the LISA '99: 13th System Administration Conference, Seattle, Washington, pp.229-238, 1999.
-
(1999)
Proc. of the LISA '99: 13th System Administration Conference
, pp. 229-238
-
-
Roesch, M.1
-
8
-
-
0035879674
-
Intrusion detection through learning behavior model
-
B. Balajinath and S. V. Raghavan, Intrusion detection through learning behavior model, Computer Communications, pp.1202-1212, 2001.
-
(2001)
Computer Communications
, pp. 1202-1212
-
-
Balajinath, B.1
Raghavan, S.V.2
-
10
-
-
21844433474
-
Application of online-training SVMs for real-time intrusion detection with different considerations
-
Z. Zhang and H. Shen, Application of online-training SVMs for real-time intrusion detection with different considerations, Computer Communications, pp. 1428-1442, 2005.
-
(2005)
Computer Communications
, pp. 1428-1442
-
-
Zhang, Z.1
Shen, H.2
-
11
-
-
70349100099
-
Anomaly detection using call stack information
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee and W. Gong, Anomaly detection using call stack information, Proc. of the IEEE Symposium on Security and Privacy, 2003.
-
(2003)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
13
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
Y. Liao and V. Rao Vemuri, Use of K-nearest neighbor classifier for intrusion detection, Computers & Security, pp.439-448, 2002.
-
(2002)
Computers & Security
, pp. 439-448
-
-
Liao, Y.1
Rao Vemuri, V.2
-
14
-
-
48249123309
-
Comparison with fuzzy reasoning and modified TF-IDF in page grouping for the result of web retrieval
-
T. Miyoshi and H. Joichi, Comparison with fuzzy reasoning and modified TF-IDF in page grouping for the result of web retrieval, International Journal of Innovative Computing, Information and Control, vol.3, no.2, pp.307-318, 2007.
-
(2007)
International Journal of Innovative Computing, Information and Control
, vol.3
, Issue.2
, pp. 307-318
-
-
Miyoshi, T.1
Joichi, H.2
-
16
-
-
2342576784
-
Predicting the intrusion intentions by observing system call sequences
-
L. Feng, X. Guan, S. Guo, Y. Gao and P. Liu, Predicting the intrusion intentions by observing system call sequences, Computers & Security, pp.241-252, 2004.
-
(2004)
Computers & Security
, pp. 241-252
-
-
Feng, L.1
Guan, X.2
Guo, S.3
Gao, Y.4
Liu, P.5
-
17
-
-
0442296745
-
Statistical anomaly detection via httpd data analysis
-
D. Q. Naiman, Statistical anomaly detection via httpd data analysis, Computational Statistics & Data Analysis, pp.51-67, 2004.
-
(2004)
Computational Statistics & Data Analysis
, pp. 51-67
-
-
Naiman, D.Q.1
-
18
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D. Y. Yeung and Y. Ding, Host-based intrusion detection using dynamic and static behavioral models, Pattern Recognition, pp.229-243, 2003.
-
(2003)
Pattern Recognition
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
-
20
-
-
0742268832
-
-
H. Y. Kao, S. H. Lin, J. M. Ho and M. S. Chen, Mining web informative structures and contents based on entropy Analysis, IEEE Trans, on Knowledge and Data Engineering, ρp.41-55, 2004.
-
H. Y. Kao, S. H. Lin, J. M. Ho and M. S. Chen, Mining web informative structures and contents based on entropy Analysis, IEEE Trans, on Knowledge and Data Engineering, ρp.41-55, 2004.
-
-
-
-
21
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
O. Depren, M. Topallar, E. Anarim and M. Kemal Ciliz, An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks, Expert Systems with Applications, pp.713-722, 2005.
-
(2005)
Expert Systems with Applications
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Kemal Ciliz, M.4
-
22
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
G. Giacinto, F. Roli and L. Didaci, Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition, pp.1795-1803, 2003.
-
(2003)
Pattern Recognition
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
23
-
-
33646156614
-
Web page classification based on a support vector machine using a weighted vote schema
-
R. C. Chen and C. H. Hsieh, Web page classification based on a support vector machine using a weighted vote schema, Expert System with Applications, vol.31, pp.427-435, 2006.
-
(2006)
Expert System with Applications
, vol.31
, pp. 427-435
-
-
Chen, R.C.1
Hsieh, C.H.2
-
24
-
-
63649129725
-
-
MIT
-
MIT, http://www.ll.mit.edu/IST/ideval/data/1998/1998.dataJndex.html
-
-
-
-
25
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and S. J. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, vol.3, no.4, pp.227-261, 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
26
-
-
63649159289
-
-
C.-C. Chang and C.-J. Lin, LIBSVM - A Library for Support Vector Machines, http://www.csie.ntu.edu.tw/cjlin/libsvm
-
C.-C. Chang and C.-J. Lin, LIBSVM - A Library for Support Vector Machines, http://www.csie.ntu.edu.tw/cjlin/libsvm
-
-
-
-
27
-
-
63649122697
-
-
Website, http://163.17.27.154/dataset.
-
Website
-
-
-
28
-
-
37249033556
-
-
Guide of LIBSVM, http://www.csie.ntu.edu.tw/cjlin/papers/guide/guide.pdf
-
Guide of LIBSVM
-
-
-
30
-
-
37249033556
-
-
Guide of LIBSVM, http://www.csie.ntu.edu.tw/cjlin/libsvm/faq.html
-
Guide of LIBSVM
-
-
|