-
1
-
-
45149097329
-
International Conference on Wavelet Analysis and Pattern Recognition 2007(ICWAPR'07)
-
Pagess, Nov
-
Y. LI, and Z. WANG. An Intrusion Detection Method Based on SVM and LPCA. International Conference on Wavelet Analysis and Pattern Recognition 2007(ICWAPR'07), Pages(s): 1462-1466, 2-4 Nov. 2007.
-
(2007)
, vol.1462-1466
, Issue.2-4
-
-
LI, Y.1
WANG, Z.2
-
2
-
-
40649085584
-
Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods
-
Pages, July 16-21
-
A. Tamilarasan, S. Mukkamala, A. Sung, and K. Yendrapalli. Feature Ranking and Selection for Intrusion Detection Using Artificial Neural Networks and Statistical Methods. 2006 International Joint Conference on Neural Networks (IJCNN'06), Page(s):4754 - 4761, July 16-21, 2006.
-
(2006)
2006 International Joint Conference on Neural Networks (IJCNN'06)
, pp. 4754-4761
-
-
Tamilarasan, A.1
Mukkamala, S.2
Sung, A.3
Yendrapalli, K.4
-
3
-
-
34547610174
-
Building Efficient Intrusion Detection Model Based on Principal Component Analysis and C4.5
-
Pages, Nov
-
Y. Chen', Y. Li, X. Cheng, and L. Guo. Building Efficient Intrusion Detection Model Based on Principal Component Analysis and C4.5. International Conference on Communication Technology, 2006 (ICCT'06), Page(s): 1-4, Nov. 2006.
-
(2006)
International Conference on Communication Technology, 2006 (ICCT'06)
, pp. 1-4
-
-
Chen', Y.1
Li, Y.2
Cheng, X.3
Guo, L.4
-
7
-
-
77951492756
-
Feature Selection for Intrusion Detection using Neural Networks and Support Vector Machines. Technical Report
-
Unpublished paper
-
S. Mukkamalal and A. Sung. Feature Selection for Intrusion Detection using Neural Networks and Support Vector Machines. Technical Report, Unpublished paper.
-
-
-
Mukkamalal, S.1
Sung, A.2
-
8
-
-
84943383590
-
Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks
-
Pages, 27-31 Jan
-
Andrew H. Sung, Srinivas Mukkamala. Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks. Symposium on Application and Internet (SAINT'03), Page(s): 209- 216, 27-31 Jan. 2003.
-
(2003)
Symposium on Application and Internet (SAINT'03)
, pp. 209-216
-
-
Sung, A.H.1
Mukkamala, S.2
-
9
-
-
33745122959
-
The Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2005, (PDCAT'05
-
Pages, 05-08 Dec
-
Khaja Mohammad Shazzad, Jong Sou Park. Optimization of Intrusion Detection through Fast Hybrid Feature Selection. The Sixth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2005, (PDCAT'05), Page(s): 264 - 267, 05-08 Dec, 2005.
-
(2005)
, vol.264
, pp. 267
-
-
Mohammad Shazzad, K.1
Sou Park, J.2
-
10
-
-
15744380176
-
A Framework for Countering Denial of Service Attacks
-
Man and Cybernetics, Pages, 10-13 Oct
-
S. Mukkamala and A. Sung. A Framework for Countering Denial of Service Attacks. 2004 IEEE International Conference on Systems, Man and Cybernetics, Page(s): 3273 - 3278, 10-13 Oct. 2004.
-
(2004)
2004 IEEE International Conference on Systems
, pp. 3273-3278
-
-
Mukkamala, S.1
Sung, A.2
-
11
-
-
10944257572
-
Feature Selection for Intrusion Detection: An Evolutionary Wrapper Approach. 2004
-
Pages, 25-29 July
-
A. Hofmann,T. Horeis, and B. Sick. Feature Selection for Intrusion Detection: An Evolutionary Wrapper Approach. 2004 IEEE International Joint Conference on Neural Networks, Page(s): 1563- 1568, 25-29 July 2004.
-
(2004)
IEEE International Joint Conference on Neural Networks
, pp. 1563-1568
-
-
Hofmann, A.1
Horeis, T.2
Sick, B.3
-
12
-
-
33646390798
-
Genetic Algorithm to Improve SVM Based Network Intrusion Detection System
-
Pages, 28-30 March
-
D. Kim, H. Nguyen, and J. Park. Genetic Algorithm to Improve SVM Based Network Intrusion Detection System. 19th International Conference on Advanced Information Networking and Applications, 2005 (AINA 2005), 2005 Page(s): 155 - 158, 28-30 March 2005.
-
(2005)
19th International Conference on Advanced Information Networking and Applications, 2005 (AINA 2005)
, pp. 155-158
-
-
Kim, D.1
Nguyen, H.2
Park, J.3
-
13
-
-
51749106573
-
Dimensionality Reduction and Attack Recognition using Neural Network Approaches
-
Pages, 12-17 Aug
-
V. Golovko, L. Vaitsekhovich, P. Kochurko and U. Rubanau. Dimensionality Reduction and Attack Recognition using Neural Network Approaches. International Joint Conference on Neural Networks, 2007, Page(s): 2734-2739, 12-17 Aug. 2007.
-
(2007)
International Joint Conference on Neural Networks
, pp. 2734-2739
-
-
Golovko, V.1
Vaitsekhovich, L.2
Kochurko, P.3
Rubanau, U.4
-
14
-
-
84870480277
-
Weighted Feature Extraction using a Genetic Algorithm for Intrusion Detection
-
Pages, 8-12 Dec
-
M. Middlemiss and G. Dick. Weighted Feature Extraction using a Genetic Algorithm for Intrusion Detection. The 2003 Congress on Evolutionary Computation (CEC'03), Page(s): 1669- 1675, 8-12 Dec. 2003.
-
(2003)
The 2003 Congress on Evolutionary Computation (CEC'03)
, pp. 1669-1675
-
-
Middlemiss, M.1
Dick, G.2
-
16
-
-
63749120226
-
Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms
-
Pages, October 31
-
T. Chou, K. Yen, and J. Luo. Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms. International Journal of Computational Intelligence, Page(s): 196-208, October 31, 2007.
-
(2007)
International Journal of Computational Intelligence
, pp. 196-208
-
-
Chou, T.1
Yen, K.2
Luo, J.3
-
18
-
-
0036161259
-
-
I. Guyon, J. Weston, S. Barnhill, M.D. and V. Vapnik. Gene Selection for Cancer Classification using Support Vector Machines, Journal, Springer Netherlands, Page(s): 389-422, October 31, 2004.
-
I. Guyon, J. Weston, S. Barnhill, M.D. and V. Vapnik. Gene Selection for Cancer Classification using Support Vector Machines, Journal, Springer Netherlands, Page(s): 389-422, October 31, 2004.
-
-
-
-
19
-
-
84869266772
-
-
http://www.ll.mit.edu/mission/communications/ist/index.html
-
-
-
-
20
-
-
84942785917
-
-
M. Dash, H. Liu, and H. Motoda. Consistency Based Feature Selection. Lecture Notes In Computer Science, 4th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Pages: 98 - 109, 2000.
-
M. Dash, H. Liu, and H. Motoda. Consistency Based Feature Selection. Lecture Notes In Computer Science, 4th Pacific-Asia Conference on Knowledge Discovery and Data Mining, Pages: 98 - 109, 2000.
-
-
-
-
21
-
-
34548758354
-
Ant Colony Optimization Based Network Intrusion Feature Selection and Detection
-
Guangzhou, Pages, August
-
H. Gao, H. Yang, X. Wang. Ant Colony Optimization Based Network Intrusion Feature Selection and Detection. The Fourth International Conference on Machine Learning and Cybernetics, Guangzhou, Page(s): 18-21, August 2005.
-
(2005)
The Fourth International Conference on Machine Learning and Cybernetics
, pp. 18-21
-
-
Gao, H.1
Yang, H.2
Wang, X.3
-
22
-
-
0141593896
-
Evolutionary Optimization of Radial Basis Function Networks for Intrusion Detection
-
Pages, 20-24 July
-
A. Hofmann and B. Sick. Evolutionary Optimization of Radial Basis Function Networks for Intrusion Detection. The international Joint Conference on Neural Networks, Page(s): 415- 420, 20-24 July 2003.
-
(2003)
The international Joint Conference on Neural Networks
, pp. 415-420
-
-
Hofmann, A.1
Sick, B.2
-
25
-
-
84958740656
-
-
M. Fugate and J. Gattiker. Anomaly Detection Enhanced Classification in Computer Intrusion Detection. Lecture Notes In Computer Science, The First International Workshop on Pattern Recognition with Support Vector Machines, Page(s): 186 - 197, 2002.
-
M. Fugate and J. Gattiker. Anomaly Detection Enhanced Classification in Computer Intrusion Detection. Lecture Notes In Computer Science, The First International Workshop on Pattern Recognition with Support Vector Machines, Page(s): 186 - 197, 2002.
-
-
-
-
26
-
-
0036085392
-
The 2002 International Joint Conference on Neural Network
-
PageS, 2002
-
S. Mukkamala, G. Janoski, and A. Sung. Intrusion Detection using Neural Networks and Support Vector Machines. The 2002 International Joint Conference on Neural Network, Page(S): 1702-1707, 2002.
-
(1702)
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
27
-
-
63749128933
-
Statistical Learning Theory and Support Vector Machines
-
A. Smola. Statistical Learning Theory and Support Vector Machines. Technical Report, IEEE 2001.
-
(2001)
Technical Report, IEEE
-
-
Smola, A.1
-
28
-
-
63749115703
-
-
P. Tillapart, Th. Thumthawatworn and P. Santiprabhob. Fuzzy Intrusion Detection System. AU J.T. 6(2): 109-114, Oct. 2002.
-
P. Tillapart, Th. Thumthawatworn and P. Santiprabhob. Fuzzy Intrusion Detection System. AU J.T. 6(2): 109-114, Oct. 2002.
-
-
-
-
32
-
-
33847288076
-
Using Genetic Algorithm for Network Intrusion Detection
-
Department of Computer Science and Engineering, Mississippi State University
-
W. Li. Using Genetic Algorithm for Network Intrusion Detection. Unpublished technical report. Department of Computer Science and Engineering, Mississippi State University. http://www.security.cse.msstate.edu/docs/ Publications/wli/DOECSG200 4.pdf.
-
Unpublished technical report
-
-
Li, W.1
-
33
-
-
6344260530
-
The Research and Implementation of Intelligent Intrusion Detection System Based on Artificial Neural Network
-
Shanghai, Pages, Aug
-
J. Li, G. Zhang, and G. Gu. The Research and Implementation of Intelligent Intrusion Detection System Based on Artificial Neural Network. IEEE Proceedings of the Third International Conference on Machine Laming and Cybernetics, Shanghai, Page(s):3178 - 3182 Vol.5, Aug. 2004.
-
(2004)
IEEE Proceedings of the Third International Conference on Machine Laming and Cybernetics
, vol.5
, pp. 3178-3182
-
-
Li, J.1
Zhang, G.2
Gu, G.3
-
34
-
-
15944375471
-
Intrusion detection using hierarchical neural networks
-
Pages, 16 February
-
C. Zhang, J. Jiang, and M. Kamel. Intrusion detection using hierarchical neural networks. Pattern Recognition Letters 26, Page(s): 779-791, 16 February 2004.
-
(2004)
Pattern Recognition Letters
, vol.26
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
35
-
-
10944244572
-
A Neural Network Application for Attack Detection in Computer Networks
-
Pages, July
-
L. Silva, A. Santos, J. Silva, and A. Montes. A Neural Network Application for Attack Detection in Computer Networks. IEEE International Joint Conference on Neural Network, 25-29, Page(s):1569 -1574 Vol.2, July 2004.
-
(2004)
IEEE International Joint Conference on Neural Network
, vol.2
-
-
Silva, L.1
Santos, A.2
Silva, J.3
Montes, A.4
-
36
-
-
0242408742
-
Artificial Intelligent Techniques for Intrusion Detection.
-
Man, and Cybernetics, Pages
-
S. Mukkamala and A. Sung. Artificial Intelligent Techniques for Intrusion Detection. . IEEE International Conference Systems, Man, and Cybernetics, 2003, Page(s): 1266-1271, 2003.
-
(2003)
IEEE International Conference Systems
, pp. 1266-1271
-
-
Mukkamala, S.1
Sung, A.2
-
37
-
-
11144275989
-
Support Vector Classifiers and Network Intrusion Detection
-
Pages, 25-29 July
-
J. Mill and A. Tnoue. Support Vector Classifiers and Network Intrusion Detection. 2004 IEEE International Conference on Fuzzy Systems, Page(s): 407- 410, 25-29 July 2004.
-
(2004)
2004 IEEE International Conference on Fuzzy Systems
, pp. 407-410
-
-
Mill, J.1
Tnoue, A.2
-
38
-
-
1542284996
-
Improving One-Class Svm For Anomaly Detection
-
Pages, 2-5 Nov
-
K. Li, H. Huang, Sh. Tian I, and W. Xu. Improving One-Class Svm For Anomaly Detection. The Second International Conference on Machine Learning and Cybernetics, Page(s): 3077- 3081, 2-5 Nov. 2003.
-
(2003)
The Second International Conference on Machine Learning and Cybernetics
, pp. 3077-3081
-
-
Li, K.1
Huang, H.2
Sh3
Tian, I.4
Xu, W.5
-
39
-
-
0037860750
-
Detecting Denial of Service Attacks Using Support Vector MachinesS
-
Pages, 25-28 May
-
Mukkamala, and A.Sung. Detecting Denial of Service Attacks Using Support Vector MachinesS. The 12th IEEE International Conference on Fuzzy Systems, 2003, Page(s): 1231 - 1236, 25-28 May 2003.
-
(2003)
The 12th IEEE International Conference on Fuzzy Systems
, pp. 1231-1236
-
-
Mukkamala1
Sung, A.2
-
40
-
-
63749099444
-
-
N. Cristianini. Support Vector and Kernel Machines. BIOwulf Technologies, Tutorial, UCML-2001.
-
N. Cristianini. Support Vector and Kernel Machines. BIOwulf Technologies, Tutorial, UCML-2001.
-
-
-
|