-
1
-
-
0012163225
-
-
Internet System Consortium
-
Internet System Consortium, Internet Domain Survey, http://www.isc.org
-
Internet Domain Survey
-
-
-
2
-
-
34249865012
-
Research on intrusion detection and response: A survey
-
Kabiri, P., Ghorbani, A.A.: Research on intrusion detection and response: A survey. Int. J. on Information Security 1(2), 84-102 (2005)
-
(2005)
Int. J. on Information Security
, vol.1
, Issue.2
, pp. 84-102
-
-
Kabiri, P.1
Ghorbani, A.A.2
-
3
-
-
0346955740
-
-
Alipio, P., Carvalho, P., Neves, J.: Using CLIPS to Detect Network Intrusion. In: Pires, F.M., Abreu, S.P. (eds.) EPIA 2003. LNCS, 2902, pp. 341-354. Springer, Heidelberg (2003)
-
Alipio, P., Carvalho, P., Neves, J.: Using CLIPS to Detect Network Intrusion. In: Pires, F.M., Abreu, S.P. (eds.) EPIA 2003. LNCS, vol. 2902, pp. 341-354. Springer, Heidelberg (2003)
-
-
-
-
4
-
-
84860434876
-
The STAT tool suite
-
IEEE Press, Los Alamitos
-
Vigna, G., Eckman, S., Kemmerer, R.: The STAT tool suite. In: DARPA Information Survivability Conference and Exposition, vol. 2, p. 1046. IEEE Press, Los Alamitos (2000)
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 1046
-
-
Vigna, G.1
Eckman, S.2
Kemmerer, R.3
-
6
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
Mukkamala, S., Sung, A., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. J. of Network and Computer Applications 28, 167-182 (2005)
-
(2005)
J. of Network and Computer Applications
, vol.28
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.2
Abraham, A.3
-
7
-
-
0345028807
-
Event recognition beyond signature and anomaly
-
Doyle, J., Kohane, I., Long,W., Shrobe, H., Szolovits, P.: Event recognition beyond signature and anomaly. In: 2001 IEEEWorkshop on Information Assurance and Security, pp. 170-174 (2001)
-
(2001)
2001 IEEEWorkshop on Information Assurance and Security
, pp. 170-174
-
-
Doyle, J.1
Kohane, I.2
Long, W.3
Shrobe, H.4
Szolovits, P.5
-
8
-
-
33646390798
-
Genetic algorithm to improve svm-based network intrusion detection system
-
Kim, D., Nguyen, H., Park, J.: Genetic algorithm to improve svm-based network intrusion detection system. In: 19th International Conference on Advanced Information Networking and Applications, vol. 2, pp. 155-158 (2005)
-
(2005)
19th International Conference on Advanced Information Networking and Applications
, vol.2
, pp. 155-158
-
-
Kim, D.1
Nguyen, H.2
Park, J.3
-
9
-
-
3042595031
-
Adaptative neurofuzzy intrusion detection systems
-
Chavan, S., Shah, K., Dave, N., Mukherjee, S., Abraham, A., Sanyal, S.: Adaptative neurofuzzy intrusion detection systems. In: 2004 International Conference on Information Technology: Coding and Computing, vol. 1, pp. 70-74 (2004)
-
(2004)
2004 International Conference on Information Technology: Coding and Computing
, vol.1
, pp. 70-74
-
-
Chavan, S.1
Shah, K.2
Dave, N.3
Mukherjee, S.4
Abraham, A.5
Sanyal, S.6
-
10
-
-
0038729639
-
Lightweight agents for intrusion detection
-
Helmer, G., Wong, J., Honavar, V., Miller, L., Wang, Y.: Lightweight agents for intrusion detection. J. of Systems and Software 67, 109-122 (2003)
-
(2003)
J. of Systems and Software
, vol.67
, pp. 109-122
-
-
Helmer, G.1
Wong, J.2
Honavar, V.3
Miller, L.4
Wang, Y.5
-
11
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: SIAM International Conference on Data Mining (2003)
-
(2003)
SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
12
-
-
84944220475
-
-
Skinner, K., Valdes, A.: Adaptive, Model-based Monitoring for Cyber Attack Detection. In: Debar, H., M'e, L., Wu, S.F. (eds.) RAID 2000. LNCS, 1907, pp. 80-92. Springer, Heidelberg (2000)
-
Skinner, K., Valdes, A.: Adaptive, Model-based Monitoring for Cyber Attack Detection. In: Debar, H., M'e, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 80-92. Springer, Heidelberg (2000)
-
-
-
-
13
-
-
55349093725
-
Data warehousing and data mining techniques for intrusion detection systems
-
Singhal, A., Jajodia, S.: Data warehousing and data mining techniques for intrusion detection systems. Int. J. on Information Security 1(2), 149-166 (2006)
-
(2006)
Int. J. on Information Security
, vol.1
, Issue.2
, pp. 149-166
-
-
Singhal, A.1
Jajodia, S.2
-
15
-
-
85090433665
-
SNORT: Lightweight intrusion detection for networks
-
Roesch, M.: SNORT: Lightweight intrusion detection for networks. In: 13th Systems Administration Conference, pp. 229-238 (1999)
-
(1999)
13th Systems Administration Conference
, pp. 229-238
-
-
Roesch, M.1
-
17
-
-
55349103895
-
-
Metasploit: Exploit research (2006), http://www.metasploit.org
-
(2006)
Exploit research
-
-
-
18
-
-
0003614273
-
Causation, Prediction, and Search
-
2nd edn. MIT Press, Cambridge
-
Spirtes, P., Glymour, C., Scheines, R.: Causation, Prediction, and Search. In: Adaptive Computation and Machine Learning, 2nd edn. MIT Press, Cambridge (2001)
-
(2001)
Adaptive Computation and Machine Learning
-
-
Spirtes, P.1
Glymour, C.2
Scheines, R.3
-
19
-
-
1842503081
-
An introduction to graphical models
-
Technical report. Intel Research, Intel Corporation
-
Murphy, K.: An introduction to graphical models. Technical report. Intel Research, Intel Corporation (2001)
-
(2001)
-
-
Murphy, K.1
-
20
-
-
0003462302
-
-
Springer, Heidelberg
-
Castillo, E., Gutierrez, J.M., Hadi, A.S.: Expert Systems and Probabilistic Network Models. Springer, Heidelberg (1997)
-
(1997)
Expert Systems and Probabilistic Network Models
-
-
Castillo, E.1
Gutierrez, J.M.2
Hadi, A.S.3
-
21
-
-
84942247408
-
Stochastic protocol modelling for anomaly based network intrusion detection
-
Estevez-Tapiador, J., Garcia-Teodoro, P., Diaz-Verdejo, J.: Stochastic protocol modelling for anomaly based network intrusion detection. In: 1st IEEE International Workshop on Information Assurance, pp. 3-12 (2003)
-
(2003)
1st IEEE International Workshop on Information Assurance
, pp. 3-12
-
-
Estevez-Tapiador, J.1
Garcia-Teodoro, P.2
Diaz-Verdejo, J.3
-
23
-
-
0002049440
-
Learning Dynamic Bayesian Networks. Adaptive Processing of Sequences and Data Structures
-
Springer, London
-
Ghahramani, Z.: Learning Dynamic Bayesian Networks. Adaptive Processing of Sequences and Data Structures. In: International Summer School on Neural Networks, pp. 168-197. Springer, London (1998)
-
(1998)
International Summer School on Neural Networks
, pp. 168-197
-
-
Ghahramani, Z.1
-
25
-
-
84964411176
-
Real time data mining-based intrusion detection
-
Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang., J.: Real time data mining-based intrusion detection. In: 2nd DARPA Information Survivability Conference and Exposition, vol. 1, pp. 89-100 (2001)
-
(2001)
2nd DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 89-100
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
|