-
1
-
-
0004077217
-
-
RFC-1157
-
Case, J., Fedor, M.S., Schoffstall, M.L., Davin, C.: Simple Network Management Protocol (SNMP). RFC-1157. (1990)
-
(1990)
Simple Network Management Protocol (SNMP)
-
-
Case, J.1
Fedor, M.S.2
Schoffstall, M.L.3
Davin, C.4
-
2
-
-
4344588856
-
Detecting New Forms of Network Intrusion Using Genetic Programming
-
Lu, W., Traore, I.: Detecting New Forms of Network Intrusion Using Genetic Programming. Computational Intelligence 20(3), 475-494 (2004)
-
(2004)
Computational Intelligence
, vol.20
, Issue.3
, pp. 475-494
-
-
Lu, W.1
Traore, I.2
-
3
-
-
27544512530
-
- Data Mining for Intrusion Detection: A Critical Review
-
Advances in Information Security. Springer, Heidelberg
-
Julisch, K.: Chapter 1 - Data Mining for Intrusion Detection: A Critical Review. In: Applications of Data Mining in Computer Security. Advances in Information Security. Springer, Heidelberg (2002)
-
(2002)
Applications of Data Mining in Computer Security
-
-
Julisch, K.1
-
4
-
-
84885774862
-
-
Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. In: ACM Transactions on Information and System Security (TIS-SEC), 3(4), pp. 227-261. ACM Press, New York (2000)
-
Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. In: ACM Transactions on Information and System Security (TIS-SEC), vol. 3(4), pp. 227-261. ACM Press, New York (2000)
-
-
-
-
5
-
-
0036321445
-
Use of K-Nearest Neighbor Classifier for Intrusion Detection
-
Liao, Y.H., Vemuri, V.R.: Use of K-Nearest Neighbor Classifier for Intrusion Detection. Computers & Security 21(5), 439-448 (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.H.1
Vemuri, V.R.2
-
6
-
-
0034455983
-
Adaptive Intrusion Detection: A Data Mining Approach
-
Lee, W., Stolfo, S.J., Mok, K.W.: Adaptive Intrusion Detection: A Data Mining Approach. Artificial Intelligence Review 14(6), 533-567 (2000)
-
(2000)
Artificial Intelligence Review
, vol.14
, Issue.6
, pp. 533-567
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
7
-
-
0038330235
-
Fusion of Multiple Classifiers for Intrusion Detection in Computer Networks
-
Giacinto, G., Roli, F., Didaci, L.: Fusion of Multiple Classifiers for Intrusion Detection in Computer Networks. Pattern Recognition Letters 24(12), 1795-1803 (2003)
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.12
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
8
-
-
19944364877
-
Feature Deduction and Ensemble Design of Intrusion Detection Systems
-
Chebrolu, S., Abraham, A., Thomas, J.P.: Feature Deduction and Ensemble Design of Intrusion Detection Systems. Computers & Security 24(4), 295-307 (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
11
-
-
0024665277
-
Detection of Anomalous Computer Session Activity
-
Liepins, G.E, ed
-
Vaccaro, H.S., Liepins, G.E.: Detection of Anomalous Computer Session Activity. In: Liepins, G.E. (ed.) Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 280-289 (1989)
-
(1989)
Proceedings of the 1989 IEEE Symposium on Security and Privacy
, pp. 280-289
-
-
Vaccaro, H.S.1
Liepins, G.E.2
-
12
-
-
2942645420
-
Expert Systems in Intrusion Detection: A Case Study
-
Sebring, M., Shellhouse, E., Hanna, M., Whitehurst, R.: Expert Systems in Intrusion Detection: A Case Study. In: Proceedings of the 11th National Computer Security Conference, pp. 74-81 (1988)
-
(1988)
Proceedings of the 11th National Computer Security Conference
, pp. 74-81
-
-
Sebring, M.1
Shellhouse, E.2
Hanna, M.3
Whitehurst, R.4
-
14
-
-
33646252706
-
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
-
Duch, W, Kacprzyk, J, Oja, E, Zadro ny, S, eds, ICANN 2005, Springer, Heidelberg
-
Corchado, E., Herrero, A., Sáiz, J.M.: Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition. In: Duch, W., Kacprzyk, J., Oja, E., Zadro ny, S. (eds.) ICANN 2005. LNCS, vol. 3697, pp. 905-910. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3697
, pp. 905-910
-
-
Corchado, E.1
Herrero, A.2
Sáiz, J.M.3
-
15
-
-
26844471735
-
-
Herrero, A., Corchado, E., Sáiz, J.M.: An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending. In: Wang, L., Chen, K., S. Ong, Y. (eds.) ICNC 2005. LNCS, 3610, pp. 778-782. Springer, Heidelberg (2005)
-
Herrero, A., Corchado, E., Sáiz, J.M.: An Unsupervised Cooperative Pattern Recognition Model to Identify Anomalous Massive SNMP Data Sending. In: Wang, L., Chen, K., S. Ong, Y. (eds.) ICNC 2005. LNCS, vol. 3610, pp. 778-782. Springer, Heidelberg (2005)
-
-
-
-
16
-
-
17444432965
-
Hierarchical Kohonenen Net for Anomaly Detection in Network Security
-
Sarasamma, S.T., Zhu, Q.M.A., Huff, J.: Hierarchical Kohonenen Net for Anomaly Detection in Network Security. IEEE Transactions on Systems Man and Cybernetics, Part B 35(2), 302-312 (2005)
-
(2005)
IEEE Transactions on Systems Man and Cybernetics, Part B
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.M.A.2
Huff, J.3
-
17
-
-
0242489523
-
Feature Selection for Intrusion Detection Using Neural Networks and Support Vector Machines
-
Mukkamala, S., Sung, A.H.: Feature Selection for Intrusion Detection Using Neural Networks and Support Vector Machines. Transportation Security and Infrastructure Protection, 33-39 (2003)
-
(2003)
Transportation Security and Infrastructure Protection
, pp. 33-39
-
-
Mukkamala, S.1
Sung, A.H.2
-
18
-
-
15944375471
-
Intrusion Detection Using Hierarchical Neural Networks
-
Zhang, C.L., Jiang, J., Kamel, M.: Intrusion Detection Using Hierarchical Neural Networks. Pattern Recognition Letters 26(6), 779-791 (2005)
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.6
, pp. 779-791
-
-
Zhang, C.L.1
Jiang, J.2
Kamel, M.3
-
21
-
-
33745653877
-
-
Muelder, C., Ma, K.L., Bartoletti, T.: Interactive Visualization for Network and Port Scan Detection. In: Zamboni, D., Kruegel, C. (eds.) RAID 2005. LNCS, 3858, pp. 265-283. Springer, Heidelberg (2006)
-
Muelder, C., Ma, K.L., Bartoletti, T.: Interactive Visualization for Network and Port Scan Detection. In: Zamboni, D., Kruegel, C. (eds.) RAID 2005. LNCS, vol. 3858, pp. 265-283. Springer, Heidelberg (2006)
-
-
-
-
22
-
-
84870897584
-
Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration
-
Capers, T, ed
-
Nyarko, K., Capers, T., Scott, C., Ladeji-Osias, K.A.: Network Intrusion Visualization with NIVA, an Intrusion Detection Visual Analyzer with Haptic Integration. In: Capers, T. (ed.) Proceedings of the 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2002 (HAPTICS 2002), pp. 277-284 (2002)
-
(2002)
Proceedings of the 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, 2002 (HAPTICS
, pp. 277-284
-
-
Nyarko, K.1
Capers, T.2
Scott, C.3
Ladeji-Osias, K.A.4
-
23
-
-
33645805216
-
An Application of Principal Component Analysis to the Detection and Visualization of Computer Network Attacks
-
Labib, K., Vemuri, V.R.: An Application of Principal Component Analysis to the Detection and Visualization of Computer Network Attacks. Annals of Telecommunications 61(1-2), 218-234 (2006)
-
(2006)
Annals of Telecommunications
, vol.61
, Issue.1-2
, pp. 218-234
-
-
Labib, K.1
Vemuri, V.R.2
-
24
-
-
0029272732
-
Visualizing Network Data
-
Becker, R.A., Eick, S.G., Wilks, A.R.: Visualizing Network Data. IEEE Transactions on Visualization and Computer Graphics 1(1), 16-28 (1995)
-
(1995)
IEEE Transactions on Visualization and Computer Graphics
, vol.1
, Issue.1
, pp. 16-28
-
-
Becker, R.A.1
Eick, S.G.2
Wilks, A.R.3
-
25
-
-
33645238804
-
IDGraphs: Intrusion Detection and Analysis Using Stream Compositing
-
Ren, P., Gao, Y., Li, Z.C., Chen, Y., Watson, B.: IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. IEEE Computer Graphics and Applications 26(2), 28-39 (2006)
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
, pp. 28-39
-
-
Ren, P.1
Gao, Y.2
Li, Z.C.3
Chen, Y.4
Watson, B.5
-
26
-
-
70349568270
-
Visual Information Seeking: Tight Coupling of Dynamic Query Filters with Starfield Displays
-
Morgan Kaufmann Publishers Inc, San Francisco
-
Ahlberg, C., Shneiderman, B.: Visual Information Seeking: Tight Coupling of Dynamic Query Filters with Starfield Displays. In: Readings in information visualization: Using vision to think, pp. 244-250. Morgan Kaufmann Publishers Inc., San Francisco (1999)
-
(1999)
Readings in information visualization: Using vision to think
, pp. 244-250
-
-
Ahlberg, C.1
Shneiderman, B.2
-
28
-
-
0028401306
-
Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches
-
Aamodt, A., Plaza, E.: Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches. AI Communications 7(1), 39-59 (1994)
-
(1994)
AI Communications
, vol.7
, Issue.1
, pp. 39-59
-
-
Aamodt, A.1
Plaza, E.2
-
30
-
-
0001710505
-
Analysis of a Complex of Statistical Variables Into Principal Components
-
Hotelling, H.: Analysis of a Complex of Statistical Variables Into Principal Components. Journal of Education Psychology 24, 417-444 (1933)
-
(1933)
Journal of Education Psychology
, vol.24
, pp. 417-444
-
-
Hotelling, H.1
-
31
-
-
0000325341
-
On Lines and Planes of Closest Fit to Systems of Points in Space
-
Pearson, K.: On Lines and Planes of Closest Fit to Systems of Points in Space. Philosophical Magazine 2(6), 559-572 (1901)
-
(1901)
Philosophical Magazine
, vol.2
, Issue.6
, pp. 559-572
-
-
Pearson, K.1
-
32
-
-
0002399288
-
Neural networks, principal components, and subspaces
-
Oja, E.: Neural networks, principal components, and subspaces. Int. Journal of Neural Systems 1, 61-68 (1989)
-
(1989)
Int. Journal of Neural Systems
, vol.1
, pp. 61-68
-
-
Oja, E.1
-
33
-
-
0016102310
-
A Projection Pursuit Algorithm for Exploratory Data-Analysis
-
Friedman, J.H., Tukey, J.W.: A Projection Pursuit Algorithm for Exploratory Data-Analysis. IEEE Transactions on Computers 23(9), 881-890 (1974)
-
(1974)
IEEE Transactions on Computers
, vol.23
, Issue.9
, pp. 881-890
-
-
Friedman, J.H.1
Tukey, J.W.2
-
34
-
-
0001493668
-
Asymptotics of Graphical Projection Pursuit
-
Diaconis, P., Freedman, D.: Asymptotics of Graphical Projection Pursuit. The Annals of Statistics 12(3), 793-815 (1984)
-
(1984)
The Annals of Statistics
, vol.12
, Issue.3
, pp. 793-815
-
-
Diaconis, P.1
Freedman, D.2
-
35
-
-
3543075142
-
Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit
-
Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. Data Mining and Knowledge Discovery 8(3), 203-225 (2004)
-
(2004)
Data Mining and Knowledge Discovery
, vol.8
, Issue.3
, pp. 203-225
-
-
Corchado, E.1
MacDonald, D.2
Fyfe, C.3
-
37
-
-
0842267461
-
Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors
-
Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. Int. Journal of Pattern Recognition and Artificial Intelligence 17(8), 1447-1466 (2003)
-
(2003)
Int. Journal of Pattern Recognition and Artificial Intelligence
, vol.17
, Issue.8
, pp. 1447-1466
-
-
Corchado, E.1
Fyfe, C.2
-
38
-
-
1642460019
-
Structuring Global Responses of Local Filters Using Lateral Connections
-
Corchado, E., Han, Y., Fyfe, C.: Structuring Global Responses of Local Filters Using Lateral Connections. Journal of Experimental & Theoretical Artificial Intelligence 15(4), 473-487 (2003)
-
(2003)
Journal of Experimental & Theoretical Artificial Intelligence
, vol.15
, Issue.4
, pp. 473-487
-
-
Corchado, E.1
Han, Y.2
Fyfe, C.3
-
39
-
-
84862911217
-
The Rectified Gaussian Distribution
-
Seung, H.S., Socci, N.D., Lee, D.: The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems 10, 350-356 (1998)
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
, pp. 350-356
-
-
Seung, H.S.1
Socci, N.D.2
Lee, D.3
-
40
-
-
0025489075
-
The Self-Organizing Map
-
Kohonen, T.: The Self-Organizing Map. Proceedings of the IEEE 78(9), 1464-1480 (1990)
-
(1990)
Proceedings of the IEEE
, vol.78
, Issue.9
, pp. 1464-1480
-
-
Kohonen, T.1
-
41
-
-
0003647182
-
-
Addison-Wesley Longman Publishing Co, Inc
-
Ritter, H., Martinetz, T., Schulten, K.: Neural Computation and Self-Organizing Maps; An Introduction. Addison-Wesley Longman Publishing Co., Inc. (1992)
-
(1992)
Neural Computation and Self-Organizing Maps; An Introduction
-
-
Ritter, H.1
Martinetz, T.2
Schulten, K.3
-
42
-
-
34248566933
-
Hybrid Multi-agent Architecture as a Real-Time Problem-Solving Model
-
Carrascosa, C., Bajo, J., Julián, V., Corchado, J.M., Botti, V.: Hybrid Multi-agent Architecture as a Real-Time Problem-Solving Model. Expert Systems with Applications: An International Journal 34(1), 2-17 (2008)
-
(2008)
Expert Systems with Applications: An International Journal
, vol.34
, Issue.1
, pp. 2-17
-
-
Carrascosa, C.1
Bajo, J.2
Julián, V.3
Corchado, J.M.4
Botti, V.5
-
43
-
-
0344012555
-
Constructing Deliberative Agents with Case-Based Reasoning Technology
-
Corchado, J.M., Laza, R.: Constructing Deliberative Agents with Case-Based Reasoning Technology. International Journal of Intelligent Systems 18(12), 1227-1241 (2003)
-
(2003)
International Journal of Intelligent Systems
, vol.18
, Issue.12
, pp. 1227-1241
-
-
Corchado, J.M.1
Laza, R.2
-
45
-
-
0004077217
-
-
RFC
-
Case, J., Fedor, M.S., Schoffstall, M.L., Davin, C.: Simple Network Management Protocol (SNMP). RFC- 1157 (1990)
-
(1990)
Simple Network Management Protocol (SNMP)
, pp. 1157
-
-
Case, J.1
Fedor, M.S.2
Schoffstall, M.L.3
Davin, C.4
-
47
-
-
0036570725
-
-
Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. Int. Journal of Network Management 12(3), 135-144 (2002)
-
Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. Int. Journal of Network Management 12(3), 135-144 (2002)
-
-
-
-
49
-
-
4243116400
-
The Spinning Cube of Potential Doom
-
Stephen, L.: The Spinning Cube of Potential Doom. Commun. ACM 47(6), 25-26 (2004)
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 25-26
-
-
Stephen, L.1
-
50
-
-
33745460819
-
Visualizing Network Data for Intrusion Detection
-
Man and Cybernetics SMC
-
Kulsoom, A., Lee, C., Conti, G., Copeland, J.A.: Visualizing Network Data for Intrusion Detection. In: Proc. of the Sixth Annual IEEE Information Assurance Workshop - Systems, Man and Cybernetics (SMC), 2005, pp. 100-108 (2005)
-
(2005)
Proc. of the Sixth Annual IEEE Information Assurance Workshop - Systems
, pp. 100-108
-
-
Kulsoom, A.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
|