-
1
-
-
34548321528
-
Using neuro-fuzzy approach to reduce false positive alerts
-
CNSR '07. Fifth Annual Conference IEEE Press
-
Alshammari Riyad, Sonamthiang Sumalee, Teimouri Mohsen, Riordan Denis, "Using Neuro-Fuzzy Approach to Reduce False Positive Alerts", Communication Networks and Services Research, 2007. CNSR '07. Fifth Annual Conference IEEE Press, pg 345 - 349
-
(2007)
Communication Networks And Services Research
, pp. 345-349
-
-
Riyad, A.1
Sumalee, S.2
Mohsen, T.3
Denis, R.4
-
2
-
-
33847266219
-
False positives reduction via intrusion alert quality framework
-
DOI 10.1109/ICON.2005.1635545, 1635545, 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings
-
Bakar N., Bealton B., and Samsudin A., "False Positives Reduction via Intrusion Alert Quality Framework", Joint IEEE Malaysia International Conference on Communications and IEEE International Conference on Networks, pp. 547-552, November 2005. (Pubitemid 46314743)
-
(2005)
2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings
, vol.1
, pp. 547-552
-
-
Bakar, N.A.1
Belaton, B.2
Samsudin, A.3
-
4
-
-
0029191595
-
Nefclass: a neuro-fuzzy approach for the classification of data
-
Feb.
-
Nauck D., and Kruse R., "NEFCLASS: A Neuro-Fuzzy Approach for the Classification of Data", ACM Symposium on Applied Computing, Nashville, pp. 461-465, Feb 1995.
-
(1995)
Acm Symposium On Applied Computing, Nashville
, pp. 461-465
-
-
Nauck, D.1
Kruse, R.2
-
6
-
-
84883271942
-
Selecting features for intrusion detection: a feature relevance analysis on kdd 99 intrusion detection datasets
-
October, St. Andrews, Canada.
-
Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets", Proceedings of the Third Annual Conference on Privacy, Security and Trust, October 2005, St. Andrews, Canada.
-
(2005)
Proceedings Of The Third Annual Conference On Privacy, Security And Trust
-
-
Kayacik, H.G.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
8
-
-
0028430224
-
Network intrusion detection
-
May/June
-
Biswanath L. Mukherjee, Todd Heberlein, and Karl N. Levitt, "Network Intrusion Detection", IEEE Network, vol. 8 no. 3, pp. 26-41, Ma /June 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.L.1
Heberlein, T.2
Levitt, K.N.3
-
10
-
-
1542492748
-
Identifying significant features for network forensic analysis using artificial intelligent techniqu es
-
Srinivas Mukkamla, Andrew H. Sung, "Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniqu es", International Journal of Digital Evidence, Winter 2003 Vol I Issue 4
-
(2003)
International Journal Of Digital Evidence, Winter
, vol.1
, Issue.4
-
-
Mukkamla, S.1
Sung, A.H.2
-
11
-
-
85042505890
-
Foundations of neural networks, fuzzy systems and knowledge engineering
-
Kasabov, N. "Foundations of Neural Networks, Fuzzy Systems and Knowledge Engineering." MIT Press, Cambridge, Massachusetts. 1996.
-
(1996)
Mit Press, Cambridge, Massachusetts
-
-
Kasabov, N.1
-
14
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
Mahoney, M. and Chan, P., "An analysis of the 1999 DARPA Lincoln Laboratory evaluation data for network anomaly detection," In Recent Advances in Intrusion Detection (RAID2003)- Lecture Notes in Computer Science, Vol. 2820, pp. 220-237. Springer-Verlag, 2003. (Pubitemid 137633167)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2820
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
15
-
-
66649133248
-
-
http://www.cnn.com/2000/TECH/computing/09/06/fear.trinity.idg/
-
-
-
-
18
-
-
66649086974
-
-
DARPA Data Set, 1999, www.ll.mit.edu/IDS/eval/1999/
-
(1999)
Darpa Data Set
-
-
|