-
1
-
-
19944364877
-
Feature Deduction and Ensemble Design of Intrusion Detection Systems
-
A. Chebrolu, A. Abraham, and J. Thomas, Feature Deduction and Ensemble Design of Intrusion Detection Systems. Computers & Security, 24:4, 295-307, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, A.1
Abraham, A.2
Thomas, J.3
-
2
-
-
25844491810
-
An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks
-
O. Depren, M. Topallar, E. Anarim and M. Kemal, An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks, Expert Systems with Applications, 29:713-722, 2005.
-
(2005)
Expert Systems With Applications
, vol.29
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Kemal, M.4
-
3
-
-
0038266786
-
Computer Intrusion Detection with Classi-cation and Anomaly Detection, using SVMs
-
M. Fugate and J.R. Gattiker, Computer Intrusion Detection with Classi-cation and Anomaly Detection, using SVMs, International Journal of Pattern Recognition and Arti-cial Intelligence, 17: 441-458, 2003.
-
(2003)
International Journal of Pattern Recognition and Ar- Ti-cial Intelligence
, vol.17
, pp. 441-458
-
-
Fugate, M.1
Gattiker, J.R.2
-
5
-
-
84887012521
-
-
KDD Cup Last access: 20th october 2005]
-
KDD Cup 1999 Data. [Last access: 20th october 2005].
-
(1999)
-
-
-
6
-
-
84962260018
-
Evaluating intrusion detection systems
-
R. P. Lipmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, and M. Zissman, Evaluating intrusion detection systems. In the 1998 DARPA off-line intrusion detection evaluation. Proc. DARPA Information Survivability Conf. & Exposition, 2000.
-
(2000)
The 1998 DARPA off-line Intrusion Detection Evaluation. Proc. DARPA Information Survivability Conf. & Exposition
-
-
Lipmann, R.P.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
Zissman, M.11
-
7
-
-
10844230994
-
Intrusion Detection using an ensemble of intelligent paradigms
-
S. Mukkamala, A. Sung, and A. Abraham, Intrusion Detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications, 28:167-182, 2005.
-
(2005)
Journal of Network and Computer Applications
, vol.28
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.2
Abraham, A.3
-
8
-
-
85083945898
-
Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines
-
S. Mukkamala, A. Sung, Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines. In Digital Forensic Research Workshop, 2002.
-
(2002)
Digital Forensic Research Workshop
-
-
Mukkamala, S.1
Sung, A.2
-
9
-
-
84962238645
-
Cost-based modeling for fraud and intrusion detection: Results from the JAM project
-
S. Stolfo, W. Fan, W. Lee, A. Prodomidis and R.K. Chan, Cost-based modeling for fraud and intrusion detection: Results from the JAM project. In DARPA Information Survivability Conf., 2000.
-
(2000)
DARPA Information Survivability Conf
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodomidis, A.4
Chan, R.K.5
-
12
-
-
49649112245
-
Why machine learning algorithms fall in misuse detection on KDD Intrusion detection data set
-
M. Sabhnani, Why machine learning algorithms fall in misuse detection on KDD Intrusion detection data set. Journal of Intelligent Data Analysis, 8:403-445, 2004.
-
(2004)
Journal of Intelligent Data Analysis
, vol.8
, pp. 403-445
-
-
Sabhnani, M.1
|