메뉴 건너뛰기




Volumn , Issue , 2007, Pages 579-584

Classification of computer intrusions using functional networks. A comparative study

Author keywords

[No Author keywords available]

Indexed keywords

COMPARATIVE STUDIES; COMPUTER ATTACKS; COMPUTER SCIENTISTS; EXPONENTIAL INCREASE; FUNCTIONAL NETWORK; MACHINE LEARNING TECHNIQUES;

EID: 67349235269     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (15)

References (12)
  • 1
    • 19944364877 scopus 로고    scopus 로고
    • Feature Deduction and Ensemble Design of Intrusion Detection Systems
    • A. Chebrolu, A. Abraham, and J. Thomas, Feature Deduction and Ensemble Design of Intrusion Detection Systems. Computers & Security, 24:4, 295-307, 2005.
    • (2005) Computers & Security , vol.24 , Issue.4 , pp. 295-307
    • Chebrolu, A.1    Abraham, A.2    Thomas, J.3
  • 2
    • 25844491810 scopus 로고    scopus 로고
    • An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks
    • O. Depren, M. Topallar, E. Anarim and M. Kemal, An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks, Expert Systems with Applications, 29:713-722, 2005.
    • (2005) Expert Systems With Applications , vol.29 , pp. 713-722
    • Depren, O.1    Topallar, M.2    Anarim, E.3    Kemal, M.4
  • 5
    • 84887012521 scopus 로고    scopus 로고
    • KDD Cup Last access: 20th october 2005]
    • KDD Cup 1999 Data. [Last access: 20th october 2005].
    • (1999)
  • 8
    • 85083945898 scopus 로고    scopus 로고
    • Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines
    • S. Mukkamala, A. Sung, Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines. In Digital Forensic Research Workshop, 2002.
    • (2002) Digital Forensic Research Workshop
    • Mukkamala, S.1    Sung, A.2
  • 12
    • 49649112245 scopus 로고    scopus 로고
    • Why machine learning algorithms fall in misuse detection on KDD Intrusion detection data set
    • M. Sabhnani, Why machine learning algorithms fall in misuse detection on KDD Intrusion detection data set. Journal of Intelligent Data Analysis, 8:403-445, 2004.
    • (2004) Journal of Intelligent Data Analysis , vol.8 , pp. 403-445
    • Sabhnani, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.