-
1
-
-
35548944839
-
Introduction to Intrusion Detection and Security Information Management
-
Aldini, A, Gorrieri, R, Martinelli, F, eds, FOSAD 2005, Springer, Heidelberg
-
Debar, H., Viinikka, J.: Introduction to Intrusion Detection and Security Information Management. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol. 3655, pp. 207-236. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3655
, pp. 207-236
-
-
Debar, H.1
Viinikka, J.2
-
2
-
-
80052007699
-
-
Ghosh, A., Michael, C., Schatz, M.: A real-time intrusion detection system based on learning program behavior. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, 1907, pp. 93-109. Springer, Heidelberg (2000)
-
Ghosh, A., Michael, C., Schatz, M.: A real-time intrusion detection system based on learning program behavior. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 93-109. Springer, Heidelberg (2000)
-
-
-
-
3
-
-
33745881331
-
-
Grediaga, A., Ibarra, F., García, F., Ledesma, B., Brotons, F.: Aplication of Neural Networks in Network Control and Information Security. In: Wang, J., Yi, Z., Żurada, J.M., Lu, B.-L., Yin, H. (eds.) ISNN 2006. LNCS, 3973, pp. 208-213. Springer, Heidelberg (2006)
-
Grediaga, A., Ibarra, F., García, F., Ledesma, B., Brotons, F.: Aplication of Neural Networks in Network Control and Information Security. In: Wang, J., Yi, Z., Żurada, J.M., Lu, B.-L., Yin, H. (eds.) ISNN 2006. LNCS, vol. 3973, pp. 208-213. Springer, Heidelberg (2006)
-
-
-
-
4
-
-
68749117846
-
-
Cortada, P., Sanroma, G., Garcia, P.: IDS based on Self-Organizing Maps. Technical Report, RedIRIS (2002)
-
Cortada, P., Sanroma, G., Garcia, P.: IDS based on Self-Organizing Maps. Technical Report, RedIRIS (2002)
-
-
-
-
5
-
-
8344251737
-
-
Zhang, C., Jiang, J., Kamel, M.: Comparison of BPL and RBF Network in Intrusion Detection System. In: Wang, G., Liu, Q., Yao, Y., Skowron, A. (eds.) RSFDGrC 2003. LNCS (LNAI), 2639, pp. 460-470. Springer, Heidelberg (2003)
-
Zhang, C., Jiang, J., Kamel, M.: Comparison of BPL and RBF Network in Intrusion Detection System. In: Wang, G., Liu, Q., Yao, Y., Skowron, A. (eds.) RSFDGrC 2003. LNCS (LNAI), vol. 2639, pp. 460-470. Springer, Heidelberg (2003)
-
-
-
-
6
-
-
2442526701
-
Unsupervised Learning Techniques for an Intrusion Detection System
-
Zanero, S., Savaresi, S.: Unsupervised Learning Techniques for an Intrusion Detection System. In: ACM Symposium on Applied Computing SAC 2004, pp. 41-419 (2004)
-
(2004)
ACM Symposium on Applied Computing
, vol.SAC 2004
, pp. 41-419
-
-
Zanero, S.1
Savaresi, S.2
-
7
-
-
0003770610
-
Neural Networks
-
Addison-Wesley, Reading
-
Freeman, J., Skapura, D.: Neural Networks. In: Algorithms, Applications, and Programming Techniques. Addison-Wesley, Reading (1991)
-
(1991)
Algorithms, Applications, and Programming Techniques
-
-
Freeman, J.1
Skapura, D.2
-
8
-
-
35248842651
-
-
Ramadas, M., Ostermann, S., Tjaden, B.: Detecting Anomalous Network Traffic with Self-Organizing Maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 36-54. Springer, Heidelberg (2003)
-
Ramadas, M., Ostermann, S., Tjaden, B.: Detecting Anomalous Network Traffic with Self-Organizing Maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 36-54. Springer, Heidelberg (2003)
-
-
-
-
10
-
-
68749096661
-
-
Mukkamala, S., Sung, A.: Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines. Technical Report, Institute of Mineria y Tecnología, Nuevo México (2003)
-
Mukkamala, S., Sung, A.: Feature Ranking and Selection for Intrusion Detection Systems Using Support Vector Machines. Technical Report, Institute of Mineria y Tecnología, Nuevo México (2003)
-
-
-
-
12
-
-
19944364877
-
Feature Deduction and Ensemble Design of Intrusion Detection Systems
-
Chebrolua, S., Abrahama, A., Thomasa, J.: Feature Deduction and Ensemble Design of Intrusion Detection Systems. Computers & Security 24, 295-307 (2005)
-
(2005)
Computers & Security
, vol.24
, pp. 295-307
-
-
Chebrolua, S.1
Abrahama, A.2
Thomasa, J.3
-
13
-
-
26944437843
-
-
Xu, X., Wang, X.: An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines. In: Li, X., Wang, S., Dong, Z.Y. (eds.) ADMA 2005. LNCS, 3584, pp. 696-703. Springer, Heidelberg (2005)
-
Xu, X., Wang, X.: An Adaptive Network Intrusion Detection Method Based on PCA and Support Vector Machines. In: Li, X., Wang, S., Dong, Z.Y. (eds.) ADMA 2005. LNCS, vol. 3584, pp. 696-703. Springer, Heidelberg (2005)
-
-
-
-
15
-
-
68749117843
-
A Reconfigurable Architecture for Network Intrusion Detection using Principal Component Analysis
-
Technical Report, Northwestern University Evanston
-
Nguyen, D.: A Reconfigurable Architecture for Network Intrusion Detection using Principal Component Analysis. Technical Report, Northwestern University Evanston (2005)
-
(2005)
-
-
Nguyen, D.1
-
17
-
-
68749094736
-
-
Kauzoglu, T.: Determining Optimum Structure for Artificial Neural Networks. In: Proceedings of then 25th Annual Technical Conference and Exhibition of the Remote Sensing Society, Cardiff, K, September 1999, pp. 675-682 (1999)
-
Kauzoglu, T.: Determining Optimum Structure for Artificial Neural Networks. In: Proceedings of then 25th Annual Technical Conference and Exhibition of the Remote Sensing Society, Cardiff, K, September 1999, pp. 675-682 (1999)
-
-
-
-
20
-
-
68749106562
-
-
Ethereal, http://www.ethereal.com
-
Ethereal
-
-
|