-
3
-
-
68949182169
-
-
Anderson D, Frivold T, Tamaru A, Valdes A. Next generation intrusion detection expert system (NIDES), Software user's manual, beta-update release. Computer Science Laboratory, SRI International, Menlo Park, CA, USA, Technical Report SRI-CSL-95-0, May 1994.
-
Anderson D, Frivold T, Tamaru A, Valdes A. Next generation intrusion detection expert system (NIDES), Software user's manual, beta-update release. Computer Science Laboratory, SRI International, Menlo Park, CA, USA, Technical Report SRI-CSL-95-0, May 1994.
-
-
-
-
4
-
-
68949182168
-
-
Anderson D, Lunt TF, Javitz H, Tamaru A., Valdes A. Detecting unusual program behaviour using the statistical component of the next-generation intrusion detection expert system (NIDES). Computer Science Laboratory, SRI International, Menlo Park, CA, USA, SRI-CSL-95-06, May 1995.
-
Anderson D, Lunt TF, Javitz H, Tamaru A., Valdes A. Detecting unusual program behaviour using the statistical component of the next-generation intrusion detection expert system (NIDES). Computer Science Laboratory, SRI International, Menlo Park, CA, USA, SRI-CSL-95-06, May 1995.
-
-
-
-
5
-
-
34548145185
-
Multi-layer integrated anomaly intrusion detection system for mobile ad hoc networks
-
India, February 22-24
-
Bose S, Bharathimurugan S, Kannan A. Multi-layer integrated anomaly intrusion detection system for mobile ad hoc networks. In: IEEE ICSCN 2007, MIT Campus, India, February 22-24, 2007. p. 360-5.
-
(2007)
IEEE ICSCN 2007, MIT Campus
, pp. 360-365
-
-
Bose, S.1
Bharathimurugan, S.2
Kannan, A.3
-
6
-
-
0036588773
-
Incorporating soft computing techniques into a probabilistic intrusion detection system
-
Cho S. Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Transactions on Systems, Man, and Cybernetics 32 2 (2002)
-
(2002)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.32
, Issue.2
-
-
Cho, S.1
-
7
-
-
33751579019
-
Improved estimation of hidden Markov model parameters from multiple observation sequences
-
Quebec City, Canada, August
-
Davis RIA, Lovell BC. Improved estimation of hidden Markov model parameters from multiple observation sequences. In: International Conference on Pattern Recognition, Quebec City, Canada, August 2002. p. 168-71.
-
(2002)
International Conference on Pattern Recognition
, pp. 168-171
-
-
Davis, R.I.A.1
Lovell, B.C.2
-
9
-
-
0035792373
-
Fuzzy intrusion detection
-
Vancouver, Canada, July 25
-
Dickerson J, Juslin J, Koukousoula O. Fuzzy intrusion detection. In: Proceedings of the North American Fuzzy Information Processing society, Vancouver, Canada, July 25, 2001. p. 1506-10.
-
(2001)
Proceedings of the North American Fuzzy Information Processing society
, pp. 1506-1510
-
-
Dickerson, J.1
Juslin, J.2
Koukousoula, O.3
-
11
-
-
68949188357
-
-
Evers J. FBI: computer crime costs US firms $67bn. 〈http://news.zdnet.co.uk/security/0,1000000189,39248195,00.htm〉. Retrieved on 15 April, 2008.
-
Evers J. FBI: computer crime costs US firms $67bn. 〈http://news.zdnet.co.uk/security/0,1000000189,39248195,00.htm〉. Retrieved on 15 April, 2008.
-
-
-
-
12
-
-
34250188502
-
Alert fusion for a computer host based intrusion detection system
-
March
-
Feng C, Peng J, Qiao H, Rozenblit JW. Alert fusion for a computer host based intrusion detection system. In: The 4th annual IEEE international conference and workshops on the, engineering of computer-based systems, 26-29 March 2007. p. 433-40.
-
(2007)
The 4th annual IEEE international conference and workshops on the, engineering of computer-based systems, 26-29
, pp. 433-440
-
-
Feng, C.1
Peng, J.2
Qiao, H.3
Rozenblit, J.W.4
-
16
-
-
0038458145
-
Evolving fuzzy classifiers for intrusion detection
-
New Orleans, Louisiana, USA, June 17-19
-
Gòmez J, Dasgupta D. Evolving fuzzy classifiers for intrusion detection. In: The 3rd annual IEEE workshop on information assurance, New Orleans, Louisiana, USA, June 17-19, 2002.
-
(2002)
The 3rd annual IEEE workshop on information assurance
-
-
Gòmez, J.1
Dasgupta, D.2
-
17
-
-
0038537231
-
An immuno-fuzzy approach to anomaly detection
-
May 25-28
-
Gòmez J, Gonzàlez F, Dasgupta D. An immuno-fuzzy approach to anomaly detection. In: IEEE international conference on fuzzy systems, vol. 2, May 25-28, 2003. p. 1219-24.
-
(2003)
IEEE international conference on fuzzy systems
, vol.2
, pp. 1219-1224
-
-
Gòmez, J.1
Gonzàlez, F.2
Dasgupta, D.3
-
18
-
-
0032205799
-
Efficient training algorithms for HMMs using incremental estimation
-
Gotoh Y, Hochberg MM, Silverman HF. Efficient training algorithms for HMMs using incremental estimation. In: IEEE transactions on speech and audio processing, vol. 6 (6), 1998. p. 539-48.
-
(1998)
IEEE transactions on speech and audio processing
, vol.6
, Issue.6
, pp. 539-548
-
-
Gotoh, Y.1
Hochberg, M.M.2
Silverman, H.F.3
-
19
-
-
10044269754
-
Outlier detection using k-nearest neighbour graph
-
Los Alamitos, CA, USA
-
Hautamaki V, Karkkainen I, Franti P. Outlier detection using k-nearest neighbour graph. In: Proceedings of the 17th international conference on pattern recognition, Los Alamitos, CA, USA, 2004. p. 430-3.
-
(2004)
Proceedings of the 17th international conference on pattern recognition
, pp. 430-433
-
-
Hautamaki, V.1
Karkkainen, I.2
Franti, P.3
-
20
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection using program sequences of system calls
-
Sydney, Australia, September
-
Hoang X, Hu J, Bertok P. A multi-layer model for anomaly intrusion detection using program sequences of system calls. In: Proceedings of IEEE international conference on network, Sydney, Australia, September 2003a. p. 531-6.
-
(2003)
Proceedings of IEEE international conference on network
, pp. 531-536
-
-
Hoang, X.1
Hu, J.2
Bertok, P.3
-
21
-
-
34249319577
-
Intrusion detection based on data mining
-
Angers, France
-
Hoang X, Hu J, Bertok P. Intrusion detection based on data mining. In: The 15th international conference on enterprise information systems, Angers, France, vol. 3, 2003b. p. 341-6.
-
(2003)
The 15th international conference on enterprise information systems
, vol.3
, pp. 341-346
-
-
Hoang, X.1
Hu, J.2
Bertok, P.3
-
22
-
-
21644438395
-
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
-
Hoang X, Hu J. An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls. In: Proceedings of the IEEE international conference on network, November 2004, vol. 2. p. 470-4.
-
(2004)
Proceedings of the IEEE international conference on network, November
, vol.2
, pp. 470-474
-
-
Hoang, X.1
Hu, J.2
-
23
-
-
65249107163
-
A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
-
Hu J., Yu X., Qiu D., and Chen H.H. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection. IEEE Network 23 1 (2009)
-
(2009)
IEEE Network
, vol.23
, Issue.1
-
-
Hu, J.1
Yu, X.2
Qiu, D.3
Chen, H.H.4
-
24
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes
-
Hwang K., Cai M., Chen Y., and Qin M. Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes. IEEE Transactions on Dependable and Secure Computing 4 1 (2007) 41-55
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
25
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Oakland, CA
-
Lee W, Stolfo SJ, Mok KW. A data mining framework for building intrusion detection models. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, 1999. p. 120-32.
-
(1999)
Proceedings of the IEEE symposium on security and privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
26
-
-
84944193544
-
A data mining and CIDF based approach for detecting novel and distributed intrusions
-
Toulouse, France
-
Lee W, Nimbalkar RA, Yee KK, Patil SB, Desai PH, Tran TT, Stolfo SJ. A data mining and CIDF based approach for detecting novel and distributed intrusions. In: Proceedings of the third international workshop on Recent Advances in Intrusion Detection (RAID 2000), Toulouse, France, 2000. p. 49-65.
-
(2000)
Proceedings of the third international workshop on Recent Advances in Intrusion Detection (RAID
, pp. 49-65
-
-
Lee, W.1
Nimbalkar, R.A.2
Yee, K.K.3
Patil, S.B.4
Desai, P.H.5
Tran, T.T.6
Stolfo, S.J.7
-
27
-
-
68949189907
-
-
Lunt TF, Tamaru A, Gilham F, Jagannathm R, Jalali C, Neumann Javitz HS, Valdes A, Garvey TD. A real-time intrusion detection expert system (IDES). Computer Science Laboratory, SRI International, Menlo Park, CA, USA, Final Technical Report, February 1992.
-
Lunt TF, Tamaru A, Gilham F, Jagannathm R, Jalali C, Neumann PG, Javitz HS, Valdes A, Garvey TD. A real-time intrusion detection expert system (IDES). Computer Science Laboratory, SRI International, Menlo Park, CA, USA, Final Technical Report, February 1992.
-
-
-
-
28
-
-
0035747057
-
Fuzzy frequent episodes for real-time intrusion detection
-
Melbourne, Australia, December 2-5
-
Luo J, Bridges S, Vaughn R. Fuzzy frequent episodes for real-time intrusion detection. In: IEEE international conference on fuzzy systems, Melbourne, Australia, December 2-5, 2001.
-
(2001)
IEEE international conference on fuzzy systems
-
-
Luo, J.1
Bridges, S.2
Vaughn, R.3
-
30
-
-
34250315640
-
An overview of anomaly detection techniques: existing solutions and latest technological trends
-
Patcha A., and Park J.M. An overview of anomaly detection techniques: existing solutions and latest technological trends. Computer Networks 51 (2007) 3448-3470
-
(2007)
Computer Networks
, vol.51
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
31
-
-
0024610919
-
A tutorial on hidden Markov model and selected applications in speech recognition
-
Rabiner L. A tutorial on hidden Markov model and selected applications in speech recognition. Proceedings of the IEEE 77 2 (1989)
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
-
-
Rabiner, L.1
-
34
-
-
68949174283
-
-
University of New Mexico's Computer Immune Systems Project:, Retrieved on 2005
-
University of New Mexico's Computer Immune Systems Project: 〈http://www.cs.unm.edu/~immsec/systemcalls.htm〉, Retrieved on 2005.
-
-
-
-
37
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, CA, USA
-
Warrender C, Forrest S, Pearlmutter B. Detecting intrusions using system calls: alternative data models. In: Proceedings of the IEEE symposium on security and privacy, Oakland, CA, USA, 1999. p. 133-45.
-
(1999)
Proceedings of the IEEE symposium on security and privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
38
-
-
14844351034
-
Not so naive Bayes: aggregating one-dependence estimators
-
Webb G.I., Boughton J., and Wang Z. Not so naive Bayes: aggregating one-dependence estimators. Machine Learning 58 1 (2005) 5-24
-
(2005)
Machine Learning
, vol.58
, Issue.1
, pp. 5-24
-
-
Webb, G.I.1
Boughton, J.2
Wang, Z.3
|