-
1
-
-
85055927726
-
Network Security Principles and Practices,
-
November 15
-
By Saadat Malik," Network Security Principles and Practices", chapter 14, November 15, 2002.
-
(2002)
-
-
Saadat Malik, B.1
-
2
-
-
0023294428
-
An Intrusion-Detection Model
-
February
-
Dorothy E. Denning, "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, Vol. SE-13. No. 2, February 1987, pp. 222-232.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
3
-
-
0004084716
-
STAT: A State Transition Analysis Tools for Intrusion Detection
-
MSc Thesis, Department of Computer Science, University of California Santa Barbara
-
Porras, P. A., "STAT: A State Transition Analysis Tools for Intrusion Detection", MSc Thesis, Department of Computer Science, University of California Santa Barbara, 1992, pp. 15-20.
-
(1992)
, pp. 15-20
-
-
Porras, P.A.1
-
4
-
-
0028430224
-
Network Intrusion Detection
-
Mykerjee B., Heberlein L. T., & Levitt K. N., "Network Intrusion Detection", IEEE Network, Vol. 8, No. 3, 1994, pp. 26-14.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-14
-
-
Mykerjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
5
-
-
0003518833
-
Classification and Detection of Computer Intrusions
-
A PHD Dissertation to the Faculty of Purdue University, August
-
Sandeep Kumar, "Classification and Detection of Computer Intrusions", A PHD Dissertation to the Faculty of Purdue University, August 1995, pp. 49-51.
-
(1995)
, pp. 49-51
-
-
Kumar, S.1
-
6
-
-
70349347498
-
Integrating Artificial Immune Algorithms for Intrusion Detection
-
Dissertation in University of London
-
Jung won Kim, "Integrating Artificial Immune Algorithms for Intrusion Detection", Dissertation in University of London, 2002, pp, 1-5.
-
(2002)
, pp. 1-5
-
-
Jung won Kim1
-
7
-
-
70349361814
-
-
Salvatore J. Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, & Philip K. Chan, Cost-based modeling for Fraud and Intrusion Detection: Results from the JAM roject, 2000, http://www1.cs.columbia.edu/jam/recent- project-papers.html, last access day 28-july-2007, pp. 1-15.
-
Salvatore J. Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, & Philip K. Chan, "Cost-based modeling for Fraud and Intrusion Detection: Results from the JAM roject", 2000, http://www1.cs.columbia.edu/jam/recent- project-papers.html, last access day 28-july-2007, pp. 1-15.
-
-
-
-
8
-
-
62849107731
-
Efficient Intrusion Detection Using Principal Component Analysis
-
last accessed in 29-07-2007
-
Yacine Bouzida, Frederic Cuppens, Nora Cuppens-Boulahia & Sylvain Gombault, "Efficient Intrusion Detection Using Principal Component Analysis", 2004 http://www.rennes.enstbretagne.fr/~fcuppens/article/sar04. pdf, last accessed in 29-07-2007.
-
(2004)
-
-
Bouzida, Y.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Gombault, S.4
-
10
-
-
70349369467
-
-
M. Hellmann, Fuzzy logic introduction, a Laboratories Antennas Radar Telecom, F.R.E CNRS 2272, Equipe Radar Polarimetrie, France, 2000.
-
M. Hellmann, "Fuzzy logic introduction", a Laboratories Antennas Radar Telecom, F.R.E CNRS 2272, Equipe Radar Polarimetrie, France, 2000.
-
-
-
-
11
-
-
70349352221
-
The Fuzzy Systems Hand book
-
Earl Cox, "The Fuzzy Systems Hand book", Ap Professional Book, 1994.
-
(1994)
Ap Professional Book
-
-
Cox, E.1
-
13
-
-
70349365151
-
-
Susan M. Al-naqshabandi, Simulation system for computer network intrusion detection, a thesis submitted in partial fulfillment of the requirements for the degree of doctor of philosophy in computer science, Al-Nahrain University, Baghdad, Iraq, 2007, pp. 61-66.
-
Susan M. Al-naqshabandi, "Simulation system for computer network intrusion detection", a thesis submitted in partial fulfillment of the requirements for the degree of doctor of philosophy in computer science, Al-Nahrain University, Baghdad, Iraq, 2007, pp. 61-66.
-
-
-
-
14
-
-
59949086499
-
-
International journal of computational intelligence research, ISSN 0973-1873
-
Ray-I Chang, Liang-Bin Lai, Wen-De Su, Jen-Chieh Wang, Jen-Shiang Kouh "Intrusion Detection by Back propagation Neural Networks with sample-Query and Attribute-Query", International journal of computational intelligence research, ISSN 0973-1873, Vol. 3, No. 1, 2007, pp, 6-10.
-
(2007)
Intrusion Detection by Back propagation Neural Networks with sample-Query and Attribute-Query
, vol.3
, Issue.1
, pp. 6-10
-
-
Chang, R.-I.1
Lai, L.-B.2
Su, W.-D.3
Wang, J.-C.4
Kouh, J.-S.5
-
15
-
-
70349350844
-
Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems
-
December
-
Veselina G. Jecheva, Evgeniya P. Nikolova," Learning Problem and BCJR Decoding Algorithm in Anomaly-based Intrusion Detection Systems" Journal of software, VOL. 2, NO. 6, December 2007, pp, 48-50.
-
(2007)
Journal of software
, vol.2
, Issue.6
, pp. 48-50
-
-
Jecheva, V.G.1
Nikolova, E.P.2
-
16
-
-
19944364877
-
Feature detection and ensemble design of intrusion detection systems
-
Chebrolu S, Abraham A, Thomas JP." Feature detection and ensemble design of intrusion detection systems". Comput Secur; 24: pp. 295-307, 2005.
-
(2005)
Comput Secur
, vol.24
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
17
-
-
84873993999
-
-
KDD-cup data set. http://kdd.ics.uci.edu/data-bases/kddcup99/kddcup.html.
-
KDD-cup data set
-
-
|