-
1
-
-
84899303295
-
Distributed Intrusion Detection Systems: A Computational Intelligence Approach
-
Idea Group Inc. Publishers, USA, Chapter 5
-
Abraham, A., Thomas, J., Distributed Intrusion Detection Systems: A Computational Intelligence Approach, Applications of Information Systems to Homeland Security and Defense, Idea Group Inc. Publishers, USA, Chapter 5, pp. 105-135, 2005.
-
(2005)
Applications of Information Systems to Homeland Security and Defense
, pp. 105-135
-
-
Abraham, A.1
Thomas, J.2
-
2
-
-
0016037512
-
Optimal Decoding of Linear Codes for minimizing symbol error rate
-
March
-
Bahl L., Jelinek J., Raviv J., Raviv F., Optimal Decoding of Linear Codes for minimizing symbol error rate, IEEE Transactions on Information Theory, vol. IT-20, March 1974, pp.284-287.
-
(1974)
IEEE Transactions on Information Theory
, vol.IT-20
, pp. 284-287
-
-
Bahl, L.1
Jelinek, J.2
Raviv, J.3
Raviv, F.4
-
3
-
-
77953849787
-
Learning Rules and Clusters for Network Anomaly Detection
-
George Mason University, Technical Report CS-2003-06
-
Chan P., M. Mahoney, M. Arshad, Learning Rules and Clusters for Network Anomaly Detection, Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, George Mason University, Technical Report CS-2003-06, 2003.
-
(2003)
Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection
-
-
Chan, P.1
Mahoney, M.2
Arshad, M.3
-
4
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
June
-
Chebrolu, S.; Abraham A.; Thomas, J. P., Feature deduction and ensemble design of intrusion detection systems, Computers & Security, Volume 24, Issue 4, 1 June 2005, pp. 295-307.
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
7
-
-
33947572261
-
Learning vector quantization neural network method for network intrusion detection
-
ISSN 1007-1202
-
Degang Y., C. Guo, W. Hui, L. Xiaofeng, Learning vector quantization neural network method for network intrusion detection, Wuhan University Journal of Natural Sciences, Volume 12, Number 1, 2007, ISSN 1007-1202, pp. 147-150.
-
(2007)
Wuhan University Journal of Natural Sciences
, vol.12
, Issue.1
, pp. 147-150
-
-
Degang, Y.1
Guo, C.2
Hui, W.3
Xiaofeng, L.4
-
8
-
-
84920389231
-
An intrusion-detection model
-
In, Oakland, USA
-
Denning D., An intrusion-detection model, In Proceedings of IEEE Symposium on Security and Privacy, Oakland, USA, 1986, pp. 118-131.
-
(1986)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 118-131
-
-
Denning, D.1
-
10
-
-
85184639134
-
Network Signal Analysis: A Wavelet Approach
-
Innsbruck, Austria, 456-228 ISBN: 0-88986-468-3
-
Ezekiel S., W. Oblitey, R. Trimble, Network Signal Analysis: A Wavelet Approach, Parallel and Distributed Computing and Networks, Innsbruck, Austria, 2005, 456-228, ISBN: 0-88986-468-3.
-
(2005)
Parallel and Distributed Computing and Networks
-
-
Ezekiel, S.1
Oblitey, W.2
Trimble, R.3
-
11
-
-
0029716418
-
A Sense of Self for Unix Processes
-
In, IEEE Computer Society Press, Los Alamitors, CA
-
Forrest S., S.A. Hofmeyr, A. Somayaji, T.A. Longtaff, A Sense of Self for Unix Processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitors, CA, pp.120-128.
-
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longtaff, T.A.4
-
12
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Forrest S., S.A. Hofmeyr, A. Somayaji, Intrusion detection using sequences of system calls, Journal of Computer Security, Vol. 6, 1998, pp. 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
13
-
-
27644509266
-
Intrusion Detection Systems and Intrusion Prevention Systems
-
Fuchsberger A., Intrusion Detection Systems and Intrusion Prevention Systems, Information Security Technical Report, Volume 10, Issue 3, 2005, pp. 134-139.
-
(2005)
Information Security Technical Report
, vol.10
, Issue.3
, pp. 134-139
-
-
Fuchsberger, A.1
-
14
-
-
46749117541
-
Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms
-
Haghighat A. T., M. Esmaeili, A. Saremi, V. R. Mousavi, "Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms, " ICIS, pp. 587-591, 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007.
-
(2007)
6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007)
, pp. 587-591
-
-
Haghighat, A.T.1
Esmaeili, M.2
Saremi, A.3
Mousavi, V.R.4
-
15
-
-
6344291690
-
Intrusion detection using adaptive time-dependent finite automata
-
Han Z.F.; J.P. Zou; H. Jin; Y.P. Yang; J. H Sun, Intrusion detection using adaptive time-dependent finite automata, Proceedings of 2004 International Conference on Machine Learning and Cybernetics, 2004, Vol. 5, pp. 3040-3045.
-
(2004)
Proceedings of 2004 International Conference on Machine Learning and Cybernetics
, vol.5
, pp. 3040-3045
-
-
Han, Z.F.1
Zou, J.P.2
Jin, H.3
Yang, Y.P.4
Sun, J.5
-
16
-
-
84890861404
-
A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls
-
Sydney, Australia
-
Hoang X.D., J. Hu, P. Bertok, A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls, 11th IEEE International Conference on Networks (ICON 2003), Sydney, Australia, 2003.
-
(2003)
11th IEEE International Conference on Networks (ICON 2003)
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
17
-
-
33644537355
-
Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms
-
ISBN:1-58113-964-0
-
Hou H., G. Dozier, Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA's genetic arms, Symposium on Applied Computing Proceedings of the 2005 ACM symposium on Applied computing, ISBN:1-58113-964-0, 2005, pp. 952-956.
-
(2005)
Symposium on Applied Computing Proceedings of the 2005 ACM symposium on Applied computing
, pp. 952-956
-
-
Hou, H.1
Dozier, G.2
-
18
-
-
34147111253
-
Network intrusion detection in covariance feature space
-
Jin S., D. S. Yeung, X. Wang, Network intrusion detection in covariance feature space, Pattern Recognition, Volume 40, Issue 8, 2007, pp. 2185-2197.
-
(2007)
Pattern Recognition
, vol.40
, Issue.8
, pp. 2185-2197
-
-
Jin, S.1
Yeung, D.S.2
Wang, X.3
-
19
-
-
34248169333
-
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
-
ISSN: 0020-0255
-
Katos V., Network intrusion detection: Evaluating cluster, discriminant, and logit analysis, Information Sciences, Volume 177, Issue 15, 2007, ISSN: 0020-0255, pp. 3060-3073.
-
(2007)
Information Sciences
, vol.177
, Issue.15
, pp. 3060-3073
-
-
Katos, V.1
-
20
-
-
20344365833
-
For whom the bells toll: Effective IDS deployment strategies
-
May
-
Kemp M., For whom the bells toll: effective IDS deployment strategies, Network Security, Volume 2005, Issue 5, May 2005, pp. 16-18.
-
(2005)
Network Security
, vol.2005
, Issue.5
, pp. 16-18
-
-
Kemp, M.1
-
21
-
-
36849047252
-
Distributed and control theoretic approach to intrusion detection
-
Honolulu, Hawaii, USA, ISBN: 978-1-59593-695-0
-
Khanna R., H. Liu, Distributed and control theoretic approach to intrusion detection, Proceedings of the 2007 international conference on Wireless communications and mobile computing, Honolulu, Hawaii, USA, ISBN: 978-1-59593-695-0, pp. 115-120.
-
Proceedings of the 2007 international conference on Wireless communications and mobile computing
, pp. 115-120
-
-
Khanna, R.1
Liu, H.2
-
23
-
-
84882800335
-
Simple, state-based approaches to program-based anomaly detection
-
August
-
Michael C. C., A. Ghosh, "Simple, state-based approaches to program-based anomaly detection", ACM Transactions on Information and System Security, Vol. 5, No. 3, August 2002, pp. 203-237.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
, pp. 203-237
-
-
Michael, C.C.1
Ghosh, A.2
-
24
-
-
34748915835
-
Host Based Intrusion Detection using Machine Learning
-
IEEE, USA, E-ISBN: 1-4244-1329-X
-
Moskovitch, R. P., S. Gus, I. Stopel, D. Feher, C. Parmet, Y. Shahar, Y. Elovici, Host Based Intrusion Detection using Machine Learning, Intelligence and Security Informatics, 2007 IEEE, USA, E-ISBN: 1-4244-1329-X, pp. 107-114.
-
(2007)
Intelligence and Security Informatics
, pp. 107-114
-
-
Moskovitch R., P.1
Gus, S.2
Stopel, I.3
Feher, D.4
Parmet, C.5
Shahar, Y.6
Elovici, Y.7
-
25
-
-
84969506768
-
Applications of hidden Markov models to detecting multistage network attacks
-
Ourston, D.; Matzner, S.; Stump, W.; Hopkins, B. Applications of hidden Markov models to detecting multistage network attacks, Proceedings of the 36th Annual Hawaii International Conference on System Sciences, 2003. Issue 6-9, pp.10-15.
-
(2003)
Proceedings of the 36th Annual Hawaii International Conference on System Sciences
, Issue.6-9
, pp. 10-15
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
26
-
-
34748917777
-
Short Query Sequences in Misuse Detection
-
ISI 2007, New Brunswick, New Jersey, USA,. IEEE
-
Platt A., N. Goharian: Short Query Sequences in Misuse Detection, Proceedings of IEEE International Conference on Intelligence and Security Informatics, ISI 2007, New Brunswick, New Jersey, USA,. IEEE 2007, pp.379-382.
-
(2007)
Proceedings of IEEE International Conference on Intelligence and Security Informatics
, pp. 379-382
-
-
Platt, A.1
Goharian, N.2
-
27
-
-
38049136994
-
Research on Hidden Markov Model for System Call Anomaly Detection
-
Chengdu, China
-
Qian Q., M. Xin, Research on Hidden Markov Model for System Call Anomaly Detection, Intelligence and Security Informatics, PAISI 2007, Chengdu, China, Volume 4430/2007, pp.152-159
-
(2007)
Intelligence and Security Informatics, PAISI 2007
, vol.4430
, pp. 152-159
-
-
Qian, Q.1
Xin, M.2
-
28
-
-
0024610919
-
A tutorial on Hidden Markov Models and selected applications in speech recognition
-
Feb
-
Rabiner L.R., A tutorial on Hidden Markov Models and selected applications in speech recognition, Proc. IEEE, 257-286, 77, 2, Feb 1989.
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
29
-
-
0022594196
-
An introduction to Hidden Markov Models
-
January
-
Rabiner L. R., B. H. Juang. An introduction to Hidden Markov Models, IEEE ASSP Magazine, pp.4-16, January 1986.
-
(1986)
IEEE ASSP Magazine
, pp. 4-16
-
-
Rabiner L., R.1
Juang, B.H.2
-
30
-
-
34548613852
-
Network Intrusion Detection Using Wavelet Analysis, Intelligent Information Technology
-
CIT 2004, Hyderabad, India, ISBN 978-3-540-24126-3
-
Rawat S., C. S. Sastry, Network Intrusion Detection Using Wavelet Analysis, Intelligent Information Technology, Proceedings of 7th International Conference on Information Technology, CIT 2004, Hyderabad, India, ISBN 978-3-540-24126-3, 2004, pp. 224-232.
-
(2004)
Proceedings of 7th International Conference on Information Technology
, pp. 224-232
-
-
Rawat, S.1
Sastry, C.S.2
-
31
-
-
34548158971
-
Genetic Algorithm Approach for Intrusion Detection
-
Hawaii, ISBN: 0-88986-424-1
-
Reddy Y.B., Genetic Algorithm Approach for Intrusion Detection, Proceedings of Modeling, Simulation, and Optimization MSO 2004, Hawaii, ISBN: 0-88986-424-1, 2004.
-
(2004)
Proceedings of Modeling, Simulation, and Optimization MSO 2004
-
-
Reddy, Y.B.1
-
32
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
S&P 2001
-
Sekar R., M. Bendre, Dhurjati, P. Bullineni, "A fast automaton-based method for detecting anomalous program behaviors, " IEEE Symposium on Security and Privacy, 2001. S&P 2001, pp. 144-155.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, P.B.3
-
33
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., Yang, H., Zhou S., Specification-based anomaly detection: a new approach for detecting network intrusions, Proceedings of the 9th ACM conference on Computer and communications security, 2002, pp. 265-274.
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
34
-
-
33845599591
-
On the Learning of System Call Attributes for Host-based Anomaly Detection
-
Tandon G., P. Chan, On the Learning of System Call Attributes for Host-based Anomaly Detection, International Journal on Artificial Intelligence Tools, 15(6), pp. 875-892, 2006.
-
(2006)
International Journal on Artificial Intelligence Tools
, vol.15
, Issue.6
, pp. 875-892
-
-
Tandon, G.1
Chan, P.2
-
36
-
-
80052233186
-
Intrusion Detection using an Improved Competitive Learning Lamstar Neural Network
-
February
-
Venkatachalam V., S. Selvan, Intrusion Detection using an Improved Competitive Learning Lamstar Neural Network, IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.2, February 2007, pp. 255-263.
-
(2007)
IJCSNS International Journal of Computer Science and Network Security
, vol.7
, Issue.2
, pp. 255-263
-
-
Venkatachalam, V.1
Selvan, S.2
|