-
1
-
-
70350553601
-
-
Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. Technical Report, Washington, PA, James P. Anderson Co. (1980)
-
Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. Technical Report, Washington, PA, James P. Anderson Co. (1980)
-
-
-
-
2
-
-
61349189046
-
-
Herrero, Á., Corchado, E., Pellicer, M., Abraham, A.: Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. In: Innovations in Hybrid Intelligent Systems. Advances in Soft Computing, 44, pp. 320-328. Springer, Heidelberg (2007)
-
Herrero, Á., Corchado, E., Pellicer, M., Abraham, A.: Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization. In: Innovations in Hybrid Intelligent Systems. Advances in Soft Computing, vol. 44, pp. 320-328. Springer, Heidelberg (2007)
-
-
-
-
4
-
-
33745590283
-
A Multi-agent Based System for Intrusion Detection
-
Hegazy, I.M., Al-Arif, T., Fayed, Z.T., Faheem, H.M.: A Multi-agent Based System for Intrusion Detection. IEEE Potentials 22(4), 28-31 (2003)
-
(2003)
IEEE Potentials
, vol.22
, Issue.4
, pp. 28-31
-
-
Hegazy, I.M.1
Al-Arif, T.2
Fayed, Z.T.3
Faheem, H.M.4
-
5
-
-
24344493979
-
CIDS: An agent-based intrusion detection system
-
Dasgupta, D., Gonzalez, F., Yallapu, K., Gomez, J., Yarramsettii, R.: CIDS: An agent-based intrusion detection system. Computers & Security 24(5), 387-398 (2005)
-
(2005)
Computers & Security
, vol.24
, Issue.5
, pp. 387-398
-
-
Dasgupta, D.1
Gonzalez, F.2
Yallapu, K.3
Gomez, J.4
Yarramsettii, R.5
-
6
-
-
33745660126
-
-
Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X.: Mobile Agents for Network Intrusion Resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, 3842, pp. 965-970. Springer, Heidelberg (2006)
-
Wang, H.Q., Wang, Z.Q., Zhao, Q., Wang, G.F., Zheng, R.J., Liu, D.X.: Mobile Agents for Network Intrusion Resistance. In: Shen, H.T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 965-970. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
35048820538
-
APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System
-
Karmouch, A, Korba, L, Madeira, E.R.M, eds, MATA, Springer, Heidelberg
-
Deeter, K., Singh, K., Wilson, S., Filipozzi, L., Vuong, S.: APHIDS: A Mobile Agent-Based Programmable Hybrid Intrusion Detection System. In: Karmouch, A., Korba, L., Madeira, E.R.M. (eds.) MATA 2004. LNCS, vol. 3284, pp. 244-253. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3284
, pp. 244-253
-
-
Deeter, K.1
Singh, K.2
Wilson, S.3
Filipozzi, L.4
Vuong, S.5
-
8
-
-
33745163595
-
-
Laskov, P., Dussel, P., Schafer, C., Rieck, K.: Learning Intrusion Detection: Supervised or Unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, 3617, pp. 50-57. Springer, Heidelberg (2005)
-
Laskov, P., Dussel, P., Schafer, C., Rieck, K.: Learning Intrusion Detection: Supervised or Unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 50-57. Springer, Heidelberg (2005)
-
-
-
-
9
-
-
0036321445
-
Use of K-Nearest Neighbor Classifier for Intrusion Detection
-
Liao, Y.H., Vemuri, V.R.: Use of K-Nearest Neighbor Classifier for Intrusion Detection. Computers & Security 21(5), 439-448 (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.H.1
Vemuri, V.R.2
-
10
-
-
17444432965
-
Hierarchical Kohonenen Net for Anomaly Detection in Network Security
-
Sarasamma, S.T., Zhu, Q.M.A., Huff, J.: Hierarchical Kohonenen Net for Anomaly Detection in Network Security. IEEE Transactions on Systems Man and Cybernetics, Part B 35(2), 302-312 (2005)
-
(2005)
IEEE Transactions on Systems Man and Cybernetics, Part B
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.M.A.2
Huff, J.3
-
12
-
-
33646252706
-
Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition
-
Duch, W, Kacprzyk, J, Oja, E, Zadrożny, S, eds, ICANN 2005, Springer, Heidelberg
-
Corchado, E., Herrero, A., Sáiz, J.M.: Detecting Compounded Anomalous SNMP Situations Using Cooperative Unsupervised Pattern Recognition. In: Duch, W., Kacprzyk, J., Oja, E., Zadrożny, S. (eds.) ICANN 2005. LNCS, vol. 3697, pp. 905-910. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3697
, pp. 905-910
-
-
Corchado, E.1
Herrero, A.2
Sáiz, J.M.3
-
13
-
-
35048866479
-
Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection
-
Pal, N.R, Kasabov, N, Mudi, R.K, Pal, S, Parui, S.K, eds, ICONIP 2004, Springer, Heidelberg
-
Sindhu, S.S.S., Ramasubramanian, P., Kannan, A.: Intelligent Multi-agent Based Genetic Fuzzy Ensemble Network Intrusion Detection. In: Pal, N.R., Kasabov, N., Mudi, R.K., Pal, S., Parui, S.K. (eds.) ICONIP 2004. LNCS, vol. 3316, pp. 983-988. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3316
, pp. 983-988
-
-
Sindhu, S.S.S.1
Ramasubramanian, P.2
Kannan, A.3
-
14
-
-
33749405937
-
Feature Selection of Intrusion Detection Data Using a Hybrid Genetic Algorithm/KNN Approach
-
IOS Press, Amsterdam
-
Middlemiss, M., Dick, G.: Feature Selection of Intrusion Detection Data Using a Hybrid Genetic Algorithm/KNN Approach. In: Design and application of hybrid intelligent systems, pp. 519-527. IOS Press, Amsterdam (2003)
-
(2003)
Design and application of hybrid intelligent systems
, pp. 519-527
-
-
Middlemiss, M.1
Dick, G.2
-
15
-
-
58149112412
-
Best Hybrid Classifiers for Intrusion Detection
-
Kholfi, S., Habib, M., Aljahdali, S.: Best Hybrid Classifiers for Intrusion Detection. Journal of Computational Methods in Science and Engineering 6(2), 299-307 (2006)
-
(2006)
Journal of Computational Methods in Science and Engineering
, vol.6
, Issue.2
, pp. 299-307
-
-
Kholfi, S.1
Habib, M.2
Aljahdali, S.3
-
17
-
-
14844312929
-
Operational Experiences with High-volume Network Intrusion Detection
-
ACM Press, New York
-
Dreger, H., Feldmann, A., Paxson, V., Sommer, R.: Operational Experiences with High-volume Network Intrusion Detection. In: Proc. of the 11th ACM Conf. on Computer and Communications Security, pp. 2-11. ACM Press, New York (2004)
-
(2004)
Proc. of the 11th ACM Conf. on Computer and Communications Security
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
18
-
-
33750943764
-
-
Hall, M., Wiley, K.: Capacity Verification for High Speed Network Intrusion Detection Systems. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, 2516, pp. 239-251. Springer, Heidelberg (2002)
-
Hall, M., Wiley, K.: Capacity Verification for High Speed Network Intrusion Detection Systems. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, pp. 239-251. Springer, Heidelberg (2002)
-
-
-
-
19
-
-
0013114810
-
Mining in a Data-Flow Environment: Experience in Network Intrusion Detection
-
ACM Press, San Diego
-
Lee, W., Stolfo, S.J., Mok, K.W.: Mining in a Data-Flow Environment: Experience in Network Intrusion Detection. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM Press, San Diego (1999)
-
(1999)
Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
22
-
-
3543075142
-
Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit
-
Corchado, E., MacDonald, D., Fyfe, C.: Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit. Data Mining and Knowledge Discovery 8(3), 203-225 (2004)
-
(2004)
Data Mining and Knowledge Discovery
, vol.8
, Issue.3
, pp. 203-225
-
-
Corchado, E.1
MacDonald, D.2
Fyfe, C.3
-
23
-
-
0842267461
-
Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors
-
Corchado, E., Fyfe, C.: Connectionist Techniques for the Identification and Suppression of Interfering Underlying Factors. Int. Journal of Pattern Recognition and Artificial Intelligence 17(8), 1447-1466 (2003)
-
(2003)
Int. Journal of Pattern Recognition and Artificial Intelligence
, vol.17
, Issue.8
, pp. 1447-1466
-
-
Corchado, E.1
Fyfe, C.2
-
24
-
-
0028401306
-
Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches
-
Aamodt, A., Plaza, E.: Case-Based Reasoning - Foundational Issues, Methodological Variations, and System Approaches. AI Communications 7(1), 39-59 (1994)
-
(1994)
AI Communications
, vol.7
, Issue.1
, pp. 39-59
-
-
Aamodt, A.1
Plaza, E.2
-
25
-
-
34248566933
-
Hybrid Multi-agent Architecture as a Real-Time Problem-Solving Model
-
Carrascosa, C., Bajo, J., Julián, V., Corchado, J.M., Botti, V.: Hybrid Multi-agent Architecture as a Real-Time Problem-Solving Model. Expert Systems with Applications: An International Journal 34(1), 2-17 (2008)
-
(2008)
Expert Systems with Applications: An International Journal
, vol.34
, Issue.1
, pp. 2-17
-
-
Carrascosa, C.1
Bajo, J.2
Julián, V.3
Corchado, J.M.4
Botti, V.5
-
28
-
-
1642460019
-
Structuring Global Responses of Local Filters Using Lateral Connections
-
Corchado, E., Han, Y., Fyfe, C.: Structuring Global Responses of Local Filters Using Lateral Connections. Journal of Experimental & Theoretical Artificial Intelligence 15(4), 473-487 (2003)
-
(2003)
Journal of Experimental & Theoretical Artificial Intelligence
, vol.15
, Issue.4
, pp. 473-487
-
-
Corchado, E.1
Han, Y.2
Fyfe, C.3
-
29
-
-
84862911217
-
The Rectified Gaussian Distribution
-
Seung, H.S., Socci, N.D., Lee, D.: The Rectified Gaussian Distribution. Advances in Neural Information Processing Systems 10, 350-356 (1998)
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
, pp. 350-356
-
-
Seung, H.S.1
Socci, N.D.2
Lee, D.3
-
30
-
-
0004077217
-
-
RFC-1157
-
Case, J., Fedor, M.S., Schoffstall, M.L., Davin, C.: Simple Network Management Protocol (SNMP). RFC-1157 (1990)
-
(1990)
Simple Network Management Protocol (SNMP)
-
-
Case, J.1
Fedor, M.S.2
Schoffstall, M.L.3
Davin, C.4
-
32
-
-
0036570725
-
-
Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. Int. Journal of Network Management 12(3), 135-144 (2002)
-
Myerson, J.M.: Identifying Enterprise Network Vulnerabilities. Int. Journal of Network Management 12(3), 135-144 (2002)
-
-
-
-
33
-
-
4243116400
-
The Spinning Cube of Potential Doom
-
Stephen, L.: The Spinning Cube of Potential Doom. Commun. ACM 47(6), 25-26 (2004)
-
(2004)
Commun. ACM
, vol.47
, Issue.6
, pp. 25-26
-
-
Stephen, L.1
|