-
1
-
-
0035879674
-
Intrusion detection through learning behavior model
-
2001
-
B. Balajinath, and S. V. Raghavan, Intrusion Detection Through Learning Behavior Model. Computer Communications vol. 24, pp.1202-1212, 2001, 2001.
-
(2001)
Computer Communications
, vol.24
, pp. 1202-1212
-
-
Balajinath, B.1
Raghavan, S.V.2
-
3
-
-
70449108815
-
The application of genetic algorithm to attribute selection and discretization for rough set theory
-
Hua Fan University Taiwan
-
C. L. Huang and W. C. Tang, The Application of Genetic Algorithm to Attribute Selection and Discretization for Rough Set Theory. Information Management Thesis, Hua Fan University Taiwan, 2003.
-
(2003)
Information Management Thesis
-
-
Huang, C.L.1
Tang, W.C.2
-
4
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D. Y. Yeung and Y. Ding, Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition, vol.36, pp. 229-243, 2003.
-
(2003)
Pattern Recognition
, vol.36
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
-
5
-
-
37249033556
-
-
Guide of LIBSVM. http://www.csie.ntu.edu.tw/~cjlin/papers/guide/guide.pdf
-
Guide of LIBSVM
-
-
-
6
-
-
34547793690
-
Building intrusion pattern miner for snort network intrusion detection system
-
L. C. Wuu, C. H. Hung and S. F. Chen, Building Intrusion Pattern Miner for Snort Network Intrusion Detection System. Journal of Systems and Software, vol.80, Issue 10, pp. 1699-1715, 2007.
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.10
, pp. 1699-1715
-
-
Wuu, L.C.1
Hung, C.H.2
Chen, S.F.3
-
7
-
-
70449126869
-
-
MIT
-
MIT,http://www.ll.mit.edu/IST/ideval/data/1998/1998-data-index. html, 2008.
-
(2008)
-
-
-
8
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
DOI 10.1016/j.comcom.2007.05.002, PII S0140366407001855
-
N. Toosi and M. Kahani, A New Approach to Intrusion detection based on An Evolutionary Soft Computing Model Using Neuro-Fuzzy Classifiers. Computer Communications, vol.30, Issue 10, pp. 2201-2212, 2007. (Pubitemid 47094963)
-
(2007)
Computer Communications
, vol.30
, Issue.10
, pp. 2201-2212
-
-
Toosi, A.N.1
Kahani, M.2
-
9
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
O. Depren, M. Topallar, E. Anarim and M. K. Ciliz, An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks. Expert Systems with Applications, vol.29, pp. 713-722, 2005.
-
(2005)
Expert Systems with Applications
, vol.29
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
10
-
-
63649137061
-
Intrusion detection using a hybrid support vector machine based on entropy and TF-IDF
-
R. C. Chen and S. P. Chen, Intrusion Detection Using a Hybrid Support Vector Machine Based on Entropy and TF-IDF. International Journal of Innovative Computing, Information and Control (IJICIC) Vol.4, Number 2, pp. 413-424, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control (IJICIC)
, vol.4
, Issue.2
, pp. 413-424
-
-
Chen, R.C.1
Chen, S.P.2
-
11
-
-
21644443817
-
Automatic generation and analysis of NIDS attacks
-
IEEE Computer Society
-
S. Rubin, S. Jha, and B. Miller, Automatic Generation and Analysis of NIDS Attacks. Proceedings of 20th Annual Computer Security Application Conference, IEEE Computer Society, vol.00, pp. 28-38, 2004.
-
(2004)
Proceedings of 20th Annual Computer Security Application Conference
, pp. 28-38
-
-
Rubin, S.1
Jha, S.2
Miller, B.3
-
12
-
-
57749090943
-
A hybrid approach of rough set theory and genetic algorithm for svm-based intrusion detection
-
Chung Hua University Taiwan
-
W. T. Wong and Y. C. Chang, A Hybrid Approach of Rough Set Theory and Genetic Algorithm for SVM-based Intrusion Detection. Information Management Thesis, Chung Hua University Taiwan, 2005.
-
(2005)
Information Management Thesis
-
-
Wong, W.T.1
Chang, Y.C.2
-
14
-
-
21844433474
-
Application of online-training SVMs for real-time intrusion detection with different considerations
-
Z. Zhang and H. Shen, Application of Online-training SVMs for Real-time Intrusion Detection with Different Considerations. Computer Communications, vol.28, pp. 1428-1442, 2005.
-
(2005)
Computer Communications
, vol.28
, pp. 1428-1442
-
-
Zhang, Z.1
Shen, H.2
|