-
1
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Chalmers Univ.
-
Axelsson, S.: Intrusion detection systems: A survey and taxonomy. Technical Report 99-115, Chalmers Univ. (2000)
-
(2000)
Technical Report 99-115
-
-
Axelsson, S.1
-
3
-
-
55849134088
-
Naive bayesian networks in intrusion detection systems
-
Cavtat-Dubrovnik, Croatia
-
Ben-Amor, N., Benferhat, S., Elouedi, Z.: Naive bayesian networks in intrusion detection systems. In: ACM, Cavtat-Dubrovnik, Croatia (2003)
-
(2003)
ACM
-
-
Ben-Amor, N.1
Benferhat, S.2
Elouedi, Z.3
-
4
-
-
33847218306
-
On the combination of naive bayes and decision trees for intrusion detection
-
Benferhat, S., Tabia, K.: On the combination of naive bayes and decision trees for intrusion detection. In: CIMCA/IAWTIC, pp. 211-216 (2005)
-
(2005)
CIMCA/IAWTIC
, pp. 211-216
-
-
Benferhat, S.1
Tabia, K.2
-
5
-
-
58049166325
-
Classification features for detecting server-side and client-side web attacks
-
Italy
-
Benferhat, S., Tabia, K.: Classification features for detecting server-side and client-side web attacks. In: 23rd International Security Conference, Italy (2008)
-
(2008)
23rd International Security Conference
-
-
Benferhat, S.1
Tabia, K.2
-
6
-
-
49049115980
-
Context-based profiling for anomaly intrusion detection with diagnosis
-
Barcelona, Spain
-
Benferhat, S., Tabia, K.: Context-based profiling for anomaly intrusion detection with diagnosis. In: ARES 2008: Third International Conference on Availability, Reliability and Security, Barcelona, Spain (2008)
-
(2008)
ARES 2008: Third International Conference on Availability, Reliability and Security
-
-
Benferhat, S.1
Tabia, K.2
-
7
-
-
0038428854
-
Results of the KDD 1999 classifier learning
-
Elkan, C.: Results of the KDD 1999 classifier learning. SIGKDD Explorations 1(2), 63-64 (2000)
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
8
-
-
0031276011
-
Bayesian network classifiers
-
Friedman, N., Geiger, D., Goldszmidt, M.: Bayesian network classifiers. Machine Learning 29(2-3), 131-163 (1997)
-
(1997)
Machine Learning
, vol.29
, Issue.2-3
, pp. 131-163
-
-
Friedman, N.1
Geiger, D.2
Goldszmidt, M.3
-
9
-
-
38149142569
-
Comparing anomaly detection techniques for HTTP
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
-
Ingham, K.L., Inoue, H.: Comparing anomaly detection techniques for HTTP. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol.4637, pp. 42-62. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 42-62
-
-
Ingham, K.L.1
Inoue, H.2
-
11
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Las Vegas, Nevada
-
Kruegel, C., Mutz, D., Robertson, W., Valeur, F.: Bayesian event classification for intrusion detection. In: 19th Annual Computer Security Applications Conference, Las Vegas, Nevada (2003)
-
(2003)
19th Annual Computer Security Applications Conference
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
12
-
-
0003900915
-
An application of pattern matching in intrusion detection
-
Department of Computer Scien'ces, Purdue University, West Lafayette
-
Kumar, S., Spafford, E.H.: An application of pattern matching in intrusion detection. Tech. Rep. CSD-TR-94-1013, Department of Computer Scien'ces, Purdue University, West Lafayette (1994)
-
(1994)
Tech. Rep. CSD-TR-94-1013
-
-
Kumar, S.1
Spafford, E.H.2
-
14
-
-
0034301517
-
The 1999 darpa off-line intrusion detection evaluation
-
Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 darpa off-line intrusion detection evaluation. Computer Networks 34(4) (2000)
-
(2000)
Computer Networks
, vol.34
, Issue.4
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
16
-
-
33744584654
-
Induction of decision trees
-
Quinlan, J.R.: Induction of decision trees. Mach. Learn. 1(1) (1986)
-
(1986)
Mach. Learn.
, vol.1
, Issue.1
-
-
Quinlan, J.R.1
-
20
-
-
21644481499
-
A serial combination of anomaly and misuse idses applied to http traffic
-
Tombini, E., Debar, H., Me, L., Ducasse, M.: A serial combination of anomaly and misuse idses applied to http traffic. In: ACSAC 2004: Proceedings of the 20th Annual Computer Security Applications Conference, pp. 428-437 (2004)
-
(2004)
ACSAC 2004: Proceedings of the 20th Annual Computer Security Applications Conference
, pp. 428-437
-
-
Tombini, E.1
Debar, H.2
Me, L.3
Ducasse, M.4
-
21
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
Debar, H., Ḿe, L., Wu, S.F. (eds.) RAID 2000. Springer, Heidelberg
-
Valdes, A., Skinner, K.: Adaptive, model-based monitoring for cyber attack detection. In: Debar, H., Ḿe, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol.1907, pp. 80-92. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1907
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
|