-
2
-
-
0027327114
-
How the immune system recognizers invaders
-
Janeway, C.A.: How the Immune System Recognizers Invaders. Scientific American 269(3), 72-79 (1993)
-
(1993)
Scientific American
, vol.269
, Issue.3
, pp. 72-79
-
-
Janeway, C.A.1
-
4
-
-
84901516967
-
-
Computer virus, http://en.wikipedia.org/wiki/Computer-virus
-
Computer Virus
-
-
-
8
-
-
0027327114
-
How the immune system recognizers invaders
-
Janeway, C.A.: How the Immune System Recognizers Invaders. Scientific American 269(3), 72-79 (1993)
-
(1993)
Scientific American
, vol.269
, Issue.3
, pp. 72-79
-
-
Janeway, C.A.1
-
11
-
-
1442290852
-
Negative selection: How to generate detectors
-
Timmis, J., Bentley, P.J. (eds.) University of Kent at Canterbury Printing Unit, Canterbury
-
Ayara, M., Timmis, J., de Lemos, L., de Castro, R., Duncan, R.: Negative selection: How to generate detectors. In: Timmis, J., Bentley, P.J. (eds.) Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS), pp. 89-98. University of Kent at Canterbury Printing Unit, Canterbury (2002)
-
(2002)
Proceedings of the 1st International Conference on Artificial Immune Systems (ICARIS)
, pp. 89-98
-
-
Ayara, M.1
Timmis, J.2
De Lemos, L.3
De Castro, R.4
Duncan, R.5
-
12
-
-
0002893043
-
Immunology as information processing
-
Segel, L.A., Cohen I. (eds.) Oxford University Press, New York
-
Forrest, S., Hofmeyr, S.A.: Immunology as information processing. In: Segel, L.A., Cohen, I. (eds.) Design principles for the immune system and other distributed autonomous systems, Oxford University Press, New York (2000)
-
(2000)
Design Principles for the Immune System and Other Distributed Autonomous Systems
-
-
Forrest, S.1
Hofmeyr, S.A.2
-
15
-
-
0027961889
-
Self-nonself discrimination in a computer
-
IEEE Computer Society Press, Los Alamitos
-
Forest, S., Perelson, F., Allen, L., Cherukuri, R.: Self-Nonself Discrimination in a Computer. In: Proceedings IEEE Symposium on Research in Security and Privacy, pp. 202-212 IEEE Computer Society Press, Los Alamitos (1994)
-
(1994)
Proceedings IEEE Symposium on Research in Security and Privacy
, pp. 202-212
-
-
Forest, S.1
Perelson, F.2
Allen, L.3
Cherukuri, R.4
-
16
-
-
3543128182
-
-
Proceedings of the Genetic and Evolutionary Computation Conference (GECCO) Morgan Kaufmann Publishers, San Francisco
-
Balthrop, J., Esponda, F., Forrest, S., Glickman, M.: Coverage and Generalization in an Artificial Immune System. In: Proceedings of the Genetic and Evolutionary Computation Conference (GECCO), pp. 3-10. Morgan Kaufmann Publishers, San Francisco (2002)
-
(2002)
Coverage and Generalization in an Artificial Immune System
, pp. 3-10
-
-
Balthrop, J.1
Esponda, F.2
Forrest, S.3
Glickman, M.4
-
17
-
-
0034546374
-
Architecture for an artificial immune system
-
Hofmeyr, S., Forrest, S.: Architecture for an artificial immune system. EvolutionaryComputation 8(4), 443-473 (2000)
-
(2000)
EvolutionaryComputation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.1
Forrest, S.2
-
19
-
-
0020068152
-
Self-organized formation of topologically correct feature maps
-
Kohonen, T.: Self-organized Formation of Topologically Correct Feature Maps. Biological Cybernetics 43, 59-69 (1982)
-
(1982)
Biological Cybernetics
, vol.43
, pp. 59-69
-
-
Kohonen, T.1
-
22
-
-
74049141572
-
-
Kaspersky Lab: Antivirus software (2008), http://www.kaspersky.com
-
(2008)
Antivirus Software
-
-
-
25
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. IEEE Transaction on Software Engineering 21(3), 181-199 (1995)
-
(1995)
IEEE Transaction on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
26
-
-
74049157906
-
-
SNORT, http://www.snort.org
-
-
-
-
27
-
-
0003451777
-
-
Technical report Computer Science Laboratory SRI International Menlo Park California (February
-
Lunt, T., Tamaru, A., Gilham, F., et al.: A Real-time Intrusion Detection Expert System (IDES) - final technical report. Technical report, Computer Science Laboratory, SRI International, Menlo Park, California (February 1992)
-
(1992)
A Real-time Intrusion Detection Expert System (IDES) - Final Technical Report
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
-
30
-
-
84940104123
-
A data mining framework for adaptive intrusion detection
-
Los Alamos, CA
-
Lee, W., Stolfo, S., Mok, K.: A data mining framework for adaptive intrusion detection. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, Los Alamos, CA, pp. 120-132 (1999)
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
31
-
-
84885774862
-
A Framework for constructing features and models for intrusion detection systems
-
Lee, W., Stolfo, S.: A Framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3(4), 227-261 (2000)
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
32
-
-
1842712339
-
A genetic clustering method for intrusion detection
-
Liu, Y., Chen, K., Liao, X., et al.: A genetic clustering method for intrusion detection. Pattern Recognition 37(5), 927-934 (2004)
-
(2004)
Pattern Recognition
, vol.37
, Issue.5
, pp. 927-934
-
-
Liu, Y.1
Chen, K.2
Liao, X.3
-
33
-
-
0141797880
-
A Geometric framework for unsupervised anomaly detection
-
Kluwer Academics, Dordrecht
-
Eskin, E., Rnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A Geometric framework for unsupervised anomaly detection. In: Applications of Data Mining in Computer Security. Kluwer Academics, Dordrecht (2002)
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Rnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
34
-
-
27144518261
-
-
Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM 2003)
-
Shyu, M., Chen, S., Sarinnapakorn, K., Chang, L.: A Novel Anomaly Detection Scheme Based on Principal Component Classifier. In: Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM 2003), pp. 172-179 (2003)
-
(2003)
A Novel Anomaly Detection Scheme Based on Principal Component Classifier
, pp. 172-179
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
35
-
-
17544388668
-
On the capability of an SOM based intrusion detection system
-
Kayacik, H., Zincir-Heywood, A., Heywood, M.: On the capability of an SOM based intrusion detection system. In: Proc. IEEE Int. Joint Conf. Neural Networks (IJCNN 2003), pp. 1808-1813 (2003)
-
(2003)
Proc. IEEE Int. Joint Conf. Neural Networks (IJCNN 2003)
, pp. 1808-1813
-
-
Kayacik, H.1
Zincir-Heywood, A.2
Heywood, M.3
-
36
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
West Point, NY
-
Zhang, Z., Li, J., Manikopoulos, C.N., Jorgenson, J., Ucles, J.: HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, NY, pp. 85-90 (2001)
-
(2001)
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy
, pp. 85-90
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.N.3
Jorgenson, J.4
Ucles, J.5
-
37
-
-
74049125753
-
-
KDD Cup Competition 1999, http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html
-
(1999)
KDD Cup Competition
-
-
-
38
-
-
74049097693
-
Unsupervised learning for dimensionality reduction
-
University of Paisley, Scotland ICSS Academic Press, Canada
-
Golovko, V., Ignatiuk, O., Savitsky, Y., Laopoulos, T., Sachenko, A., Grandinetti, L.: Unsupervised learning for dimensionality reduction. In: Proc. of Second Int. ICSC Symposium on Engineering of Intelligent Systems EIS 2000, University of Paisley, Scotland, pp. 140-144. ICSS Academic Press, Canada (2000)
-
(2000)
Proc. of Second Int. ICSC Symposium on Engineering of Intelligent Systems EIS 2000
, pp. 140-144
-
-
Golovko, V.1
Ignatiuk, O.2
Savitsky, Y.3
Laopoulos, T.4
Sachenko, A.5
Grandinetti, L.6
-
39
-
-
84864859588
-
Outlier detection using replicator neural networks
-
Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002 Springer, Heidelberg
-
Hawkins, S., He, H., Williams, G., Baxter, R.: Outlier Detection Using Replicator Neural Networks. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2002. LNCS, vol.2454, pp. 170-180. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2454
, pp. 170-180
-
-
Hawkins, S.1
He, H.2
Williams, G.3
Baxter, R.4
-
40
-
-
74049135591
-
Some aspects of neural network: Approach for intrusion detection
-
Kowalik, Janusz, S., Gorski, J., Sachenko, A. (eds.) Springer, Heidelberg VIII, p. 382
-
Golovko, V., Kochurko, P.: Some Aspects of Neural Network: Approach for Intrusion Detection. In: Kowalik, Janusz, S., Gorski, J., Sachenko, A. (eds.) Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry, vol.196, pp. 367-382. Springer, Heidelberg (2005); VIII, p. 382
-
(2005)
Cyberspace Security and Defense: Research Issues. NATO Science Series II: Mathematics, Physics and Chemistry
, vol.196
, pp. 367-382
-
-
Golovko, V.1
Kochurko, P.2
-
41
-
-
74049119605
-
Neural network approach to anomaly detection improvement
-
Minsk, Belarus, May18-20
-
Kochurko, P., Golovko, V.: Neural Network Approach to Anomaly Detection Improvement. In: Proc. of 8th International Conference on Pattern Recognition and Information Processing (PRIP 2005), Minsk, Belarus, May18-20, pp. 416-419 (2005)
-
(2005)
Proc. of 8th International Conference on Pattern Recognition and Information Processing (PRIP 2005)
, pp. 416-419
-
-
Kochurko, P.1
Golovko, V.2
-
42
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
DOI 10.1016/S0167-8655(03)00004-7
-
Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24, 1795 - 1803 (2003) (Pubitemid 36558001)
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.12
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
43
-
-
0033888682
-
Selection of image classifier
-
Giacinto, G., Roli, F., Fumera, G.: Selection of image classifier. Electron 26(5), 420-422 (2000)
-
(2000)
Electron
, vol.26
, Issue.5
, pp. 420-422
-
-
Giacinto, G.1
Roli, F.2
Fumera, G.3
-
45
-
-
50149093146
-
Neural network ensembles for intrusion detection
-
Research Institute of Intelligent Computer Systems, Ternopil National Economic University and University of Applied Sciences Fachhochschule Dortmund - Dortmund, Germany
-
Golovko, V., Kachurka, P., Vaitsekhovich, L.: Neural Network Ensembles for Intrusion Detection. In: Proceedings of the 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2007), Research Institute of Intelligent Computer Systems, Ternopil National Economic University and University of Applied Sciences Fachhochschule Dortmund - Dortmund, Germany, pp. 578-583 (2007)
-
(2007)
Proceedings of the 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS 2007)
, pp. 578-583
-
-
Golovko, V.1
Kachurka, P.2
Vaitsekhovich, L.3
-
46
-
-
51749106573
-
Dimensionality reduction and attack recognition using neural network approaches
-
Orlando, FL, USA IEEE Computer Society, Los Alamitos
-
Golovko, V., Vaitsekhovich, L., Kochurko, P., Rubanau, U.: Dimensionality Reduction and Attack Recognition using Neural Network Approaches. In: Proceedings of the Joint Conference on Neural Networks (IJCNN 2007), Orlando, FL, USA, pp. 2734-2739. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
Proceedings of the Joint Conference on Neural Networks (IJCNN 2007)
, pp. 2734-2739
-
-
Golovko, V.1
Vaitsekhovich, L.2
Kochurko, P.3
Rubanau, U.4
-
47
-
-
0026954958
-
Principal components, minor components and linear networks
-
Oja, E.: Principal components, minor components and linear networks. Neural Networks 5, 927-935 (1992)
-
(1992)
Neural Networks
, vol.5
, pp. 927-935
-
-
Oja, E.1
-
48
-
-
0002552358
-
Improving performance in neural networks using a boosting algorithm
-
Hanson, S.J., Cowan, J.D., Giles, C.L. (eds.) Denver, CO Morgan Kaufmann, San Mateo
-
Drucker, H., Schapire, R., Simard, P.: Improving performance in neural networks using a boosting algorithm. In: Hanson, S.J., Cowan, J.D., Giles, C.L. (eds.) Advanced in Neural Information Processing Systems, Denver, CO, vol.5, pp. 42-49. Morgan Kaufmann, San Mateo (1993)
-
(1993)
Advanced in Neural Information Processing Systems
, vol.5
, pp. 42-49
-
-
Drucker, H.1
Schapire, R.2
Simard, P.3
|