-
1
-
-
26944484588
-
Modeling Computer Attacks: An Ontology for Intrusion Detection
-
Undercoffer. J, Joshi. A, Pinkston. J, "Modeling Computer Attacks: An Ontology for Intrusion Detection," Springer, pp. 113-135, 2003.
-
(2003)
Springer
, pp. 113-135
-
-
Undercoffer, J.1
Joshi, A.2
Pinkston, J.3
-
2
-
-
19544392472
-
A target centric ontology for intrusion detection: Using DAML+OIL to classify intrusive behaviors
-
Cambridge University Press, pp, January
-
J. Undercoffer, A. Joshi,, T. Finin, and John Pinkston, "A target centric ontology for intrusion detection: using DAML+OIL to classify intrusive behaviors," Knowledge Engineering Review, Cambridge University Press, pp. 23-29, January, 2004.
-
(2004)
Knowledge Engineering Review
, pp. 23-29
-
-
Undercoffer, J.1
Joshi, A.2
Finin, T.3
Pinkston, J.4
-
3
-
-
33746519172
-
An Ontology-based Multiagent Architecture for Outbound Intrusion Detection
-
Cairo, Egypt, January
-
S. Mandujano, A. Galván, J. A. Nolazco, "An Ontology-based Multiagent Architecture for Outbound Intrusion Detection", 3rd ACS/IEEE International Conference on Computer Systems and Applications, AICCSA '05, vol. 1, pp. 120-128, Cairo, Egypt, January 2005.
-
(2005)
3rd ACS/IEEE International Conference on Computer Systems and Applications, AICCSA '05
, vol.1
, pp. 120-128
-
-
Mandujano, S.1
Galván, A.2
Nolazco, J.A.3
-
4
-
-
0242456149
-
-
V. Raskin, C. Helpenmann, K. Triezenberg, and S. Nirenburg, Ontology in information security: a useful theoretical foundation and methodological tool, New Security Paradigms Workshop, ACM Press, pp. 53-59, Cloudcroft, NM, 2001.
-
V. Raskin, C. Helpenmann, K. Triezenberg, and S. Nirenburg, "Ontology in information security: a useful theoretical foundation and methodological tool", New Security Paradigms Workshop, ACM Press, pp. 53-59, Cloudcroft, NM, 2001.
-
-
-
-
5
-
-
24144468632
-
Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks
-
Yan, W., Hou, E., Ansari, N., "Extracting and querying network attack scenarios knowledge in IDS using PCTCG and alert semantic networks," IEEE International Conference 2005.
-
(2005)
IEEE International Conference
-
-
Yan, W.1
Hou, E.2
Ansari, N.3
-
6
-
-
74749093507
-
-
Yanxiang.H, Wei.C, Min.Y and Wenling.P ,Ontology Based Cooperative Intrusion Detection System, Network and Parallel Computing, 2004 springerlink
-
Yanxiang.H, Wei.C, Min.Y and Wenling.P ,"Ontology Based Cooperative Intrusion Detection System," Network and Parallel Computing, 2004 springerlink
-
-
-
-
8
-
-
74749086368
-
-
IDS, Intrusion Detection System
-
Klaus. M, IDS - Intrusion Detection System, 2005
-
(2005)
-
-
Klaus, M.1
-
9
-
-
33745725639
-
-
Anagnostopoulos, T.; Anagnostopoulos, C.; Hadjiefthymiades, S., Enabling attack behavior prediction in ubiquitous environments, Pervasive Services, ICPS '05. 2005.
-
Anagnostopoulos, T.; Anagnostopoulos, C.; Hadjiefthymiades, S., "Enabling attack behavior prediction in ubiquitous environments, "Pervasive Services, ICPS '05. 2005.
-
-
-
-
10
-
-
0038458145
-
Evolving Fuzzy Classifiers for Intrusion Detection
-
United States Military Academy, West Point NY, June
-
Gomez J., Dasgupta D., "Evolving Fuzzy Classifiers for Intrusion Detection," Proceeding Of 2002 IEEE Workshop on Information Assurance, United States Military Academy, West Point NY, June 2001.
-
(2001)
Proceeding Of 2002 IEEE Workshop on Information Assurance
-
-
Gomez, J.1
Dasgupta, D.2
-
11
-
-
0141540496
-
-
Guan Y., Ghorbani A. And Belacel N., Y-means: A Clustering Method for Intrusion Detection, Proceedings of Canadian Conference on Electrical and Computer Engineering. Montreal, Quebec, Canada. May 4-7, 2003.
-
Guan Y., Ghorbani A. And Belacel N., "Y-means: A Clustering Method for Intrusion Detection," Proceedings of Canadian Conference on Electrical and Computer Engineering. Montreal, Quebec, Canada. May 4-7, 2003.
-
-
-
-
12
-
-
6344266104
-
State Transition Analysis: A Rule-Based Intrusion Detection Approach
-
March
-
Ilgun K., Kemmerer R.A., and Porras P.A., "State Transition Analysis: A Rule-Based Intrusion Detection Approach," IEEE Transaction on Software Engineering, Vol 2, No 3, 21(3), March 1995.
-
(1995)
IEEE Transaction on Software Engineering
, vol.2
, Issue.3-3
, pp. 21
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
13
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Lee W., Stolfo S.J., Mok K., "A data mining framework for building intrusion detection models," Proceedings of IEEE Symposium on Security and Privacy, pp 120-132, 1999.
-
(1999)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.3
-
14
-
-
27544490151
-
NFIDS: A Neuro-Fuzzy Intrusion Detection System
-
Mohajerani M., Morini A., Kianie M. "NFIDS: A Neuro-Fuzzy Intrusion Detection System," IEEE 2003.
-
(2003)
IEEE
-
-
Mohajerani, M.1
Morini, A.2
Kianie, M.3
-
15
-
-
74749100974
-
-
NASA Center: Goddard Space Flight Center, Mar 1
-
Lait, Leslie R.; Nash, Eric R.; Newman, Paul A. , "The df A proposed data format standard," NASA Center: Goddard Space Flight Center, Mar 1, 1993
-
(1993)
The df A proposed data format standard
-
-
Lait, L.R.1
Nash, E.R.2
Newman, P.A.3
-
16
-
-
74749109910
-
-
09-Ashbindu-GEAS-19 October - The advantage of standard format alerts. www.oasis-open.org/events/ITU-T-
-
09-Ashbindu-GEAS-19 October - The advantage of standard format alerts. www.oasis-open.org/events/ITU-T-
-
-
-
-
17
-
-
74749110062
-
-
Simon H, Ray , A taxonomy of network and computer attacks, Elsevier, Computers & Security (2005) 24, 31e43
-
Simon H, Ray ," A taxonomy of network and computer attacks, "Elsevier, Computers & Security (2005) 24, 31e43
-
-
-
-
19
-
-
74749103320
-
-
DU.Y, WANG. H, PANG. Y, Design of A Distributed Intrusion Detection System Based on Independent Agents, IEEE 2004.
-
DU.Y, WANG. H, PANG. Y, "Design of A Distributed Intrusion Detection System Based on Independent Agents," IEEE 2004.
-
-
-
-
20
-
-
74749104552
-
-
http://protege.stanford.edu
-
-
-
-
21
-
-
74749092433
-
-
kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
-
-
-
22
-
-
71249154913
-
-
A. Nadjaran..T, M.Kahani, R.Monsefi ,Network Intrusion Detection Based on Neuro- Fuzzy Classification, ICOCI2006 Kuala Lumpur, Malaysia, June 6-8, 2006
-
A. Nadjaran..T, M.Kahani, R.Monsefi ,"Network Intrusion Detection Based on Neuro- Fuzzy Classification," ICOCI2006 (Kuala Lumpur, Malaysia, June 6-8, 2006
-
-
-
-
23
-
-
0142063808
-
Parzen-window Network Intrusion Detectors
-
Quebec City, Canada, pp, August
-
Yeung D. Y., Chow C., "Parzen-window Network Intrusion Detectors, Sixteenth International Conference on Pattern Recognition," Quebec City, Canada, pp. 11-15, August 2002.
-
(2002)
Sixteenth International Conference on Pattern Recognition
, pp. 11-15
-
-
Yeung, D.Y.1
Chow, C.2
-
24
-
-
0347606556
-
Winning the KDD99 Classification Cup: Bagged Boosting
-
Pfahringer B., Winning the KDD99 Classification Cup: Bagged Boosting, SIGKDD explorations, 1(2), 65-66, 2000.
-
(2000)
SIGKDD explorations
, vol.1
, Issue.2
, pp. 65-66
-
-
Pfahringer, B.1
-
25
-
-
1642354876
-
KDD-99 Classifier Learning Contest LLSoft's Results Overview, SIGKDD Explorations
-
Levin I., KDD-99 Classifier Learning Contest LLSoft's Results Overview, SIGKDD Explorations, ACM SIGKDD, 1(2) 67-75, 2000.
-
(2000)
ACM SIGKDD
, vol.1
, Issue.2
, pp. 67-75
-
-
Levin, I.1
-
27
-
-
0013029835
-
-
Technical Report TR 00-015, Depratment of Computer Science, University of Minnesota
-
Agarwal R., Joshi M. V., "PNrule: A New Framework for Learning Classifier Models in Data Mining," Technical Report TR 00-015, Depratment of Computer Science, University of Minnesota, 2000.
-
(2000)
PNrule: A New Framework for Learning Classifier Models in Data Mining
-
-
Agarwal, R.1
Joshi, M.V.2
|