-
1
-
-
0036508551
-
CSI/FBI computer crime and security survey
-
20002
-
R. Power, "2002 CSI/FBI computer crime and security survey," Computer Security Journal, Vol.XVIII, No.2, pp: 7-30, 20002.
-
(2002)
Computer Security Journal
, vol.18
, Issue.2
, pp. 7-30
-
-
Power, R.1
-
2
-
-
76249083039
-
-
Master's thesis, Donau University, Krems, Austria, May
-
A. Delamer, "intrusion detection with data mining," Master's thesis, Donau University, Krems, Austria, May 2002.
-
(2002)
Intrusion Detection with Data Mining
-
-
Delamer, A.1
-
4
-
-
0037105910
-
-
Elsevier: computer communications
-
T. Verwoed and R. Hunt, "intrusion detection techniques and approaches," Elsevier: computer communications, Vol.25, No.10,pp 1356-1365, 2002.
-
(2002)
Intrusion Detection Techniques and Approaches
, vol.25
, Issue.10
, pp. 1356-1365
-
-
Verwoed, T.1
Hunt, R.2
-
5
-
-
19944364877
-
-
Elsevier computers & security
-
S. Chobrolu, A. Abraham, P. Johnson, "feature deduction and ensemble design of intrusion detection systems," Elsevier computers & security, Vol.24, pp: 195-307, 2005.
-
(2005)
Feature Deduction and Ensemble Design of Intrusion Detection Systems
, vol.24
, pp. 195-307
-
-
Chobrolu, S.1
Abraham, A.2
Johnson, P.3
-
6
-
-
33746983029
-
Detection of intrusions in information systems by sequential change-point methods
-
DOI 10.1016/j.stamet.2005.05.003, PII S1572312705000493
-
A. Tartakovsky, et al., "detection intrusion in information system by sequential change-point methods," Elsevier, statistical methodology, Vol.3, pp: 252-293, 2006. (Pubitemid 44202523)
-
(2006)
Statistical Methodology
, vol.3
, Issue.3
, pp. 252-293
-
-
Tartakovsky, A.G.1
Rozovskii, B.L.2
Blazek, R.B.3
Kim, H.4
-
7
-
-
0034301517
-
1999-DARPA offline intrusion detection evaluation
-
R. Lippmann, et al., "1999-DARPA offline intrusion detection evaluation," Computer networks, Vol.34, pp: 579-595, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
-
8
-
-
76249107464
-
-
http://kdd.ics.uci.edU/databases/kddcup99/kddcup99.html/
-
-
-
-
9
-
-
76249094946
-
-
information systems & information technology
-
G. Mum, Y. Kim, et al., "network intrusion detection using statistical probability distribution," information systems & information technology, Vol.3984, pp: 340-348, 2006.
-
(2006)
Network Intrusion Detection Using Statistical Probability Distribution
, vol.3984
, pp. 340-348
-
-
Mum, G.1
Kim, Y.2
-
12
-
-
34547543705
-
-
intelligent systems design & applications. ISDA 6th int. conference, October
-
Y. Yu, Y. Wei, et al, "anomaly intrusion detection approach using hybrid MLP/CNN neural network," intelligent systems design & applications. ISDA 6th int. conference, Vol.2, issue.16-18, pp: 1095-1102, October, 2006.
-
(2006)
Anomaly Intrusion Detection Approach Using Hybrid MLP/CNN Neural Network
, vol.2
, Issue.16-18
, pp. 1095-1102
-
-
Yu, Y.1
Wei, Y.2
-
13
-
-
38049117676
-
-
proceedings of 4th international symposium on neural networks: advances in neural networks part
-
J. Skaruz, "recurrent neural networks on duty of anomaly detection in databases," proceedings of 4th international symposium on neural networks: advances in neural networks part III, pp: 85-94, 2007.
-
(2007)
Recurrent Neural Networks on Duty of Anomaly Detection in Databases
, vol.3
, pp. 85-94
-
-
Skaruz, J.1
-
14
-
-
85089792195
-
Identifying intrusions in computer networks with principle component analysis
-
W. Wang and R. Battiti, "identifying intrusions in computer networks with principle component analysis," ARES2006 IEEE computer society, pp. 270-279.
-
ARES2006 IEEE Computer Society
, pp. 270-279
-
-
Wang, W.1
Battiti, R.2
-
15
-
-
76249088310
-
RBF neural networkbased model predictive control for freeway traffic systems
-
W. Dongli, Z. Yan, and H. Xiaoyang, "RBF neural networkbased model predictive control for freeway traffic systems," International Journal of Intelligent Systems Technologies and Applications, Vol.2, No.4, pp. 370-388, 2007.
-
(2007)
International Journal of Intelligent Systems Technologies and Applications
, vol.2
, Issue.4
, pp. 370-388
-
-
Dongli, W.1
Yan, Z.2
Xiaoyang, H.3
-
16
-
-
48749120519
-
Intrusion detection system using self organizing map
-
L. Vokorokos, A. Baláž, M. Chovanec, "intrusion detection system using self organizing map," Acta Electrotechnica et Informática No.1, Vol.6, pp: 16, 2006
-
(2006)
Acta Electrotechnica et Informática
, vol.6
, Issue.1
, pp. 16
-
-
Vokorokos, L.1
Baláž, A.2
Chovanec, M.3
|