-
4
-
-
0036090327
-
Practica automated detection of stealthy portscans
-
S. Staniford, J.A. Hoagland, J.M. McAlerney, Practica automated detection of stealthy portscans, Journal of Computer Security 10, 2002, pp. 105-136.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
5
-
-
71549167720
-
-
H.H. Hosmer, Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm, in: Proceedings of the 1992-1993 Workshop on New Security Paradigms Little Compton, RI, United States, 1993.
-
H.H. Hosmer, Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm, in: Proceedings of the 1992-1993 Workshop on New Security Paradigms Little Compton, RI, United States, 1993.
-
-
-
-
6
-
-
0033681199
-
Fuzzy network profiling for intrusion detection
-
Atlanta, GA
-
J.E. Dickerson, J.A. Dickerson, Fuzzy network profiling for intrusion detection, in: Proceedings of the 19th International Conference of the North American Fuzzy Information Processing Society (NAFIPS), Atlanta, GA, 2000,pp. 301-306.
-
(2000)
Proceedings of the 19th International Conference of the North American Fuzzy Information Processing Society (NAFIPS)
, pp. 301-306
-
-
Dickerson, J.E.1
Dickerson, J.A.2
-
7
-
-
74949104861
-
Applying genetic programming to intrusion detection
-
Cambridge, MA
-
M. Crosbie, G. Spafford, Applying genetic programming to intrusion detection, in: Working Notes for the AAAI Symposium on Genetic Programming, Cambridge, MA, 1995, pp. 1-8.
-
(1995)
Working Notes for the AAAI Symposium on Genetic Programming
, pp. 1-8
-
-
Crosbie, M.1
Spafford, G.2
-
8
-
-
0003846041
-
A Tutorial on Learning With Bayesian Networks, Microsoft Research
-
Technical Report MSRTR-95-06, March
-
D. Heckerman, A Tutorial on Learning With Bayesian Networks, Microsoft Research, Technical Report MSRTR-95-06, March 1995.
-
(1995)
-
-
Heckerman, D.1
-
9
-
-
84944220475
-
Adaptive model-based monitoring for cyber attack detection
-
Toulouse, France
-
A. Valdes, K. Skinner, Adaptive model-based monitoring for cyber attack detection, in: Recent Advances in Intrusion Detection Toulouse, France, 2000, pp. 80-92.
-
(2000)
Recent Advances in Intrusion Detection
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
10
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Las Vegas, NV
-
C. Kruegel, D. Mutz, W. Robertson, F. Valeur, Bayesian event classification for intrusion detection, in: Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, 2003.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
11
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
Melbourne, FL, USA
-
M.-L. Shyu, S.-C. Chen, K. Sarinnapakorn, L. Chang, A novel anomaly detection scheme based on principal component classifier, in: Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, Melbourne, FL, USA, 2003, pp. 172-179.
-
(2003)
Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop
, pp. 172-179
-
-
Shyu, M.-L.1
Chen, S.-C.2
Sarinnapakorn, K.3
Chang, L.4
-
12
-
-
77949451018
-
-
M.V. Mahoney, P.K. Chan, PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic Department of Computer Sciences, Florida Institute of Technology, Melbourne, FL, USA, Technical Report CS-2001-4, April 2001.
-
M.V. Mahoney, P.K. Chan, PHAD: Packet Header Anomaly Detection for Identifying Hostile Network Traffic Department of Computer Sciences, Florida Institute of Technology, Melbourne, FL, USA, Technical Report CS-2001-4, April 2001.
-
-
-
-
13
-
-
77949446111
-
-
Learning Models of Network Traffic for Detecting Novel Attacks Computer Science Department, Florida Institute of Technology CS-2002-8, August
-
M.V. Mahoney, P.K. Chan, Learning Models of Network Traffic for Detecting Novel Attacks Computer Science Department, Florida Institute of Technology CS-2002-8, August 2002.
-
(2002)
-
-
Mahoney, M.V.1
Chan, P.K.2
-
14
-
-
0242456801
-
Learning nonstationary models of normal network traffic for detecting novel attacks
-
Edmonton, Canada
-
M.V. Mahoney, P.K. Chan, Learning nonstationary models of normal network traffic for detecting novel attacks, in:Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, Canada, 2002, pp. 376-385.
-
(2002)
in:Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 376-385
-
-
Mahoney, M.V.1
Chan, P.K.2
-
15
-
-
33947146706
-
Distributed Intrusion Detection for Mobile Ad hoc Networks
-
P. Yi, Y. Jiang, Y. Zhong, and S. Zhang, Distributed Intrusion Detection for Mobile Ad hoc Networks, Proceedings of the 2005 Symposium on Applications and the Internet Workshops (SAINTW'05),pp. 94-97.
-
Proceedings of the 2005 Symposium on Applications and the Internet Workshops (SAINTW'05)
, pp. 94-97
-
-
Yi, P.1
Jiang, Y.2
Zhong, Y.3
Zhang, S.4
-
16
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
Washington, DC, USA, November 18-22
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, S. Zhou, Specification-based anomaly detection: a new approach for detecting network intrusions, Proceedings of the Ninth ACM Conference on Computer and Communications Security, Washington, DC, USA, November 18-22, 2002, pp. 265-274.
-
(2002)
Proceedings of the Ninth ACM Conference on Computer and Communications Security
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
|