-
2
-
-
0029716418
-
A sense of self for unix processes
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: IEEE Symposium on Security and Privacy. (1996) 120-128
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
3
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
Schonlau, M., Theus, M.: Detecting masquerades in intrusion detection based on unpopular commands. Inf. Process. Lett. 76(1-2) (2000) 33-38
-
(2000)
Inf. Process. Lett
, vol.76
, Issue.1-2
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
4
-
-
62349107432
-
Distance measures for anomaly intrusion detection
-
Wang, W., Gombault, S.: Distance measures for anomaly intrusion detection. In: Security and Management. (2007) 17-23
-
(2007)
Security and Management
, pp. 17-23
-
-
Wang, W.1
Gombault, S.2
-
6
-
-
35048885009
-
-
Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: RAID. (2004) 203-222
-
Wang, K., Stolfo, S.J.: Anomalous payload-based network intrusion detection. In: RAID. (2004) 203-222
-
-
-
-
7
-
-
56549083190
-
-
Nassar, M., State, R., Festor, O.: Monitoring sip traffic using support vector machines. In: RAID. (2008) 311-330
-
Nassar, M., State, R., Festor, O.: Monitoring sip traffic using support vector machines. In: RAID. (2008) 311-330
-
-
-
-
8
-
-
77949866276
-
-
MIT: Mit lincoln laboratory-darpa intrusion detection evaluation (retrieved march 2009) (1999) http://www.ll.mit.edu/mission/communications/ist/ corpora/ideval/index. html.
-
MIT: Mit lincoln laboratory-darpa intrusion detection evaluation (retrieved march 2009) (1999) http://www.ll.mit.edu/mission/communications/ist/ corpora/ideval/index. html.
-
-
-
-
9
-
-
77949861787
-
-
KDD-Data: Kdd cup 1999 data (retrieved march 2009) (1999) http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
-
KDD-Data: Kdd cup 1999 data (retrieved march 2009) (1999) http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html.
-
-
-
-
10
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4) (2000) 262-294
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
11
-
-
34147111253
-
Network intrusion detection in covariance feature space
-
Jin, S., Yeung, D.S., Wang, X.: Network intrusion detection in covariance feature space. Pattern Recognition 40(8) (2007) 2185-2197
-
(2007)
Pattern Recognition
, vol.40
, Issue.8
, pp. 2185-2197
-
-
Jin, S.1
Yeung, D.S.2
Wang, X.3
-
12
-
-
34248169333
-
Network intrusion detection: Evaluating cluster, discriminant, and logit analysis
-
Katos, V.: Network intrusion detection: Evaluating cluster, discriminant, and logit analysis. Inf. Sci. 177(15) (2007) 3060-3073
-
(2007)
Inf. Sci
, vol.177
, Issue.15
, pp. 3060-3073
-
-
Katos, V.1
-
14
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
Mukkamala, S., Sung, A.H., Abraham, A.: Intrusion detection using an ensemble of intelligent paradigms. J. Network and Computer Applications 28(2) (2005) 167-182
-
(2005)
J. Network and Computer Applications
, vol.28
, Issue.2
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
15
-
-
34548651677
-
-
Li, Y., Fang, B., Guo, L., Chen, Y.: Network anomaly detection based on tcm-knn algorithm. In: ASIACCS. (2007) 13-19
-
Li, Y., Fang, B., Guo, L., Chen, Y.: Network anomaly detection based on tcm-knn algorithm. In: ASIACCS. (2007) 13-19
-
-
-
-
16
-
-
51849135423
-
-
Ma, W., Tran, D., Sharma, D.: A study on the feature selection of network traffic for intrusion detection purpose. In: ISI. (2008) 245-247
-
Ma, W., Tran, D., Sharma, D.: A study on the feature selection of network traffic for intrusion detection purpose. In: ISI. (2008) 245-247
-
-
-
-
17
-
-
33750516723
-
Adaptive anomaly detection with evolving connectionist systems
-
Liao, Y., Vemuri, V.R., Pasos, A.: Adaptive anomaly detection with evolving connectionist systems. J. Network and Computer Applications 30(1) (2007) 60-80
-
(2007)
J. Network and Computer Applications
, vol.30
, Issue.1
, pp. 60-80
-
-
Liao, Y.1
Vemuri, V.R.2
Pasos, A.3
-
18
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
Shyu, M., Chen, S., Sarinnapakorn, K., Chang, L.: A novel anomaly detection scheme based on principal component classifier. In: IEEE Foundations and New Directions of Data Mining Workshop. (2003) 60-80
-
(2003)
IEEE Foundations and New Directions of Data Mining Workshop
, pp. 60-80
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
19
-
-
33750949942
-
-
Wang, W., Battiti, R.: Identifying intrusions in computer networks with principal component analysis. In: ARES. (2006) 270-279
-
Wang, W., Battiti, R.: Identifying intrusions in computer networks with principal component analysis. In: ARES. (2006) 270-279
-
-
-
-
20
-
-
37049002837
-
Processing of massive audit data streams for real-time anomaly intrusion detection
-
Wang, W., Guan, X., Zhang, X.: Processing of massive audit data streams for real-time anomaly intrusion detection. Computer Communications 31(1) (2008) 58-72
-
(2008)
Computer Communications
, vol.31
, Issue.1
, pp. 58-72
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
24
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Schölkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Computation 13(7) (2001) 1443-1471
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
26
-
-
77949853640
-
-
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. (2001) Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
-
Chang, C.C., Lin, C.J.: LIBSVM: a library for support vector machines. (2001) Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
-
-
-
|