-
1
-
-
34548453089
-
An agent based and biological inspired real- Time intrusion detection and security model for computer network operations
-
Sept.
-
A. Boukerche, R.B. Machado, K.R.L. Jucá , J.B.M. Sobral, and M.S.M.A. Notare, "An Agent Based and Biological Inspired Real- Time Intrusion Detection and Security Model for Computer Network Operations," Computer Comm., vol.30, no.13, pp. 2649- 2660, Sept. 2007.
-
(2007)
Computer Comm.
, vol.30
, Issue.13
, pp. 2649-2660
-
-
Boukerche, A.1
MacHado, R.B.2
Jucá, K.R.L.3
Sobral, J.B.M.4
Notare, M.S.M.A.5
-
2
-
-
2642537707
-
An artificial immune based intrusion detection model for computer and telecommunication systems
-
A. Boukerche, K.R.L. Juc, J.B. Sobral, and M.S.M.A. Notare, "An Artificial Immune Based Intrusion Detection Model for Computer and Telecommunication Systems," Parallel Computing, vol.30, nos. 5/6, pp. 629-646, 2004.
-
(2004)
Parallel Computing
, vol.30
, Issue.5-6
, pp. 629-646
-
-
Boukerche, A.1
Juc, K.R.L.2
Sobral, J.B.3
Notare, M.S.M.A.4
-
3
-
-
0036749185
-
Behavior-based intrusion detection in mobile phone systems
-
A. Boukerche and M.S.M.A. Notare, "Behavior-Based Intrusion Detection in Mobile Phone Systems," J. Parallel and Distributed Computing, vol.62, no.9, pp. 1476-1490, 2002.
-
(2002)
J. Parallel and Distributed Computing
, vol.62
, Issue.9
, pp. 1476-1490
-
-
Boukerche, A.1
Notare, M.S.M.A.2
-
4
-
-
34547626540
-
Survey and taxonomy of feature selection algorithms in intrusion detection system
-
Y. Chen, Y. Li, X. Cheng, and L. Guo, "Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System," Proc. Conf. Information Security and Cryptology (Inscrypt), 2006.
-
(2006)
Proc. Conf. Information Security and Cryptology (Inscrypt)
-
-
Chen, Y.1
Li, Y.2
Cheng, X.3
Guo, L.4
-
6
-
-
77954309409
-
-
http://kdd.ics.uci.edu/databases/kddcup99/task.html, 2010.
-
(2010)
-
-
-
8
-
-
84943383590
-
Identifying important features for intrusion detection using support vector machines and neural networks
-
Jan.
-
A.H. Sung and S. Mukkamala, "Identifying Important Features for Intrusion Detection Using Support Vector Machines and Neural Networks," Proc. Symp. Applications and the Internet (SAINT '03), Jan. 2003.
-
(2003)
Proc. Symp. Applications and the Internet (SAINT '03)
-
-
Sung, A.H.1
Mukkamala, S.2
-
9
-
-
77953759247
-
Decision tree classifier for network intrusion detection with ga-based feature selection
-
Mar.
-
G. Stein, B. Chen, A.S. Wu, and K.A. Hua, "Decision Tree Classifier for Network Intrusion Detection with GA-Based Feature Selection," Proc. 43rd ACM Southeast Regional Conf.-Volume 2, Mar. 2005.
-
(2005)
Proc. 43rd ACM Southeast Regional Conf.-Volume 2
-
-
Stein, G.1
Chen, B.2
Wu, A.S.3
Hua, K.A.4
-
11
-
-
84925368904
-
802.11 Denial-of-service attacks: Real Vulnerabilities and practical solutions
-
J. Bellardo and S. Savage, "802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions," Proc. USENIX Security Symp., pp. 15-28, 2003.
-
(2003)
Proc. USENIX Security Symp.
, pp. 15-28
-
-
Bellardo, J.1
Savage, S.2
-
12
-
-
77954313420
-
-
http://www.aircrack-ng.org/, 2010.
-
(2010)
-
-
-
14
-
-
33847254494
-
Intrusion detection inwireless networks using clustering techniques with expert analysis
-
Dec.
-
T.M. Khoshgoftaar, S.V. Nath, S. Zhong, and N. Seliya, "Intrusion Detection inWireless Networks Using Clustering Techniques with Expert Analysis," Proc. Fourth Int'l Conf. Machine Learning and Applications, Dec. 2005.
-
(2005)
Proc. Fourth Int'l Conf. Machine Learning and Applications
-
-
Khoshgoftaar, T.M.1
Nath, S.V.2
Zhong, S.3
Seliya, N.4
-
18
-
-
33744584654
-
Induction of decision trees
-
J.R. Quinlan, "Induction of Decision Trees," Machine Learning, vol.1, pp. 81-106, 1986.
-
(1986)
Machine Learning
, vol.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
20
-
-
77954313325
-
-
NeuroSolutions, Inc., http://www.neurosolutions.com/, 2010.
-
(2010)
-
-
-
21
-
-
77954313705
-
-
CERT, http://www.cert.org/stats/, 2010.
-
(2010)
-
-
-
22
-
-
11244319474
-
A framework for wireless LAN monitoring and its applications
-
J. Yeo, M. Youssef, and A. Agrawala, "A Framework for Wireless LAN Monitoring and Its Applications," Proc. ACM Workshop Wireless Security, pp. 70-79, 2004.
-
(2004)
Proc. ACM Workshop Wireless Security
, pp. 70-79
-
-
Yeo, J.1
Youssef, M.2
Agrawala, A.3
-
23
-
-
34547626540
-
Survey and taxonomy of feature selection algorithms in intrusion detection system
-
Y. Chen, Y. Li, X. Cheng, and L. Guo, "Survey and Taxonomy of Feature Selection Algorithms in Intrusion Detection System," Proc. Conf. Information Security and Cryptology (Inscrypt), 2006.
-
(2006)
Proc. Conf. Information Security and Cryptology (Inscrypt)
-
-
Chen, Y.1
Li, Y.2
Cheng, X.3
Guo, L.4
-
26
-
-
1542286866
-
Energy-aware data- centric routing in microsensor networks
-
A. Boukerche, X. Cheng, and J. Linus, "Energy-Aware Data- Centric Routing in Microsensor Networks," Proc. Sixth ACM Int'l Workshop Modeling Analysis and Simulation of Wireless and Mobile Systems, pp. 42-49, 2003.
-
(2003)
Proc. Sixth ACM Int'l Workshop Modeling Analysis and Simulation of Wireless and Mobile Systems
, pp. 42-49
-
-
Boukerche, A.1
Cheng, X.2
Linus, J.3
|