-
1
-
-
39049157381
-
Evolutionary design of intrusion detection programs
-
A. Abraham, C. Grosan, C. Martin-Vide, Evolutionary design of intrusion detection programs. Int. J. Netw. Secur. 4(3), 328-339 (2007)
-
(2007)
Int. J. Netw. Secur.
, vol.4
, Issue.3
, pp. 328-339
-
-
Abraham, A.1
Grosan, C.2
Martin-Vide, C.3
-
2
-
-
0036808672
-
Parallelism and evolutionary algorithms
-
E. Alba, M. Tomassini, Parallelism and evolutionary algorithms. IEEE Trans. Evol. Comput. 6(5), 443-462 (2002)
-
(2002)
IEEE Trans. Evol. Comput.
, vol.6
, Issue.5
, pp. 443-462
-
-
Alba, E.1
Tomassini, M.2
-
4
-
-
0031191630
-
The use of the area under the roc curve in the evaluation of machine learning algorithms
-
A.P. Bradley, The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognit. 30(7), 1145-1159 (1997)
-
(1997)
Pattern Recognit.
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.P.1
-
8
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
(Kluwer)
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In Applications of Data Mining in Computer Security (Kluwer, 2002)
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
9
-
-
55349133200
-
Genetic programming approach for multi-category pattern classification applied to network intrusions detection
-
K. Faraoun, A. Boukelif, Genetic programming approach for multi-category pattern classification applied to network intrusions detection. Int. J. Comput. Intell. Appl. 6(1), 77-99 (2006)
-
(2006)
Int. J. Comput. Intell. Appl.
, vol.6
, Issue.1
, pp. 77-99
-
-
Faraoun, K.1
Boukelif, A.2
-
10
-
-
0037297960
-
A scalable cellular implementation of parallel genetic programming
-
G. Folino, C. Pizzuti, G. Spezzano, A scalable cellular implementation of parallel genetic programming. IEEE Trans. Evol. Comput. 7(1), 37-53 (2003)
-
(2003)
IEEE Trans. Evol. Comput.
, vol.7
, Issue.1
, pp. 37-53
-
-
Folino, G.1
Pizzuti, C.2
Spezzano, G.3
-
11
-
-
27244445673
-
GP ensemble for distributed intrusion detection systems
-
G. Folino, C. Pizzuti, G. Spezzano, GP ensemble for distributed intrusion detection systems. In ICAPR 2005, Proceedings of the 3rd International Conference on Advanced in Pattern Recognition (2005), pp. 54-62
-
(2005)
ICAPR 2005, Proceedings of the 3rd International Conference on Advanced in Pattern Recognition
, pp. 54-62
-
-
Folino, G.1
Pizzuti, C.2
Spezzano, G.3
-
12
-
-
33749865403
-
GP ensembles for large scale data classification
-
G. Folino, C. Pizzuti, G. Spezzano, GP ensembles for large scale data classification. IEEE Trans. Evol. Comput. 10(5), 604-616 (2006)
-
(2006)
IEEE Trans. Evol. Comput.
, vol.10
, Issue.5
, pp. 604-616
-
-
Folino, G.1
Pizzuti, C.2
Spezzano, G.3
-
14
-
-
34547798962
-
Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection
-
J.V. Hansen, P.B. Lowry, R.D. Meservy, D.M. McDonald, Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection. Decis. Support Syst. 43(4), 1362-1374 (2007)
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.4
, pp. 1362-1374
-
-
Hansen, J.V.1
Lowry, P.B.2
Meservy, R.D.3
McDonald, D.M.4
-
15
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, J. Srivastava, A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the SIAM International Conference on Data Mining (SIAM-03) (2003)
-
(2003)
Proceedings of the SIAM International Conference on Data Mining (SIAM-03)
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
17
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
-
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. Mcclung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham, M.A. Zissman, Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (2000), pp. 12-26
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
Mcclung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
19
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1988 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh, Testing intrusion detection systems: a critique of the 1988 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur. 3(4), 262-294 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
20
-
-
9444267133
-
Modeling intrusion detection systems using linear genetic programming approach
-
(Ottawa, Canada)
-
S. Mukkamala, A.H. Sung, A. Abraham, Modeling intrusion detection systems using linear genetic programming approach. In 17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004 (Ottawa, Canada, 2004), pp. 633-642
-
(2004)
17th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2004
, pp. 633-642
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
21
-
-
67650677051
-
Evolving high-speed, easy-to-understand network intrusion detection rules with genetic programming
-
(Springer, Berlin, Heidelberg)
-
A. Orfila, J.M. Estevez-Tapiador, A. Ribagorda, Evolving high-speed, easy-to-understand network intrusion detection rules with genetic programming. In EvoWorkshops '09: Proceedings of the EvoWorkshops 2009 on Applications of Evolutionary Computing (Springer, Berlin, Heidelberg, 2009), pp. 93-98
-
(2009)
EvoWorkshops '09: Proceedings of the EvoWorkshops 2009 on Applications of Evolutionary Computing
, pp. 93-98
-
-
Orfila, A.1
Estevez-Tapiador, J.M.2
Ribagorda, A.3
-
22
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
-
S. Peddabachigari, A. Abraham, C. Grosan, J. Thomas, Modeling intrusion detection system using hybrid intelligent systems. Int. J. Netw. Comput. Appl. 30, 114-132 (2007) (Pubitemid 44666486)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
25
-
-
0025448521
-
The strength of weak learnability
-
R.E. Schapire, The strength of weak learnability. Mach. Learn. 5(2), 197-227 (1990)
-
(1990)
Mach. Learn.
, vol.5
, Issue.2
, pp. 197-227
-
-
Schapire, R.E.1
-
26
-
-
0002978642
-
Boosting a weak learning by maiority
-
R.E. Schapire, Boosting a weak learning by maiority. Inf. Comput. 121(2), 256-285 (1996)
-
(1996)
Inf. Comput.
, vol.121
, Issue.2
, pp. 256-285
-
-
Schapire, R.E.1
-
27
-
-
35248851166
-
A linear genetic programming approach to intrusion detection
-
(LNCS 2724, Springer)
-
D. Song, M.I. Heywood, A. Nur Zincir-Heywood, A linear genetic programming approach to intrusion detection. In Proceedings of the Genetic and Evolutionary Computation Conference GECCO 2003 (LNCS 2724, Springer, 2003), pp. 2325-2336
-
(2003)
Proceedings of the Genetic and Evolutionary Computation Conference GECCO 2003
, pp. 2325-2336
-
-
Song, D.1
Heywood, M.I.2
Nur Zincir-Heywood, A.3
-
28
-
-
21044433766
-
Training genetic programming on half a millio patterns: An example from anomaly detection
-
D. Song, M.I. Heywood, A.N. Zincir-Heywood, Training genetic programming on half a millio patterns: An example from anomaly detection. IEEE Trans. Evol. Comput. 9(3), 225-239 (2005)
-
(2005)
IEEE Trans. Evol. Comput.
, vol.9
, Issue.3
, pp. 225-239
-
-
Song, D.1
Heywood, M.I.2
Zincir-Heywood, A.N.3
|