-
1
-
-
0034301517
-
The 1999 DARPA OffLine Intrusion Detection Evaluation
-
R.P. Lippmann, J.W. Haines, D.J.Fried, J. Korba, K. Das, "The 1999 DARPA OffLine Intrusion Detection Evaluation," Comp. Networks, 34(2):579-595, 2000.
-
(2000)
Comp. Networks
, vol.34
, Issue.2
, pp. 579-595
-
-
Lippmann, R.P.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
2
-
-
74049102815
-
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks
-
A.B. Ashfaq, M. Joseph, A. Mumtaz, M.Q. Ali, A. Sajjad and S.A. Khayam, "A Comparative Evaluation of Anomaly Detectors under Portscan Attacks," RAID, 2008.
-
(2008)
RAID
-
-
Ashfaq, A.B.1
Joseph, M.2
Mumtaz, A.3
Ali, M.Q.4
Sajjad, A.5
Khayam, S.A.6
-
3
-
-
51249117997
-
Empirical Analysis of Rate Limiting Mechanisms
-
C. Wong, S. Bielski, A. Studer, C. Wang, "Empirical Analysis of Rate Limiting Mechanisms," RAID, 2005.
-
(2005)
RAID
-
-
Wong, C.1
Bielski, S.2
Studer, A.3
Wang, C.4
-
5
-
-
0026860706
-
Methods of combining multiple classifiers and their applications to Handwriting Recognition
-
L. Xu, A. Krzyzak, C.Y. Suen, "Methods of combining multiple classifiers and their applications to Handwriting Recognition," IEEE Trans on System, Man and Cybernetics, (22)3, 1992.
-
(1992)
IEEE Trans on System, Man and Cybernetics
, vol.3
, Issue.22
-
-
Xu, L.1
Krzyzak, A.2
Suen, C.Y.3
-
6
-
-
77955354166
-
-
WiSNet LAB Dataset: http://www.wisnet.seecs.nust.edu.pk/downloads.php
-
WiSNet LAB Dataset
-
-
-
8
-
-
35348821822
-
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
-
G. Giacinto, R. Perdisci , M. Del Rio and F. Roli, Intrusion detection in computer networks by a modular ensemble of one-class classifiers, Information Fusion, (9)1:69-82, 2008.
-
(2008)
Information Fusion
, vol.1
, Issue.9
, pp. 69-82
-
-
Giacinto, G.1
Perdisci, R.2
Del Rio, M.3
Roli, F.4
-
9
-
-
0442296744
-
A Bayesian paradigm for designing intrusion detection systems
-
S.L. Scott, "A Bayesian paradigm for designing intrusion detection systems," Comput Stat and Data Analysis, 45(1):6983, 2004.
-
(2004)
Comput Stat and Data Analysis
, vol.45
, Issue.1
, pp. 6983
-
-
Scott, S.L.1
-
10
-
-
0032021555
-
On combining classifiers
-
J. Kittler, M. Hatef, R.P.W. Duin and J. Matas, "On combining classifiers," IEEE Trans on Pattern Analysis and Machine Intelligence, 20(3):226-239, 1998.
-
(1998)
IEEE Trans on Pattern Analysis and Machine Intelligence
, vol.20
, Issue.3
, pp. 226-239
-
-
Kittler, J.1
Hatef, M.2
Duin, R.P.W.3
Matas, J.4
-
11
-
-
77955399509
-
Multiple Classifier Combination for Character Recognition: Revisiting the Majority Voting System and Its Variations
-
A.F.R. Rahman, H. Alam, M.C. Fairhurst, "Multiple Classifier Combination for Character Recognition: Revisiting the Majority Voting System and Its Variations," Intl Workshop on Doc Analysis Sys, 2002.
-
Intl Workshop on Doc Analysis Sys, 2002
-
-
Rahman, A.F.R.1
Alam, H.2
Fairhurst, M.C.3
-
12
-
-
0033893985
-
Enhancing Consensus in Multiple Expert Decision Fusion
-
M. C. Fairhurst and A. F. R. Rahman, "Enhancing Consensus in Multiple Expert Decision Fusion," IEE Proc. on Vision, Image and Signal Proc, 147(1):3946, 2000.
-
(2000)
IEE Proc. on Vision, Image and Signal Proc
, vol.147
, Issue.1
, pp. 3946
-
-
Fairhurst, M.C.1
Rahman, A.F.R.2
-
13
-
-
0031100515
-
Exploiting second order information to design a novel multiple expert decision combination platform for pattern classification
-
A. F. R. Rahman and M. C. Fairhurst, "Exploiting second order information to design a novel multiple expert decision combination platform for pattern classification," Electronics Letters, 33(6):476477, 1997.
-
(1997)
Electronics Letters
, vol.33
, Issue.6
, pp. 476477
-
-
Rahman, A.F.R.1
Fairhurst, M.C.2
-
14
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
M.M. Williamson, "Throttling viruses: Restricting propagation to defeat malicious mobile code," ACSAC, 2002.
-
(2002)
ACSAC
-
-
Williamson, M.M.1
-
15
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A.W. Berger, H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," IEEE Symp Sec and Priv, 2004.
-
IEEE Symp Sec and Priv, 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
18
-
-
77955365516
-
Network Traffic Anomaly Detection Based on Packet Bytes
-
M.V. Mahoney, P.K. Chan, "Network Traffic Anomaly Detection Based on Packet Bytes," ACM SAC, 2003.
-
(2003)
ACM SAC
-
-
Mahoney, M.V.1
Chan, P.K.2
-
20
-
-
84878737375
-
Combining Filtering and Statistical methods for anomaly detection
-
A. Soule, K. Salamatian, N. Taft, "Combining Filtering and Statistical methods for anomaly detection," ACM/Usenix IMC, 2005.
-
(2005)
ACM/Usenix IMC
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
21
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Y. Gu, A. McCullum, D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation," ACM/Usenix IMC, 2005.
-
(2005)
ACM/Usenix IMC
-
-
Gu, Y.1
McCullum, A.2
Towsley, D.3
-
23
-
-
33847256529
-
The Devil and Packet Trace Anonymization
-
R. Pang, M. Allman, V. Paxson, J. Lee, "The Devil and Packet Trace Anonymization," ACM CCR, 36(1), 2006.
-
(2006)
ACM CCR
, vol.36
, pp. 1
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
|