-
4
-
-
44649096422
-
Using unsupervised learning for network alert correlation
-
Springer-Verlag LNAI 5032
-
R. Smith, N. Japkowicz, M. Dondo, and P. Mason, "Using unsupervised learning for network alert correlation," Springer-Verlag LNAI 5032, (2008), pp. 308-319.
-
(2008)
, pp. 308-319
-
-
Smith, R.1
Japkowicz, N.2
Dondo, M.3
Mason, P.4
-
7
-
-
74049131441
-
A rule-based temporal Alert Correlation System
-
P. Kabiri, and A. A. Ghorbani, "A rule-based temporal Alert Correlation System," Int. J. of Network Security, Vol. 5, No. 1, (2007), pp. 66-72.
-
(2007)
Int. J. of Network Security
, vol.5
, Issue.1
, pp. 66-72
-
-
Kabiri, P.1
Ghorbani, A.A.2
-
8
-
-
84860310293
-
-
The Intrusion Detection Message Exchange Format (IDMEF) [Online]
-
H. Debar, D. Curry, and B. Feinstein. (2007). The Intrusion Detection Message Exchange Format (IDMEF) [Online]. Available: ftp://ftp.rfceditor. org/in-notes/rfc4765.txt
-
(2007)
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
10
-
-
0002399288
-
Neural networks, principal components, and subspaces
-
E. Oja, "Neural networks, principal components, and subspaces," Int. Journal of Neural Systems, Vol. 1, No. 1, (1989), pp. 61-68.
-
(1989)
Int. Journal of Neural Systems
, vol.1
, Issue.1
, pp. 61-68
-
-
Oja, E.1
-
11
-
-
33750735024
-
Intrusion alert analysis based on PCA and the LVQ neural network
-
J. X. Wang, Z. Y. Wang, and K. Dai, "Intrusion alert analysis based on PCA and the LVQ neural network," Proc. of the13th Int. Conf. on Neural Information Processing, (2006), Vol. 4234, pp. 217-224.
-
(2006)
Proc. of the13th Int. Conf. on Neural Information Processing
, vol.4234
, pp. 217-224
-
-
Wang, J.X.1
Wang, Z.Y.2
Dai, K.3
-
12
-
-
84860308852
-
Autocorrel II: Unsupervised network event correlation using neural networks
-
Contractor Report, CR2005-155, DRDC Ottawa
-
N. Japkowicz, and R. Smith, "Autocorrel II: Unsupervised network event correlation using neural networks," Contractor Report, CR2005-155, DRDC Ottawa, (2005).
-
(2005)
-
-
Japkowicz, N.1
Smith, R.2
-
14
-
-
0001457509
-
Some methods for classification and analysis of multivariate observations
-
Berkeley: University of California Press
-
J. B. MacQueen, "Some methods for classification and analysis of multivariate observations," Proc. of 5th Berkeley Symposium on Mathematical Statistics and Probability, Berkeley: University of California Press, Vol. 1, (1967), pp. 281-297.
-
(1967)
Proc. of 5th Berkeley Symposium on Mathematical Statistics and Probability
, vol.1
, pp. 281-297
-
-
MacQueen, J.B.1
-
15
-
-
0015644825
-
A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters
-
J. C. Dunn, "A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters," J. of Cybernetics, Vol. 3, (1973), pp. 32-57.
-
(1973)
J. of Cybernetics
, vol.3
, pp. 32-57
-
-
Dunn, J.C.1
-
17
-
-
0002629270
-
Maximum likelihood from Incoming data via the EM algorithm
-
Series B
-
A.P. Dempster, N.M. Laird, and D.B. Rubin, "Maximum likelihood from Incoming data via the EM algorithm," J. Royal Stat. Soc., Series B, Vol. 39, No. 1, (1977), pp. 1-36.
-
(1977)
J. Royal Stat. Soc.
, vol.39
, Issue.1
, pp. 1-36
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
18
-
-
49449098182
-
What is the Expectation Maximization algorithm?
-
C. B. Do, and S. Batzoglou, "What is the Expectation Maximization algorithm?," Nature Biotechnology, Vol. 26, (2008), pp. 897-899.
-
(2008)
Nature Biotechnology
, vol.26
, pp. 897-899
-
-
Do, C.B.1
Batzoglou, S.2
-
19
-
-
84860306534
-
-
RealSecure Signatures Reference Guide. Internet Security Systems [Online]
-
RealSecure Signatures Reference Guide. Internet Security Systems [Online]. Available: http://xforce.iss.net
-
-
-
-
21
-
-
84860283537
-
-
MIT Lincoln Lab. DARPA 2000 Intrusion Detection Evaluation Datasets [Online]
-
MIT Lincoln Lab. (2000). DARPA 2000 Intrusion Detection Evaluation Datasets [Online]. Available: http://ideval.ll.mit.edu/2000index.html
-
(2000)
-
-
-
22
-
-
84860283542
-
-
Internet Security Systems. RealSecure Network 10/100 [Online]
-
Internet Security Systems. RealSecure Network 10/100 [Online]. Available: http://www.iss.net/products_services/enterprise_protection/rsnetwork/sensor. php
-
-
-
-
23
-
-
84860287004
-
-
TIAA: A Toolkit for Intrusion Alert Analysis [Online]
-
P. Ning. (2002). TIAA: A Toolkit for Intrusion Alert Analysis [Online]. Available: http://discovery.csc.ncsu.edu/software/correlator
-
(2002)
-
-
Ning, P.1
-
24
-
-
84860287007
-
-
The MathWorks. MATLAB: The Languange of Technical Computing [Online]
-
The MathWorks. MATLAB: The Languange of Technical Computing [Online]. Available: http://www.mathworks.com
-
-
-
-
25
-
-
49149109558
-
Automated filtering of network intrusion detection alerts
-
A. Faour, P. Leray, and B. Eter, "Automated filtering of network intrusion detection alerts," Proc. 1st Joint Conf. on Security in Network Architectures and Security of Information Systems, (2006), pp. 277-291.
-
(2006)
Proc. 1st Joint Conf. on Security in Network Architectures and Security of Information Systems
, pp. 277-291
-
-
Faour, A.1
Leray, P.2
Eter, B.3
|