-
3
-
-
0000949239
-
Grids: A graph based intrusion detection system for large networks
-
IEEE Press, Los Alamitos
-
Staniford Chen, S., Cheung, S., Crawford, R., et al.: Grids: a graph based intrusion detection system for large networks. In: 19th National Information System Security Conference. National Institute of Standards and Technology, vol. 1, pp. 361-370. IEEE Press, Los Alamitos (1996)
-
(1996)
19th National Information System Security Conference. National Institute of Standards and Technology
, vol.1
, pp. 361-370
-
-
Staniford Chen, S.1
Cheung, S.2
Crawford, R.3
-
4
-
-
0002629036
-
MERALD: Event monitoring enabling responses to anomalous live disturbances
-
IEEE Press, Los Alamitos
-
Porras, P.A., Neumann, P.G.: MERALD: event monitoring enabling responses to anomalous live disturbances. In: 20th National Information Systems Security Conference, National Institute of Standards and Technology, pp. 11-13. IEEE Press, Los Alamitos (1997)
-
(1997)
20th National Information Systems Security Conference, National Institute of Standards and Technology
, pp. 11-13
-
-
Porras, P.A.1
Neumann, P.G.2
-
5
-
-
0034300682
-
Intrusion detection using autonomous agent
-
Spafford, E.H.: Intrusion detection using autonomous agent. Computer Networks 3(4), 547-570 (2000)
-
(2000)
Computer Networks
, vol.3
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
-
6
-
-
84964461159
-
Mobile security agent for network traffic analysis
-
IEEE Press, Los Alamitos
-
Dasgupta, D., Brian, H.: Mobile security agent for network traffic analysis. In: DARPA Information Survivability Conference and Exposition II (DISCEX-II), Anaheium, CA, pp. 332-340. IEEE Press, Los Alamitos (2001)
-
(2001)
DARPA Information Survivability Conference and Exposition II (DISCEX-II), Anaheium, CA
, pp. 332-340
-
-
Dasgupta, D.1
Brian, H.2
-
7
-
-
3042589970
-
Mobile agents in intrusion detection and response
-
IEEE Press, Ottawa
-
Jansen, W., Mell, P., Karygiannis, T., Marks, D.: Mobile agents in intrusion detection and response. In: 12th Annual Canadian Information Technology Security Symposium, pp. 12-18. IEEE Press, Ottawa (2000)
-
(2000)
12th Annual Canadian Information Technology Security Symposium
, pp. 12-18
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
8
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. Journal of Computer Security 6, 151-180 (1998)
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
9
-
-
84901408225
-
Towards an artificial immune system for network intrusion detection: An investigation of dynamic clonal selection
-
Kim, J., Bentley, P.: Towards an artificial immune system for network intrusion detection: an investigation of dynamic clonal selection. In: Congress on Evolutionary Computation, Honolulu, pp. 1015-1020 (2002)
-
(2002)
Congress on Evolutionary Computation, Honolulu
, pp. 1015-1020
-
-
Kim, J.1
Bentley, P.2
-
10
-
-
35449005874
-
Immune system approaches to intrusion detection - A review
-
DOI 10.1007/s11047-006-9026-4
-
Kim, J., Bentley, P., Aickelin, U., et al.: Immune system approaches to intrusion detectiona review. Natural Computting 6, 413-466 (2007) (Pubitemid 47629391)
-
(2007)
Natural Computing
, vol.6
, Issue.4
, pp. 413-466
-
-
Kim, J.1
Bentley, P.J.2
Aickelin, U.3
Greensmith, J.4
Tedesco, G.5
Twycross, J.6
-
11
-
-
33751017631
-
Immune system approaches to intrusion detection - A review
-
Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. Springer, Heidelberg
-
Aickelin, U., Greensmith, J., Twycross, J.: Immune system approaches to intrusion detection-a review. In: Nicosia, G., Cutello, V., Bentley, P.J., Timmis, J. (eds.) ICARIS 2004. LNCS, vol. 3239, pp. 316-329. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3239
, pp. 316-329
-
-
Aickelin, U.1
Greensmith, J.2
Twycross, J.3
-
12
-
-
21244441082
-
A machine learning evaluation of an artificial immune system
-
DOI 10.1162/1063656054088503
-
Glickman, M., Balthrop, J., Forrest, S.: A machine learning evaluation of an artificial immune system. Evolutionary Computation 13(2), 179-212 (2005) (Pubitemid 40892153)
-
(2005)
Evolutionary Computation
, vol.13
, Issue.2
, pp. 179-212
-
-
Glickman, M.1
Balthrop, J.2
Forrest, S.3
-
13
-
-
0038537231
-
An immune-fuzzy approach to anomaly detection
-
IEEE Press, Los Alamitos May
-
Gomez, J., Gonzalez, F., Dasgupta, D.: An immune-fuzzy approach to anomaly detection. In: 12th IEEE International Conference on Fuzzy Systems (FUZZIEEE), vol. 2, pp. 1219-1224. IEEE Press, Los Alamitos (May 2003)
-
(2003)
12th IEEE International Conference on Fuzzy Systems (FUZZIEEE)
, vol.2
, pp. 1219-1224
-
-
Gomez, J.1
Gonzalez, F.2
Dasgupta, D.3
-
14
-
-
0345477912
-
A methodology for using intelligent agents to provide automated intrusion response
-
Carver, C., Hill, J., Surdu, J., Pooch, U.: A methodology for using intelligent agents to provide automated intrusion response. In: IEEE Systems, Man, and Cybemetics Information Assurance and Security Workshop, West Point, New York, pp. 110-116 (2000)
-
(2000)
IEEE Systems, Man, and Cybemetics Information Assurance and Security Workshop, West Point, New York
, pp. 110-116
-
-
Carver, C.1
Hill, J.2
Surdu, J.3
Pooch, U.4
-
15
-
-
34547576241
-
Feature selection using rough set in intrusion detection
-
Zainal, A., Maarof, M.A., Shamdudd, S.M.: In.: Feature selection using rough set in intrusion detection. In: Proc. IEEE TENCON, p. 4 (2006)
-
(2006)
Proc. IEEE TENCON
, pp. 4
-
-
Zainal, A.1
Maarof, M.A.2
Shamdudd, S.M.3
-
16
-
-
33746718790
-
Kernel based intrusion detection system
-
Kim, B.j., Kim, I.k.: Kernel based intrusion detection system. In: Proc. IEEE ICIS, pp. 6 (2005)
-
(2005)
Proc. IEEE ICIS
, pp. 6
-
-
Kim, B.J.1
Kim, I.K.2
|