-
4
-
-
33845989821
-
Can Machine Learning be Secure?
-
Barreno, M., Nelson, B., Sears, R., Joseph, A.D., Tygarcan, J.D.: Can Machine Learning be Secure? In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 16-25 (2006)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygarcan, J.D.5
-
5
-
-
49649112245
-
Analysis of a Computer Security Dataset: Why Machine Learning Algorithms Fail on KDD Dataset for Misuse Detection
-
Sabhnani, M., Serpen, G.: Analysis of a Computer Security Dataset: Why Machine Learning Algorithms Fail on KDD Dataset for Misuse Detection. Intelligent Data Analysis 8(4), 403-415 (2004)
-
(2004)
Intelligent Data Analysis
, vol.8
, Issue.4
, pp. 403-415
-
-
Sabhnani, M.1
Serpen, G.2
-
7
-
-
4544229404
-
ADAM: Detecting Intrusions by Data Mining
-
Barbarra, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting Intrusions by Data Mining. In: Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security, West Point, NY (June 2001)
-
Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security, West Point, NY (June 2001)
-
-
Barbarra, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
8
-
-
0003451777
-
-
Technical Report, Computer Science Laboratory, SRI International, Menlo Park, USA February
-
Lunt, T.F., Tamaru, A., Gilham, F., Jagannathm, R., Jalali, C., Neumann, P.G., Javitz, H.S., Valdes, A., Garvey, T.D.: A Real-time Intrusion Detection Expert System (IDES). Technical Report, Computer Science Laboratory, SRI International, Menlo Park, USA (February 1992)
-
(1992)
A Real-time Intrusion Detection Expert System (IDES)
-
-
Lunt, T.F.1
Tamaru, A.2
Gilham, F.3
Jagannathm, R.4
Jalali, C.5
Neumann, P.G.6
Javitz, H.S.7
Valdes, A.8
Garvey, T.D.9
-
9
-
-
0003964874
-
Next Generation Intrusion Detection Expert System (NIDES)
-
Computer Science Laboratory, SRI International, Menlo Park, CA, USA, Technical Report SRI-CSL-95-0 May
-
Anderson, D., Frivold, T., Tamaru, A., Valdes, A.: Next Generation Intrusion Detection Expert System (NIDES). Software Users Manual, Beta-Update release. Computer Science Laboratory, SRI International, Menlo Park, CA, USA, Technical Report SRI-CSL-95-0 (May 1994)
-
(1994)
Software Users Manual, Beta-Update Release
-
-
Anderson, D.1
Frivold, T.2
Tamaru, A.3
Valdes, A.4
-
10
-
-
0002629036
-
EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances
-
Porras, P., Neumann, P.: EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. In: Proceedings of the 20th NIST-NCSC National Information Systems Security Conference, Baltimore, MD, USA, pp. 353-365 (1997)
-
(1997)
Proceedings of the 20th NIST-NCSC National Information Systems Security Conference, Baltimore, MD, USA
, pp. 353-365
-
-
Porras, P.1
Neumann, P.2
-
11
-
-
21644481499
-
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP traffic
-
Tombini, E., Debar, H., Mé, L., Ducassé, M.: A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP traffic. In: Proceedings of the 20th Annual Computer Security Applications Conference, Tucson, AZ, USA (2004)
-
Proceedings of the 20th Annual Computer Security Applications Conference, Tucson, AZ, USA (2004)
-
-
Tombini, E.1
Debar, H.2
Mé, L.3
Ducassé, M.4
-
13
-
-
34250004091
-
A Hybrid Intrusion Detection and Visualization System
-
Peng, J., Feng, C., Rozenblit, J.W.: A Hybrid Intrusion Detection and Visualization System. In: Proceedings of the 13th Annual IEEE International Symposium and Workshop on Engineering of Computer Based Systems, pp. 505-506 (2006)
-
(2006)
Proceedings of the 13th Annual IEEE International Symposium and Workshop on Engineering of Computer Based Systems
, pp. 505-506
-
-
Peng, J.1
Feng, C.2
Rozenblit, J.W.3
-
14
-
-
25844491810
-
An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks
-
Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks. Expert Systems with Applications 29(4), 713-722
-
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
15
-
-
33847743856
-
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
-
Qin, M., Hwang, K., Cai, M., Chen, Y.: Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes. IEEE Transactions on Dependable and Secure Computing 4(1), 41-55
-
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 41-55
-
-
Qin, M.1
Hwang, K.2
Cai, M.3
Chen, Y.4
-
17
-
-
34248364348
-
Hybrid Intelligent Systems for Network Security
-
Thames, J.L., Abler, R., Saad, A.: Hybrid Intelligent Systems for Network Security. In: Proceedings of the 44th ACM Annual Southeast Regional Conference, pp. 286-289
-
Proceedings of the 44th ACM Annual Southeast Regional Conference
, pp. 286-289
-
-
Thames, J.L.1
Abler, R.2
Saad, A.3
-
18
-
-
33750514606
-
Modeling Intrusion Detection System using Hybrid Intelligent Systems
-
Special issue on Network and Information Security: A Computational Intelligence Approach
-
Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling Intrusion Detection System using Hybrid Intelligent Systems. Special issue on Network and Information Security: A Computational Intelligence Approach. Journal of Network and Computer Applications 30(1), 114-132 (2007)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
19
-
-
34250801472
-
A Hybrid Machine Learning Approach to Network Anomaly Detection
-
Shon, T., Moon, J.: A Hybrid Machine Learning Approach to Network Anomaly Detection. International Journal on Information Sciences 177(18), 3799-3821 (2007)
-
(2007)
International Journal on Information Sciences
, vol.177
, Issue.18
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
-
20
-
-
1642355954
-
Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context
-
Sabhnani, M.R., Serpen, G.: Application of Machine Learning Algorithms to KDD Intrusion Detection Dataset within Misuse Detection Context. In: Proceedings of International Conference on Machine Learning: Models, Technologies, and Applications, pp. 209-215 (2003)
-
(2003)
Proceedings of International Conference on Machine Learning: Models, Technologies, and Applications
, pp. 209-215
-
-
Sabhnani, M.R.1
Serpen, G.2
-
21
-
-
78650680807
-
-
http://nsl.cs.unb.ca/wei/hybrid.htm
-
-
-
-
23
-
-
85085235971
-
Unsupervised anomaly detection using an evolutionary extension of k-means algorithm
-
DOI 10.1504/IJICS.2008.018513
-
Lu, W., Traore, I.: Unsupervised anomaly detection using an evolutionary extension of Kmeans algorithm. International Journal on Information and Computer Security 2(2), 107-139 (2008) (Pubitemid 351802737)
-
(2008)
International Journal of Information and Computer Security
, vol.2
, Issue.2
, pp. 107-139
-
-
Lu, W.1
Traore, I.2
-
25
-
-
78650717082
-
-
http://www.ethereal.com/docs/man-pages/editcap.1.html
-
-
-
-
26
-
-
78650708556
-
-
http://www.wireshark.org/docs/man-pages/tshark.html
-
-
-
-
27
-
-
78650694159
-
-
http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html.kddcup
-
-
-
-
28
-
-
78650714957
-
-
http://www.ll.mit.edu/IST/ideval/data/1998/ 1998-data-index.html
-
-
-
-
29
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
Mahoney, M.V., Chan, P.K.: An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In: Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection, Pittsburgh, PA, USA, pp. 220-237 (2003)
-
(2003)
Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection, Pittsburgh, PA, USA
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
30
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3(4), 262-294 (2000)
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
32
-
-
78650712222
-
-
http://www.ll.mit.edu/IST/ideval/data/1999/ 1999-data-index.html
-
-
-
|