-
1
-
-
0004048154
-
-
Technical report, James P. Anderson Co., Fort Washington, Pennsylvania, April
-
James P. Anderson, "Computer security threat monitoring and surveillance," Technical report, James P. Anderson Co., Fort Washington, Pennsylvania, April 1980.
-
(1980)
Computer security threat monitoring and surveillance
-
-
Anderson, J.P.1
-
4
-
-
34447129541
-
An ensemble approach to intrusion detection based on improved multi-objective genetic algorithm
-
June
-
Yu Y, and Huang Hao, "An ensemble approach to intrusion detection based on improved multi-objective genetic algorithm," Journal of Software, Vol.18, No.6, June 2007, pp.1369-1378.
-
(2007)
Journal of Software
, vol.18
, Issue.6
, pp. 1369-1378
-
-
Yu, Y.1
Hao, H.2
-
5
-
-
0034247240
-
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
-
J. Luo, and S. M. Bridges, "Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection," International Journal of Intelligent Systems, 2000, pp. 687-703.
-
(2000)
International Journal of Intelligent Systems
, pp. 687-703
-
-
Luo, J.1
Bridges, S.M.2
-
6
-
-
0032676506
-
A data mining framework for building intrusion detection model
-
Oakland, CA: IEEE Computer Society Press
-
W.K. Lee, and S. J. Stolfo, "A data mining framework for building intrusion detection model," Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA: IEEE Computer Society Press, 1999, pp. 120-132.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.K.1
Stolfo, S.J.2
-
7
-
-
0003112380
-
-
in Wieling, B. (Ed), Current trend in knowledge acquistion, Amsterdam, IOS press
-
Kononenko I, "Comparison of inductive and naïve Bayesian learning approaches to automatic knowledge acquistion," in Wieling, B. (Ed), Current trend in knowledge acquistion, Amsterdam, IOS press, 1990.
-
(1990)
Comparison of inductive and naïve Bayesian learning approaches to automatic knowledge acquistion
-
-
Kononenko, I.1
-
13
-
-
0002109999
-
A Network Secutiry Mnitor
-
May
-
Heberlein, L., et al., "A Network Secutiry Mnitor," Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy, May 1990, pp. 296-303.
-
(1990)
Proceedings of the IEEE Computer Society Symposium, Research in Security and Privacy
, pp. 296-303
-
-
Heberlein, L.1
-
14
-
-
1842709394
-
IDES: An Intelligent System for Detecting Intruders
-
Threats, and Countermeasures; Rome, Italy, November 22-23
-
Teresa F. Lunt, "IDES: An Intelligent System for Detecting Intruders," Proceedings of the Symposium on Computer Security; Threats, and Countermeasures; Rome, Italy, November 22-23, 1090, pp.110-121.
-
(1090)
Proceedings of the Symposium on Computer Security
, pp. 110-121
-
-
Lunt, T.F.1
-
15
-
-
85137333645
-
Adaptive Real-time Anomaly Detection using Inductively Generated Sequential Patterns
-
Oakland, CA
-
Teng, Henry S., Chen, Kaihu, and Lu, Stephen C-Y, "Adaptive Real-time Anomaly Detection using Inductively Generated Sequential Patterns," 1990 IEEE Symposium on Recearch in Security and Privacy, Oakland, CA, pp. 296-304.
-
1990 IEEE Symposium on Recearch in Security and Privacy
, pp. 296-304
-
-
Teng, H.S.1
Chen, K.2
Lu, S.C.-Y.3
-
18
-
-
78651582469
-
-
Conference on Auditing and Computer Technology, SRI International
-
Teresa F. Lunt, "Detecting Intrusion in Computer Systems," 1993 Conference on Auditing and Computer Technology, SRI International.
-
(1993)
Detecting Intrusion in Computer Systems
-
-
Lunt, T.F.1
-
20
-
-
4544229404
-
ADAM: Detecting Intrusion by Data Mining
-
West Point, New York June 5-6
-
Barbara, Daniel, Couto, Julia, Jajodia, Sushil, Popyack, Leonard, and Ningning, Wu "ADAM: Detecting Intrusion by Data Mining," Proceedings of the IEEE Workshop on Information Assurance and Security, West Point, New York June 5-6, 2001.
-
(2001)
Proceedings of the IEEE Workshop on Information Assurance and Security
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Ningning, W.5
-
21
-
-
15944365123
-
An investigation of a compromised host on a honeynet being used to increase the security of a large enterprise network
-
IEEE
-
Jackson, T., Levine, J., Grizzard, J., and Owen H., "An investigation of a compromised host on a honeynet being used to increase the security of a large enterprise network," Proceedings of the 2004 IEEE Workshop on Information Assurance and Security, IEEE, 2004.
-
(2004)
Proceedings of the 2004 IEEE Workshop on Information Assurance and Security
-
-
Jackson, T.1
Levine, J.2
Grizzard, J.3
Owen, H.4
-
22
-
-
33645756878
-
The use of honeynets to increase computer network security and user awareness
-
Krasser, S., Grizzard, J., Owen, H., and Levine J., "The use of honeynets to increase computer network security and user awareness," Journal of Security Education, Volume 1, pp. 23-37, 2005.
-
(2005)
Journal of Security Education
, vol.1
, pp. 23-37
-
-
Krasser, S.1
Grizzard, J.2
Owen, H.3
Levine, J.4
-
23
-
-
0004145058
-
-
Technical report, Secure Networks Inc
-
Thomas H. Ptacek, and Timothy N. Newsham, "Insertion, evasion and denial of service: Eluding network intrusion detection," Technical report, Secure Networks Inc., 1998.
-
(1998)
Insertion, evasion and denial of service: Eluding network intrusion detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
24
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral model
-
D.Y. Yeung, and Y.X. Ding, "Host-based intrusion detection using dynamic and static behavioral model", Pattern Recognition, 36, pp. 229-243, 2003.
-
(2003)
Pattern Recognition
, vol.36
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.X.2
-
27
-
-
33745661661
-
Defending against injection attacks through context-sensitive string evaluation
-
Seattle, WA, Springer-Verlag
-
Tadeusz Pietraszek, and Chris Vanden Berghe. "Defending against injection attacks through context-sensitive string evaluation", In Recent Advances in Intrusion Detection (RAID2005), volume 3858 of Lecture Notes in Computer Science, pp. 124-145, Seattle, WA, 2005. Springer-Verlag.
-
(2005)
Recent Advances in Intrusion Detection (RAID2005), volume 3858 of Lecture Notes in Computer Science
, pp. 124-145
-
-
Pietraszek, T.1
Berghe, C.V.2
-
29
-
-
33744584654
-
Induction of Decision Tree
-
J. R. Quinlan, "Induction of Decision Tree," Machine Learning Vol. 1, pp. 81-106, 1986.
-
(1986)
Machine Learning
, vol.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
31
-
-
0003802343
-
-
Wadsworth, Belmont
-
L. Breiman, J. H. Friedman, R. A. Olshen and C.J. Stone, "Classification and Regression Trees," Statistics probability series, Wadsworth, Belmont, 1984.
-
(1984)
Classification and Regression Trees," Statistics probability series
-
-
Breiman, L.1
Friedman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
32
-
-
0002139432
-
SPRINT: A Scalable Parallel Classifier for Data Maining
-
India, September
-
John Shafer, Rakesh Agarwal, and Manish Mehta, "SPRINT: A Scalable Parallel Classifier for Data Maining," in Proceedings of the VLDB Conference, Bombay, India, September 1996.
-
(1996)
Proceedings of the VLDB Conference, Bombay
-
-
Shafer, J.1
Agarwal, R.2
Mehta, M.3
-
33
-
-
0000865580
-
Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm
-
D. Turney, "Cost-Sensitive Classification: Empirical Evaluation of a Hybrid Genetic Decision Tree Induction Algorithm," Journal of Artificial Intelligence Research, pp. 369-409, 1995.
-
(1995)
Journal of Artificial Intelligence Research
, pp. 369-409
-
-
Turney, D.1
-
35
-
-
55349091246
-
Fast and Accurate Feature Selection using Hybrid Genetic Strategies
-
C. Guerra-Salcedo, S. Chen, D. Whitley, and Stephen Smith, "Fast and Accurate Feature Selection using Hybrid Genetic Strategies," in Proceedings of the Genetic and Evolutionary Computation Conference, 1999.
-
(1999)
Proceedings of the Genetic and Evolutionary Computation Conference
-
-
Guerra-Salcedo, C.1
Chen, S.2
Whitley, D.3
Smith, S.4
-
36
-
-
0026154509
-
A Survey of Decision Tree Classifier Methodology"
-
S. R. Safavian and D. Landgrebe, "A Survey of Decision Tree Classifier Methodology", IEEE Transactions on Systems, Man and Cybernetics 21(3), pp. 660-674, 1991.
-
(1991)
IEEE Transactions on Systems, Man and Cybernetics
, vol.21
, Issue.3
, pp. 660-674
-
-
Safavian, S.R.1
Landgrebe, D.2
-
38
-
-
66149184528
-
Learning Intrusion Detection Based on Adaptive Bayesian Algorithm
-
Khulna, Bangladesh, 25-27 December
-
th International Conference on Computer and Information Technology (ICCIT 2008), Khulna, Bangladesh, 25-27 December, 2008, pp.652-656.
-
(2008)
th International Conference on Computer and Information Technology (ICCIT 2008
, pp. 652-656
-
-
Farid, D.M.1
Rahman, M.Z.2
-
39
-
-
34147192817
-
-
The KDD Archive
-
The KDD Archive. KDD99 cup dataset. 1999. http://archive.ics.uci.edu/ml/datasets/KDD+Cup+1999+Data
-
(1999)
KDD99 cup dataset
-
-
-
40
-
-
10844230994
-
Intrusion dection using an ensemble of intelligent paradigms
-
Mukkamala S, Sung AH, and Abraham A, "Intrusion dection using an ensemble of intelligent paradigms," Proceedings of Journal of Network and Computer Applications, 2005, 2(8): pp. 167-182.
-
(2005)
Proceedings of Journal of Network and Computer Applications
, vol.2
, Issue.8
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
41
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Chebrolu S, Abraham A, and Thomas JP, "Feature deduction and ensemble design of intrusion detection systems." Computer & Security, 2004, 24(4), pp. 295-307.
-
(2004)
Computer & Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
42
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Oakland: IEEE Computer Society
-
Lee WK, Stolfo SJ, and Mok KW, "A data mining framework for building intrusion detection models," Proceedings of the'99 IEEE Symp. On Security and Privacy, Oakland: IEEE Computer Society. 1999, pp. 120-132.
-
(1999)
Proceedings of the'99 IEEE Symp. On Security and Privacy
, pp. 120-132
-
-
Lee, W.K.1
Stolfo, S.J.2
Mok, K.W.3
|