-
3
-
-
13544269338
-
Application of SVM and ANN for intrusion detection
-
Chen, W.H.; Hsu, S.H.; and Shen, H.P. (2005). Application of SVM and ANN for intrusion detection. Computers & Operations Research, 32(10), 2617-2634.
-
(2005)
Computers & Operations Research
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.H.1
Hsu, S.H.2
Shen, H.P.3
-
4
-
-
68749122250
-
Intrusion detection method using neural networks based on the reduction of characteristics
-
Lorenzo-Fonseca, I.; Maciá-Pérez, F.; Mora-Gimeno, F.; Lau-Fernándezl, R.; Gil-Martínez-Abarca, J.; and Marcos-Jorquera, D. (2009). Intrusion detection method using neural networks based on the reduction of characteristics. LNCS, 5517, 1296-1303.
-
(2009)
LNCS
, vol.5517
, pp. 1296-1303
-
-
Lorenzo-Fonseca, I.1
Maciá-Pérez, F.2
Mora-Gimeno, F.3
Lau-Fernándezl, R.4
Gil-Martínez-Abarca, J.5
Marcos-Jorquera, D.6
-
8
-
-
33748100382
-
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
-
Morteza, A.; Jalili, R.; and Hamid R.S. (2006). RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. Computers & Security, 25(6), 459-468.
-
(2006)
Computers & Security
, vol.25
, Issue.6
, pp. 459-468
-
-
Morteza, A.1
Jalili, R.2
Hamid, R.S.3
-
9
-
-
78751491666
-
Novel intrusion detection using probabilistic neural network and adaptive boosting
-
Tran, T. P.; Cao, L.; Tran, D.; Nguyen, C.D.(2009). Novel intrusion detection using probabilistic neural network and adaptive boosting. International Journal of Computer Science and Information Security (IJCSIS), 6(1), 83-91.
-
(2009)
International Journal of Computer Science and Information Security (IJCSIS)
, vol.6
, Issue.1
, pp. 83-91
-
-
Tran, T.P.1
Cao, L.2
Tran, D.3
Nguyen, C.D.4
-
10
-
-
78751470613
-
Using rough set and support vector machine for network intrusion detection
-
Chen, R.C.; Cheng, K.F.; and Hsieh, C.F. (2009). Using rough set and support vector machine for network intrusion detection. International Journal of Network Security & Its Applications (IJNSA), 1(1), 1-13.
-
(2009)
International Journal of Network Security & Its Applications (IJNSA)
, vol.1
, Issue.1
, pp. 1-13
-
-
Chen, R.C.1
Cheng, K.F.2
Hsieh, C.F.3
-
11
-
-
59949097850
-
Detecting network intrusions using signal processing with query-based sampling filter
-
2009, Article ID 735283
-
Lia, L.B.; Chang, R.I.; Kouh, J.S. (2009). Detecting network intrusions using signal processing with query-based sampling filter. Hindawi PublishingCorporation, EURASIP Journal on Advances in Signal Processing, 2009, Article ID 735283, 1-8.
-
(2009)
Hindawi PublishingCorporation, EURASIP Journal on Advances in Signal Processing
, pp. 1-8
-
-
Lia, L.B.1
Chang, R.I.2
Kouh, J.S.3
-
12
-
-
77952655476
-
DoS attacks intelligent detection using neural networks
-
Alfantookh, A.A. (2006). DoS attacks intelligent detection using neural networks. Comp. & Info. Sci., 18, 27-45.
-
(2006)
Comp. & Info. Sci
, vol.18
, pp. 27-45
-
-
Alfantookh, A.A.1
-
13
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
Mukkamalaa, S.; Sung, A.H.; and Abraham, A. (2005). Intrusion detection using an ensemble of intelligent paradigms. Journal of Network and Computer Applications, 28(2), 167-182.
-
(2005)
Journal of Network and Computer Applications
, vol.28
, Issue.2
, pp. 167-182
-
-
Mukkamalaa, S.1
Sung, A.H.2
Abraham, A.3
-
15
-
-
78751508584
-
An intelligent firewall to detect novel attacks? An integrated approach based on anomaly detection against virus attacks
-
Mária Bieliková (Ed.):, 2002
-
InSeon Y.; and Ulrich U. (2002). An intelligent firewall to detect novel attacks? An integrated approach based on anomaly detection against virus attacks, Mária Bieliková (Ed.): SOFSEM 2002 Student Research Forum, 59-64, 2002. http://www2.fiit.stuba.sk/~bielik/sofsem2002srf/clanky/09Yoo.pdf.
-
(2002)
SOFSEM 2002 Student Research Forum
, pp. 59-64
-
-
Inseon, Y.1
Ulrich, U.2
-
16
-
-
33745926508
-
A mutated intrusion detection system using principal component analysis and time delay neural network
-
Kang, B.D.; Lee, J.W; Kim, J.H.; Kwon, O.H.; Seong, C.Y.; Park, S.M.; and Kim, S.K. (2006). A mutated intrusion detection system using principal component analysis and time delay neural network. LNCS, 3973, 246-254.
-
(2006)
LNCS
, vol.3973
, pp. 246-254
-
-
Kang, B.D.1
Lee, J.W.2
Kim, J.H.3
Kwon, O.H.4
Seong, C.Y.5
Park, S.M.6
Kim, S.K.7
-
17
-
-
78751523544
-
-
Master's Thesis, University of Engineering & Technology, School of Computer Science, College of Engineering & Computer Science at the University of Central Florida
-
Siddiqui, M.A. (2004). High performance data mining techniques for intrusion detection. Master's Thesis, University of Engineering & Technology, School of Computer Science, College of Engineering & Computer Science at the University of Central Florida.
-
(2004)
High Performance Data Mining Techniques for Intrusion Detection
-
-
Siddiqui, M.A.1
-
18
-
-
33745881331
-
Application of neural networks in network control and information security
-
Grediaga, A.; Ibarra, F.; García, F.; Ledesma, B.; and Brotons, F. (2006). Application of neural networks in network control and information security. LNCS, 3973, 208-213.
-
(2006)
LNCS
, vol.3973
, pp. 208-213
-
-
Grediaga, A.1
Ibarra, F.2
García, F.3
Ledesma, B.4
Brotons, F.5
-
19
-
-
78751498849
-
Comparison of BPL and RBF Network in intrusion detection system
-
Zhang, C.; Jiang, J.; and Kamel, M. (2004). Comparison of BPL and RBF Network in intrusion detection system. LNCS (LNAI), 2639, 460-470.
-
(2004)
LNCS (LNAI)
, vol.2639
, pp. 460-470
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
25
-
-
0033683805
-
A computer host-based user anomaly detection system using the self-organizing map
-
Höglund, A.J.; Hätönen, K.; and Sorvari, A.S. (2000). A computer host-based user anomaly detection system using the self-organizing map. Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00), 5, 411-416.
-
(2000)
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks (IJCNN'00)
, vol.5
, pp. 411-416
-
-
Höglund, A.J.1
Hätönen, K.2
Sorvari, A.S.3
-
26
-
-
0036079805
-
Host-based intrusion detection using self-organizing maps
-
Lichodzijewski, P.; Zincir-Heywood, A.N.; and Heywood, M.I. (2002). Host-based intrusion detection using self-organizing maps. Proceedings of the 2002 International Joint Conference on Neural Networks, 2002. IJCNN '02, 1714-1719.
-
(2002)
Proceedings of the 2002 International Joint Conference on Neural Networks, 2002. IJCNN '02
, pp. 1714-1719
-
-
Lichodzijewski, P.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
27
-
-
35248842651
-
Detecting anomalous network traffic with self-organizing maps
-
Ramadas, M.; Ostermann, S.; and Tjaden, B. (2003). Detecting anomalous network traffic with self-organizing maps. LNCS, 2820, 36-54.
-
(2003)
LNCS
, vol.2820
, pp. 36-54
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
30
-
-
78751515813
-
-
19.DARPA1998
-
19.DARPA1998 http://www.ll.mit.edu/IST/ideval/docs/1998/introduction/index.htm.
-
-
-
-
31
-
-
78751510749
-
-
KDDCup1999
-
KDDCup1999: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
-
-
-
32
-
-
78751488559
-
-
MATLAB 7.6.0 (R2008a) neural network Toolbox software
-
MATLAB 7.6.0 (R2008a) neural network Toolbox software.
-
-
-
-
34
-
-
0242489523
-
Feature selection for intrusion detection using neural networks and support vector machines
-
Mukkamala, S.; and Sung, A.H. (2003). Feature selection for intrusion detection using neural networks and support vector machines. Transportation Research Record, 1822, 33-39.
-
(2003)
Transportation Research Record
, vol.1822
, pp. 33-39
-
-
Mukkamala, S.1
Sung, A.H.2
|