-
3
-
-
4344588856
-
Detecting new forms of network intrusion using genetic programming
-
W. Lu, and I. Traore Detecting new forms of network intrusion using genetic programming Computational Intelligence 20 2004 475 494
-
(2004)
Computational Intelligence
, vol.20
, pp. 475-494
-
-
Lu, W.1
Traore, I.2
-
4
-
-
27544512530
-
Data mining for intrusion detection: A critical review
-
K. Julisch Data mining for intrusion detection: a critical review D. Barbará, S. Jajodia, Applications of Data Mining in Computer Security 2002 Kluwer Academic Publishers 33 62
-
(2002)
Applications of Data Mining in Computer Security
, pp. 33-62
-
-
Julisch, K.1
-
6
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
Y.H. Liao, and V.R. Vemuri Use of K-nearest neighbor classifier for intrusion detection Computers and Security 21 2002 439 448
-
(2002)
Computers and Security
, vol.21
, pp. 439-448
-
-
Liao, Y.H.1
Vemuri, V.R.2
-
8
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
G. Giacinto, F. Roli, and L. Didaci Fusion of multiple classifiers for intrusion detection in computer networks Pattern Recognition Letters 24 2003 1795 1803
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
9
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
S. Chebrolu, A. Abraham, and J.P. Thomas Feature deduction and ensemble design of intrusion detection systems Computers and Security 24 2005 295 307
-
(2005)
Computers and Security
, vol.24
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
15
-
-
2442526701
-
Unsupervised learning techniques for an intrusion detection system
-
S. Zanero, and S. Savaresi Unsupervised learning techniques for an intrusion detection system ACM Symposium on Applied Computing 2004 412 419
-
(2004)
ACM Symposium on Applied Computing
, pp. 412-419
-
-
Zanero, S.1
Savaresi, S.2
-
17
-
-
26844471735
-
An unsupervised cooperative pattern recognition model to identify anomalous massive SNMP data sending
-
Á. Herrero, E. Corchado, and J.M. Sáiz An unsupervised cooperative pattern recognition model to identify anomalous massive SNMP data sending ICNC05 2005 778 782
-
(2005)
ICNC05
, pp. 778-782
-
-
Herrero, Á.1
Corchado, E.2
Sáiz, J.M.3
-
20
-
-
15944375471
-
Intrusion detection using hierarchical neural networks
-
C. Zhang, J. Jiang, and M. Kamel Intrusion detection using hierarchical neural networks Pattern Recognition Letters 26 2005 779 791
-
(2005)
Pattern Recognition Letters
, vol.26
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
25
-
-
33745460819
-
Visualizing network data for intrusion detection
-
A. Kulsoom, C. Lee, G. Conti, and J.A. Copeland Visualizing network data for intrusion detection Sixth Annual IEEE Information Assurance Workshop - Systems, Man and Cybernetics (SMC) 2005 100 108
-
(2005)
Sixth Annual IEEE Information Assurance Workshop - Systems, Man and Cybernetics (SMC)
, pp. 100-108
-
-
Kulsoom, A.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
-
27
-
-
33645805216
-
An application of principal component analysis to the detection and visualization of computer network attacks
-
K. Labib, and V.R. Vemuri An application of principal component analysis to the detection and visualization of computer network attacks Annals of Telecommunications 61 2006 218 234
-
(2006)
Annals of Telecommunications
, vol.61
, pp. 218-234
-
-
Labib, K.1
Vemuri, V.R.2
-
28
-
-
33749533756
-
A user-centered look at glyph-based security visualization
-
A. Komlodi, P. Rheingans, A. Utkarsha, J.R. Goodall, and J. Amit A user-centered look at glyph-based security visualization IEEE Workshop on Visualization for Computer Security (VizSEC 05) 2005 21 28
-
(2005)
IEEE Workshop on Visualization for Computer Security (VizSEC 05)
, pp. 21-28
-
-
Komlodi, A.1
Rheingans, P.2
Utkarsha, A.3
Goodall, J.R.4
Amit, J.5
-
33
-
-
33645238804
-
IDGraphs: Intrusion detection and analysis using stream compositing
-
P. Ren, Y. Gao, Z.C. Li, Y. Chen, and B. Watson IDGraphs: intrusion detection and analysis using stream compositing IEEE Computer Graphics and Applications 26 2006 28 39
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, pp. 28-39
-
-
Ren, P.1
Gao, Y.2
Li, Z.C.3
Chen, Y.4
Watson, B.5
-
35
-
-
70349568270
-
Visual information seeking: Tight coupling of dynamic query filters with starfield displays
-
Morgan Kaufmann Publishers, Inc.
-
C. Ahlberg, and B. Shneiderman Visual information seeking: tight coupling of dynamic query filters with starfield displays Readings in Information Visualization: Using Vision to Think 1999 Morgan Kaufmann Publishers, Inc. pp. 244-250
-
(1999)
Readings in Information Visualization: Using Vision to Think
-
-
Ahlberg, C.1
Shneiderman, B.2
-
36
-
-
20444484611
-
NVisionIP: Netflow visualizations of system state for security situational awareness
-
Washington, DC, USA
-
K. Lakkaraju, W. Yurcik, and A.J. Lee NVisionIP: netflow visualizations of system state for security situational awareness 2004 ACM Workshop on Visualization and Data Mining for Computer Security Washington, DC, USA 2004 65 72
-
(2004)
2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
37
-
-
0036448607
-
Case study: Interactive visualization for internet security
-
Boston, MA, USA
-
S.T. Teoh, K.L. Ma, S.F. Wu, and X. Zhao Case study: interactive visualization for internet security IEEE Conference on Visualization (Vis 2002) Boston, MA, USA 2002
-
(2002)
IEEE Conference on Visualization (Vis 2002)
-
-
Teoh, S.T.1
Ma, K.L.2
Wu, S.F.3
Zhao, X.4
-
38
-
-
84870897584
-
Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration
-
K. Nyarko, T. Capers, C. Scott, and K.A. Ladeji-Osias Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems (HAPTICS 2002) 2002 277 284
-
(2002)
10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems (HAPTICS 2002)
, pp. 277-284
-
-
Nyarko, K.1
Capers, T.2
Scott, C.3
Ladeji-Osias, K.A.4
-
39
-
-
33749519234
-
IDGraphs: Intrusion detection and analysis using histographs
-
P. Ren, Y. Gao, Z.C. Li, Y. Chen, and B. Watson IDGraphs: intrusion detection and analysis using histographs IEEE Workshop on Visualization for Computer Security (VizSEC 05) 2005 39 46
-
(2005)
IEEE Workshop on Visualization for Computer Security (VizSEC 05)
, pp. 39-46
-
-
Ren, P.1
Gao, Y.2
Li, Z.C.3
Chen, Y.4
Watson, B.5
-
41
-
-
33749520207
-
IDS RainStorm: Visualizing IDS alarms
-
K. Abdullah, C.P. Lee, G. Conti, J.A. Copeland, and J. Stasko IDS RainStorm: visualizing IDS alarms IEEE Workshop on Visualization for Computer Security (VizSEC 05) 2005 1 10
-
(2005)
IEEE Workshop on Visualization for Computer Security (VizSEC 05)
, pp. 1-10
-
-
Abdullah, K.1
Lee, C.P.2
Conti, G.3
Copeland, J.A.4
Stasko, J.5
-
44
-
-
0016102310
-
A projection pursuit algorithm for exploratory data-analysis
-
J.H. Friedman, and J.W. Tukey A projection pursuit algorithm for exploratory data-analysis IEEE Transactions on Computers 23 1974 881 890
-
(1974)
IEEE Transactions on Computers
, vol.23
, pp. 881-890
-
-
Friedman, J.H.1
Tukey, J.W.2
-
45
-
-
0001493668
-
Asymptotics of graphical projection pursuit
-
P. Diaconis, and D. Freedman Asymptotics of graphical projection pursuit The Annals of Statistics 12 1984 793 815
-
(1984)
The Annals of Statistics
, vol.12
, pp. 793-815
-
-
Diaconis, P.1
Freedman, D.2
-
47
-
-
35948957403
-
Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
-
F. Mansmann, D.A. Keim, S.C. North, B. Rexroad, and D. Sheleheda Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats IEEE Transactions on Visualization and Computer Graphics 13 2007 1105 1112
-
(2007)
IEEE Transactions on Visualization and Computer Graphics
, vol.13
, pp. 1105-1112
-
-
Mansmann, F.1
Keim, D.A.2
North, S.C.3
Rexroad, B.4
Sheleheda, D.5
-
48
-
-
34548211483
-
Detecting distributed scans using high-performance query-driven visualization
-
Tampa, FL, USA
-
K. Stockinger, E.W. Bethel, S. Campbell, E. Dart, and K. Wu Detecting distributed scans using high-performance query-driven visualization 2006 ACM/IEEE Conference on Supercomputing Tampa, FL, USA 2006
-
(2006)
2006 ACM/IEEE Conference on Supercomputing
-
-
Stockinger, K.1
Bethel, E.W.2
Campbell, S.3
Dart, E.4
Wu, K.5
-
49
-
-
0025489075
-
The self-organizing map
-
T. Kohonen The self-organizing map IEEE 78 1990 1464 1480
-
(1990)
IEEE
, vol.78
, pp. 1464-1480
-
-
Kohonen, T.1
-
50
-
-
0001710505
-
Analysis of a complex of statistical variables into principal components
-
H. Hotelling Analysis of a complex of statistical variables into principal components Journal of Education Psychology 24 1933 417 444
-
(1933)
Journal of Education Psychology
, vol.24
, pp. 417-444
-
-
Hotelling, H.1
-
51
-
-
0000325341
-
On lines and planes of closest fit to systems of points in space
-
K. Pearson On lines and planes of closest fit to systems of points in space Philosophical Magazine 2 1901 559 572
-
(1901)
Philosophical Magazine
, vol.2
, pp. 559-572
-
-
Pearson, K.1
-
54
-
-
0020464111
-
A simplified neuron model as a principal component analyzer
-
E. Oja A simplified neuron model as a principal component analyzer Journal of Mathematical Biology 15 1982 267 273
-
(1982)
Journal of Mathematical Biology
, vol.15
, pp. 267-273
-
-
Oja, E.1
-
55
-
-
0039086686
-
Contribution analysis: A technique for assigning responsibilities to hidden units in connectionist networks
-
D. Sanger Contribution analysis: a technique for assigning responsibilities to hidden units in connectionist networks Connection Science 1 1989 115 138
-
(1989)
Connection Science
, vol.1
, pp. 115-138
-
-
Sanger, D.1
-
56
-
-
0031207174
-
A neural network for PCA and beyond
-
C. Fyfe A neural network for PCA and beyond Neural Processing Letters 6 1997 33 41
-
(1997)
Neural Processing Letters
, vol.6
, pp. 33-41
-
-
Fyfe, C.1
-
57
-
-
3543075142
-
Maximum and minimum likelihood Hebbian learning for exploratory projection pursuit
-
E. Corchado, D. MacDonald, and C. Fyfe Maximum and minimum likelihood Hebbian learning for exploratory projection pursuit Data Mining and Knowledge Discovery 8 2004 203 225
-
(2004)
Data Mining and Knowledge Discovery
, vol.8
, pp. 203-225
-
-
Corchado, E.1
MacDonald, D.2
Fyfe, C.3
-
62
-
-
35048868435
-
A hierarchical visualization tool to analyse the thermal evolution of construction materials
-
E. Corchado, P. Burgos, M.D. Rodriguez, and V. Tricio A hierarchical visualization tool to analyse the thermal evolution of construction materials CDVE 2004 2004 238 245
-
(2004)
CDVE 2004
, pp. 238-245
-
-
Corchado, E.1
Burgos, P.2
Rodriguez, M.D.3
Tricio, V.4
-
64
-
-
76349098482
-
DIPKIP: A connectionist knowledge management system to identify knowledge deficits in practical cases
-
Á. Herrero, E. Corchado, L. Sáiz, and A. Abraham DIPKIP: a connectionist knowledge management system to identify knowledge deficits in practical cases Computational Intelligence 26 2010 26 56
-
(2010)
Computational Intelligence
, vol.26
, pp. 26-56
-
-
Herrero, Á.1
Corchado, E.2
Sáiz, L.3
Abraham, A.4
-
66
-
-
0030736375
-
Curvilinear component analysis: A self-organizing neural network for nonlinear mapping of data sets
-
P. Demartines, and J. Herault Curvilinear component analysis: a self-organizing neural network for nonlinear mapping of data sets IEEE Transactions on Neural Networks 8 1997 148 154
-
(1997)
IEEE Transactions on Neural Networks
, vol.8
, pp. 148-154
-
-
Demartines, P.1
Herault, J.2
-
67
-
-
56449096542
-
-
Cisco IOS NetFlow. http://www.cisco.com/web/go/netflow.
-
Cisco IOS NetFlow
-
-
-
74
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 Darpa off-line intrusion detection system evaluation as performed by Lincoln laboratory
-
J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 Darpa off-line intrusion detection system evaluation as performed by Lincoln laboratory ACM Transactions on Information and System Security 3 2000 262 294
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
76
-
-
14844322335
-
Testing network-based intrusion detection signatures using mutant exploits
-
Washington, DC, USA
-
G. Vigna, W. Robertson, and D. Balzarotti Testing network-based intrusion detection signatures using mutant exploits 11th ACM Conference on Computer and Communications Security Washington, DC, USA 2004 21 30
-
(2004)
11th ACM Conference on Computer and Communications Security
, pp. 21-30
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
|