-
4
-
-
0003993827
-
-
DARPA
-
DARPA. Intrusion Detection Evaluation, 1999. 〈 http://www.ll.mit. edu/IST/ideval/data/data-index.html 〉.
-
(1999)
Intrusion Detection Evaluation
-
-
-
5
-
-
79251598703
-
-
Heavens VX
-
Heavens VX, 〈 http://vx.netlux.org/ 〉.
-
-
-
-
6
-
-
10944257572
-
Feature selection for intrusion detection: An evolutionary wrapper approach
-
Hofman A, Horeis T, Sick B. Feature selection for intrusion detection: an evolutionary wrapper approach. In: Proceedings of the IEEE neural networks, vol. 2, 2004, p. 15638.
-
(2004)
Proceedings of the IEEE Neural Networks
, vol.2
, pp. 1563-1568
-
-
Hofman, A.1
Horeis, T.2
Sick, B.3
-
7
-
-
79251593603
-
-
IP Traffic
-
IP Traffic, 〈 http://www.omnicor.com/netest.htm 〉.
-
-
-
-
9
-
-
79251593072
-
-
Kaspersky Lab
-
Kaspersky Lab, 〈 http://www.kaspersky.com/ 〉.
-
-
-
-
10
-
-
33845570814
-
Network intrusion detection through genetic feature selection
-
Lee C-H, Chung J-W, Shin S-W, Network intrusion detection through genetic feature selection. In: Proceedings of the IEEE conference on software engineering, artificial intelligence, networking, and parallel/distributed computing (SNPD), 2006, p. 10914.
-
(2006)
Proceedings of the IEEE Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/distributed Computing (SNPD)
, pp. 109-114
-
-
Lee, C.-H.1
Chung, J.-W.2
Shin, S.-W.3
-
11
-
-
77956603342
-
Towards the development of OMNIVOR: An evolving intelligent intrusion detection system
-
Springer Press
-
S. Lekkas, and L. Mikhailov Towards the development of OMNIVOR: an evolving intelligent intrusion detection system Applications and innovations in intelligent systems XV 2007 Springer Press p. 303308
-
(2007)
Applications and Innovations in Intelligent Systems XV
-
-
Lekkas, S.1
Mikhailov, L.2
-
12
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
Y. Liao, and V.R. Vemuri Use of K-nearest neighbor classifier for intrusion detection Computers & Security 21 5 2002 439 448
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
14
-
-
84870480277
-
Weighted feature extraction using a genetic algorithm for intrusion detection
-
Middlemiss MJ, Dick G. Weighted feature extraction using a genetic algorithm for intrusion detection. In: Proceedings of the evolutionary computation, vol. 3, 2003, p. 166975.
-
(2003)
Proceedings of the Evolutionary Computation
, vol.3
, pp. 1669-1675
-
-
Middlemiss, M.J.1
Dick, G.2
-
17
-
-
77953759247
-
Decision tree classifier for network intrusion detection with Ga-based feature selection
-
Stein G, Chen B, Wu AS, Hua KA. Decision tree classifier for network intrusion detection with Ga-based feature selection. In: Proceedings of the ACM southeast regional conference, vol. 2, 2005, p. 13641.
-
(2005)
Proceedings of the ACM Southeast Regional Conference
, vol.2
, pp. 136-141
-
-
Stein, G.1
Chen, B.2
Wu, A.S.3
Hua, K.A.4
-
19
-
-
79251595080
-
-
The UCI KDD Archive
-
The UCI KDD Archive, 〈 http://kdd.ics.uci.edu/databases/kddcup99/ kddcup.names 〉.
-
-
-
-
20
-
-
34247636165
-
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
C.-H. Tsang, S. Kwong, and H. Wang Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection Pattern Recognition 40 9 2007 2373 2391
-
(2007)
Pattern Recognition
, vol.40
, Issue.9
, pp. 2373-2391
-
-
Tsang, C.-H.1
Kwong, S.2
Wang, H.3
-
21
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
A.N. Toosj, and M. Kahani A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers Computer Communications 30 10 2007 2201 2212
-
(2007)
Computer Communications
, vol.30
, Issue.10
, pp. 2201-2212
-
-
Toosj, A.N.1
Kahani, M.2
-
22
-
-
79251599221
-
-
WinPcap. The Windows Packet Capture Library
-
WinPcap. The Windows Packet Capture Library, 〈 http://www.winpcap. org/ 〉.
-
-
-
|