-
1
-
-
75149179043
-
Histogram-based traffic anomaly detection
-
June
-
A. Kind, M. P. Stoecklin, and X. Dimitropoulos, "Histogram-based traffic anomaly detection," in IEEE Transactions on Network Service Management, vol. 6, no. 2, June 2009.
-
(2009)
IEEE Transactions on Network Service Management
, vol.6
, Issue.2
-
-
Kind, A.1
Stoecklin, M.P.2
Dimitropoulos, X.3
-
2
-
-
77951593049
-
Parameterized anomaly detection system with automatic configuration
-
B. B. Zarpelão, L. S. Mendes, M. L. Proença Jr., and J. J. P. C. Rodrigues, "Parameterized anomaly detection system with automatic configuration," in GC'09 CSS. 2009 IEEE Global Communications Conference (IEEE GLOBECOM 2009), Communications Software and Services Symposium, 2009.
-
GC'09 CSS. 2009 IEEE Global Communications Conference (IEEE GLOBECOM 2009), Communications Software and Services Symposium, 2009
-
-
Zarpelão, B.B.1
Mendes, L.S.2
Proença Jr., M.L.3
Rodrigues, J.J.P.C.4
-
4
-
-
78650383914
-
-
Springer
-
M. L. Proença Jr., C. Coppelmans, M. Botolli, and L. S. Mendes, Security and reliability in information systems and networks: Baseline to help with network management. Springer, 2006, pp. 149-157.
-
(2006)
Security and Reliability in Information Systems and Networks: Baseline to Help with Network Management
, pp. 149-157
-
-
Proença Jr., M.L.1
Coppelmans, C.2
Botolli, M.3
Mendes, L.S.4
-
7
-
-
74049146337
-
A network anomaly detection method based on relative entropy theory
-
Y. ling Zhang, Z. guo Han, and J. xia Ren, "A network anomaly detection method based on relative entropy theory," in Proceedings of the 2009 Second International Symposium on Electronic Commerce and Security, 2009, pp. 231-235.
-
Proceedings of the 2009 Second International Symposium on Electronic Commerce and Security, 2009
, pp. 231-235
-
-
Zhang, Y.L.1
Han, Z.G.2
Ren, J.X.3
-
9
-
-
57949097090
-
Anomaly detection based on available bandwidth estimation
-
L. He, S. Yu, and M. Li, "Anomaly detection based on available bandwidth estimation," in Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, 2008, pp. 176-183.
-
Proceedings of the 2008 IFIP International Conference on Network and Parallel Computing, 2008
, pp. 176-183
-
-
He, L.1
Yu, S.2
Li, M.3
-
10
-
-
50049128484
-
Optimizing fuzzy k-means for network anomaly detection using pso
-
R. Ensafi, S. Dehghanzadeh, R. Mohammad, and T. Akbarzadeh, "Optimizing fuzzy k-means for network anomaly detection using pso," in AICCSA 2008. IEEE/ACS International Conference on Computer Systems and Applications, Apr. 2008, pp. 686-693.
-
AICCSA 2008. IEEE/ACS International Conference on Computer Systems and Applications, Apr. 2008
, pp. 686-693
-
-
Ensafi, R.1
Dehghanzadeh, S.2
Mohammad, R.3
Akbarzadeh, T.4
-
11
-
-
0141723181
-
-
Available at
-
KDD Cup 1999 Data. Available at http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html.
-
KDD Cup 1999 Data
-
-
-
12
-
-
49249132924
-
Network anomaly detection using rbf neural network with hybrid qpso
-
R. Ma, Y. Liu, X. Lin, and Z.Wang, "Network anomaly detection using rbf neural network with hybrid qpso," in IEEE International Conference on Networking, Sensing and Control, Apr. 2008, pp. 1284-1287.
-
IEEE International Conference on Networking, Sensing and Control, Apr. 2008
, pp. 1284-1287
-
-
Ma, R.1
Liu, Y.2
Lin, X.3
Wang, Z.4
-
13
-
-
34047197634
-
K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection
-
L. Xiao, Z. Shao, and G. Liu, "K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection," in WCICA 2006 . The Sixth World Congress on Intelligent Control and Automation, 2006, pp. 5854-5858.
-
WCICA 2006. The Sixth World Congress on Intelligent Control and Automation, 2006
, pp. 5854-5858
-
-
Xiao, L.1
Shao, Z.2
Liu, G.3
-
15
-
-
0001689296
-
Parameter selection in particle swarm optimization
-
Y. Shi and R. C. Eberhart, "Parameter selection in particle swarm optimization," in 1998 Annual Conference on Evolutionary Programming, San Diego, USA, March 1998.
-
1998 Annual Conference on Evolutionary Programming, San Diego, USA, March 1998
-
-
Shi, Y.1
Eberhart, R.C.2
-
16
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
May
-
S. Axelsson, "The base-rate fallacy and the difficulty of intrusion detection," in ACM Transactions on Information and Systems Security 3, vol. 1, May 2000, pp. 186 - 205.
-
(2000)
ACM Transactions on Information and Systems Security 3
, vol.1
, pp. 186-205
-
-
Axelsson, S.1
|