-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
Fort Washington, PA, USA: James P Anderson Co.
-
Anderson, J. P. (1980). Computer security threat monitoring and surveillance. Technical Report, 98 (17). Fort Washington, PA, USA: James P Anderson Co.
-
(1980)
Technical Report
, vol.98
, Issue.17
-
-
Anderson, J.P.1
-
2
-
-
34249731961
-
Adaptive real-time anomaly detection with incremental clustering
-
DOI 10.1016/j.istr.2007.02.004, PII S1363412707000064
-
K. Burbeck, and N.T. Simmin Adaptive real-time anomaly detection with incremental clustering Information Security Technical Report 12 1 2007 56 67 (Pubitemid 46829996)
-
(2007)
Information Security Technical Report
, vol.12
, Issue.1
, pp. 56-67
-
-
Burbeck, K.1
Nadjm-Tehrani, S.2
-
3
-
-
0003893616
-
Requirements and model for IDES-A real-time intrusion detection system
-
Computer Science Laboratory. Menlo Park, CA: SRI International.
-
Denning, D. E.; Neumann, P. G. (1985). Requirements and model for IDES-A real-time intrusion detection system. Technical Report, Computer Science Laboratory. Menlo Park, CA: SRI International.
-
(1985)
Technical Report
-
-
Denning, D.E.1
Neumann, P.G.2
-
7
-
-
79951579022
-
-
KDD99, KDD cup 1999 data. (1999).
-
KDD99, KDD cup 1999 data. (1999). .
-
-
-
-
8
-
-
44249089794
-
Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system
-
Lee, J. H.; Lee, J. H.; Sohn, S. G.; Ryu, J.H.; Chung, T. M. (2008). Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system. In The 10th international conference on advanced communication technology (ICACT 2008) (Vol. 2, pp. 1170-1175).
-
(2008)
The 10th International Conference on Advanced Communication Technology (ICACT 2008)
, vol.2
, pp. 1170-1175
-
-
Lee, J.H.1
Lee, J.H.2
Sohn, S.G.3
Ryu, J.H.4
Chung, T.M.5
-
9
-
-
33645163913
-
Dos intrusion detection based on incremental learning with support vector machines
-
Y. Liu, Z. Wang, Y. Feng, and H.Y. Gu Dos intrusion detection based on incremental learning with support vector machines Computer Engineering 32 4 2006 179 186
-
(2006)
Computer Engineering
, vol.32
, Issue.4
, pp. 179-186
-
-
Liu, Y.1
Wang, Z.2
Feng, Y.3
Gu, H.Y.4
-
10
-
-
34447280122
-
Network anomaly detection with incomplete audit data
-
DOI 10.1016/j.comnet.2007.04.017, PII S1389128607001235
-
A. Patcha, and J.M. Park Network anomaly detection with incomplete audit data Computer Networks 51 13 2007 3935 3955 (Pubitemid 47042596)
-
(2007)
Computer Networks
, vol.51
, Issue.13
, pp. 3935-3955
-
-
Patcha, A.1
Park, J.-M.2
-
11
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
-
S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas Modeling intrusion detection system using hybrid intelligent systems Journal of Network and Computer Applications 30 1 2007 114 132 (Pubitemid 44666486)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
12
-
-
33745442482
-
A machine learning framework for network anomaly detection using SVM and GA
-
DOI 10.1109/IAW.2005.1495950, 1495950, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
Shon, T.; Kim, Y.; Lee, C.; Moon, J. (2005). A machine learning framework for network anomaly detection using SVM and GA. In Proceedings of the 2005 IEEE workshop on information assurance and security (pp. 176-183). (Pubitemid 43948720)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 176-183
-
-
Shon, T.1
Kim, Y.2
Lee, C.3
Moon, J.4
-
13
-
-
34548793095
-
Intrusion detection model based on particle swarm optimization and support vector machine
-
DOI 10.1109/CISDA.2007.368152, 4219099, Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007
-
Srinoy, S. (2007). Intrusion Detection model based on particle swarm optimization and support vector machine. In Proceedings of the 2007 IEEE symposium on computational intelligence in security and defense applications (CISDA 2007) (pp. 186-192). (Pubitemid 47431354)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007
, pp. 186-192
-
-
Srinoy, S.1
-
15
-
-
78149367754
-
New algorithm for SVM-based incremental learning
-
X.D. Wang, C.Y. Zheng, C.M. Wu, and H.D. Zhang New algorithm for SVM-based incremental learning Computer Applications 26 10 2006 2440 2443
-
(2006)
Computer Applications
, vol.26
, Issue.10
, pp. 2440-2443
-
-
Wang, X.D.1
Zheng, C.Y.2
Wu, C.M.3
Zhang, H.D.4
-
16
-
-
40849099949
-
Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees
-
C. Xiang, P.C. Yong, and L.S. Meng Design of multiple-level hybrid classifier for intrusion detection system using Bayesian clustering and decision trees Pattern Recognition Letters 29 7 2008 918 924
-
(2008)
Pattern Recognition Letters
, vol.29
, Issue.7
, pp. 918-924
-
-
Xiang, C.1
Yong, P.C.2
Meng, L.S.3
-
17
-
-
21844433474
-
Application of online-training SVMs for real-time intrusion detection with different considerations
-
DOI 10.1016/j.comcom.2005.01.014, PII S0140366405000484
-
Z. Zhang, and H. Shen Application of online-training SVMs for real-time intrusion detection with different considerations Computer Communications 28 12 2005 1428 1442 (Pubitemid 40952614)
-
(2005)
Computer Communications
, vol.28
, Issue.12
, pp. 1428-1442
-
-
Zhang, Z.1
Shen, H.2
|