-
1
-
-
33646844014
-
Statistical causality analysis of infosec alert data
-
Pittsburgh PA
-
X. Qin and W. Lee, "Statistical causality analysis of infosec alert data," in Proc. Int. Symp. Recent Adv. Intrusion Detection, Pittsburgh, PA, 2003, pp. 73-93.
-
(2003)
Proc. Int. Symp. Recent Adv. Intrusion Detection
, pp. 73-93
-
-
Qin, X.1
Lee, W.2
-
2
-
-
0032679185
-
Embedding RMON in large LAN switches
-
Jan.
-
E. E. Stelzer and T. A. Gonsalves, "Embedding RMON in large LAN switches," IEEE Netw., vol. 13, no. 1, pp. 63-72, Jan. 1999.
-
(1999)
IEEE Netw.
, vol.13
, Issue.1
, pp. 63-72
-
-
Stelzer, E.E.1
Gonsalves, T.A.2
-
3
-
-
0034445661
-
System architecture directions for networked sensors
-
J. Hill, R. Szewcyzk, A. Woo, S. Hollar, D. Culler, and K. Pister, "System architecture directions for networked sensors," Oper. Syst. Rev., vol. 35, no. 11, pp. 93-104, Nov. 2000. (Pubitemid 32474159)
-
(2000)
International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
4
-
-
47949096687
-
A low-cost embedded IDS to monitor and prevent man-in-the-middle attacks on wired LAN environments
-
Valencia Spain
-
J. Belenguer and C. T. Calafate, "A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments," in Proc. Int. Conf. Emerging Security Inf., Syst., Technol., Valencia, Spain, 2007, pp. 122-127.
-
(2007)
Proc. Int. Conf. Emerging Security Inf. Syst. Technol.
, pp. 122-127
-
-
Belenguer, J.1
Calafate, C.T.2
-
5
-
-
21844444250
-
Reconfigurable hardware implementation of hostbased IDS
-
Penang Malaysia
-
T. Sato andM. Fukase, "Reconfigurable hardware implementation of hostbased IDS," in Proc. Asia-Pacific Conf. Commun., Penang, Malaysia, 2003, pp. 849-853.
-
(2003)
Proc. Asia-Pacific Conf. Commun.
, pp. 849-853
-
-
Sato, T.1
Fukase, M.2
-
6
-
-
0036085540
-
"Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector
-
K. M. Tan and R. A. Maxion, "Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector," in Proc. IEEE Symp. Security Privacy, Oakland, CA, 2002, pp. 188-201. (Pubitemid 34648113)
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 188-201
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
7
-
-
14844319067
-
Anomaly detection of Web-based attacks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
C. Kruegel and G. Vigna, "Anomaly detection of Web-based attacks," in Proc. ACM Conf. Comput. Commun. Security, Washington, DC, 2003, pp. 251-261. (Pubitemid 40673807)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 251-261
-
-
Kruegel, C.1
Vigna, G.2
-
8
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
K. Wang and S. Stolfo, "Anomalous payload-based network intrusion detection," in Proc. Int. Symp. Recent Adv. Intrusion Detection, French Riviera, France, 2004, pp. 203-222. (Pubitemid 39741895)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3224
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
9
-
-
35048873330
-
Evolutionary learning programs behavior in neural networks for anomaly detection
-
Calcutta India
-
S. J. Han, K. J. Kim, and S. B. Cho, "Evolutionary learning program"s behavior in neural networks for anomaly detection," in Proc. Int. Conf. Neural Inf. Process., Calcutta, India, 2004, pp. 236-241.
-
(2004)
Proc. Int. Conf. Neural Inf. Process.
, pp. 236-241
-
-
Han, S.J.1
Kim, K.J.2
Cho, S.B.3
-
10
-
-
2442526701
-
Unsupervised learning techniques for an intrusion detection system
-
Nicosia Cyprus
-
S. Zanero and S. Savaresi, "Unsupervised learning techniques for an intrusion detection system," in Proc. ACM Symp. Appl. Comput., Nicosia, Cyprus, 2004, pp. 412-419.
-
(2004)
Proc. ACM Symp. Appl. Comput.
, pp. 412-419
-
-
Zanero, S.1
Savaresi, S.2
-
11
-
-
34047109040
-
Intrusion detection system based on growing grid neural network
-
1653229, 2006 IEEE Mediterranean Electrotechnical Conference, MELECON 2006 - Circuits and Systems for Signal Processing, lnformation and Communication Technologies, and Power Sources and Systems
-
F. J. Mora, F.Maciá, J. M. García, and H. Ramos, "Intrusion detection system based on growing grid neural network," in Proc. IEEE Mediterranean Electrotech. Conf., Malaga, Spain, 2006, pp. 839-842. (Pubitemid 46522314)
-
(2006)
Proceedings of the Mediterranean Electrotechnical Conference - MELECON
, vol.2006
, pp. 839-842
-
-
Mora, F.J.1
Macia, F.2
Garcia, J.M.3
Ramos, H.4
-
12
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Oct.
-
R. Lippmann and R. Cunningham, "Improving intrusion detection performance using keyword selection and neural networks," Comput. Netw., vol. 34, no. 4, pp. 597-603, Oct. 2000.
-
(2000)
Comput. Netw.
, vol.34
, Issue.4
, pp. 597-603
-
-
Lippmann, R.1
Cunningham, R.2
-
13
-
-
9444277747
-
The application of artificial intelligence to misuse detection
-
Louvain-la-Neuve Belgium
-
J. Cannady and J. Mahaffey, "The application of artificial intelligence to misuse detection," in Proc. Int. Symp. Recent Adv. Intrusion Detection, Louvain-la-Neuve, Belgium, 1998, pp. 75-94.
-
(1998)
Proc. Int. Symp. Recent Adv. Intrusion Detection
, pp. 75-94
-
-
Cannady, J.1
Mahaffey, J.2
-
14
-
-
2442529295
-
Dynamic intrusion detection using self-organizing maps
-
Ottawa ON Canada
-
P. Lichodzijewski, A. Zincir-Heywood, and M. Heywood, "Dynamic intrusion detection using self-organizing maps," in Proc. Annu. Can. Inf. Technol. Security Symp., Ottawa, ON, Canada, 2002, pp. 93-97.
-
(2002)
Proc. Annu. Can. Inf. Technol. Security Symp.
, pp. 93-97
-
-
Lichodzijewski, P.1
Zincir-Heywood, A.2
Heywood, M.3
-
15
-
-
35248842651
-
Detecting anomalous network traffic with self-organizing maps
-
Pittsburgh PA
-
M. Ramadas, S. Ostermann, and B. Tjaden, "Detecting anomalous network traffic with self-organizing maps," in Proc. Int. Symp. Recent Adv. Intrusion Detection, Pittsburgh, PA, 2003, pp. 36-54.
-
(2003)
Proc. Int. Symp. Recent Adv. Intrusion Detection
, pp. 36-54
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
16
-
-
34548526139
-
A platform-based SoC design and implementation of scalable automaton matching for deep packet inspection
-
DOI 10.1016/j.sysarc.2007.03.005, PII S1383762107000501
-
Y.-D. Lin, K.-K. Tseng, T.-H. Lee, Y.-N. Lin, C.-C. Hung, and Y.-C. Lai, "A platform-based SoC design and implementation of scalable automaton matching for deep packet-inspection," J. Syst. Archit., vol. 53, no. 12, pp. 937-950, Dec. 2007. (Pubitemid 47385340)
-
(2007)
Journal of Systems Architecture
, vol.53
, Issue.12
, pp. 937-950
-
-
Lin, Y.-D.1
Tseng, K.-K.2
Lee, T.-H.3
Lin, Y.-N.4
Hung, C.-C.5
Lai, Y.-C.6
-
17
-
-
38349045432
-
Sensorless control of single switch-based switched reluctance motor drive using neural network
-
Jan.
-
C. A. Hudson, N. S. Lobo, and R. Krishnan, "Sensorless control of single switch-based switched reluctance motor drive using neural network," IEEE Trans. Ind. Electron., vol. 55, no. 1, pp. 321-329, Jan. 2008.
-
(2008)
IEEE Trans. Ind. Electron.
, vol.55
, Issue.1
, pp. 321-329
-
-
Hudson, C.A.1
Lobo, N.S.2
Krishnan, R.3
-
18
-
-
33947385783
-
Hardware implementation of a real-time neural network controller with a DSP and an FPGA for nonlinear systems
-
DOI 10.1109/TIE.2006.888791
-
S. Jung and S. S. Kim, "Hardware implementation of a real-time neural network controller with a DSP and a FPGA for nonlinear systems," IEEE Trans. Ind. Electron., vol. 54, no. 1, pp. 265-271, Feb. 2007. (Pubitemid 46444024)
-
(2007)
IEEE Transactions on Industrial Electronics
, vol.54
, Issue.1
, pp. 265-271
-
-
Jung, S.1
Kim, S.S.2
-
19
-
-
40449132198
-
A stochastic-based FPGA controller for an induction motor drive with integrated neural network algorithms
-
DOI 10.1109/TIE.2007.911946
-
D. Zhang and H. Li, "A stochastic-based FPGA controller for an induction motor drive with integrated neural network algorithms," IEEE Trans. Ind. Electron., vol. 55, no. 2, pp. 551-561, Feb. 2008. (Pubitemid 351344228)
-
(2008)
IEEE Transactions on Industrial Electronics
, vol.55
, Issue.2
, pp. 551-561
-
-
Zhang, D.1
Li, H.2
-
21
-
-
33745469273
-
Towards collaborative security and P2P intrusion detection
-
DOI 10.1109/IAW.2005.1495971, 1495971, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
M. E. Locasto, J. Parekh, A. Keromytis, and S. Stolfo, "Towards collaborative security and P2P intrusion detection," in Proc. IEEE Inf. Assur. Workshop, West Point, NY, 2005, pp. 333-339. (Pubitemid 43948741)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 333-339
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
22
-
-
6444240823
-
A line in the sand: A wireless sensor network for target detection classification and tracking
-
Dec.
-
A. Arora, P. Dutta, S. Bapat, V. Kulathumani, H. Zhang, V. Naik, V.Mittal, H. Cao, M. Demirbas, M. Gouda, Y. Choi, T. Herman, S. Kulkarni, U. Arumugam, M. Nesterenko, A. Vora, and M. Miyashita, "A line in the sand: A wireless sensor network for target detection, classification and tracking," Comput. Netw., vol. 46, no. 5, pp. 605-634, Dec. 2004.
-
(2004)
Comput. Netw.
, vol.46
, Issue.5
, pp. 605-634
-
-
Arora, A.1
Dutta, P.2
Bapat, S.3
Kulathumani, V.4
Zhang, H.5
Naik, V.6
Mittal, V.7
Cao, H.8
Demirbas, M.9
Gouda, M.10
Choi, Y.11
Herman, T.12
Kulkarni, S.13
Arumugam, U.14
Nesterenko, M.15
Vora, A.16
Miyashita, M.17
-
23
-
-
67650317025
-
Shunting: A hardware software architecture for flexible high-performance network intrusion prevention
-
Alexandria VA
-
J. M. Gonzalez, V. Paxson, and N. Weaver, "Shunting: A hardware/ software architecture for flexible, high-performance network intrusion prevention," in Proc. ACM Comput. Commun. Security, Alexandria, VA, 2007, pp. 139-149.
-
(2007)
Proc. ACM Comput. Commun. Security
, pp. 139-149
-
-
Gonzalez, J.M.1
Paxson, V.2
Weaver, N.3
-
24
-
-
70349619163
-
Industrial wireless sensor networks: Challenges design principles and technical approaches
-
Oct.
-
V. C. Gungor and G. P. Hancke, "Industrial wireless sensor networks: Challenges, design principles, and technical approaches," IEEE Trans. Ind. Electron., vol. 56, no. 10, pp. 4258-4265, Oct. 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.10
, pp. 4258-4265
-
-
Gungor, V.C.1
Hancke, G.P.2
-
25
-
-
79951644293
-
Web based service for embedded devices
-
Erfurt Germany
-
U. Toop, P. Muller, J. Konnertz, and A. Pick, "Web based service for embedded devices," in Proc. Workshop Web, Web-Serv. Database Syst., Erfurt, Germany, 2002, pp. 141-153.
-
(2002)
Proc. Workshop Web. Web-Serv. Database Syst.
, pp. 141-153
-
-
Toop, U.1
Muller, P.2
Konnertz, J.3
Pick, A.4
-
26
-
-
57749168292
-
Phase-sensitive detection of motor fault signatures in the presence of noise
-
Jun.
-
B. Akin, U. Orguner, H. A. Toliyat, and M. Rainer, "Phase-sensitive detection of motor fault signatures in the presence of noise," IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. 2539-2550, Jun. 2008.
-
(2008)
IEEE Trans. Ind. Electron.
, vol.55
, Issue.6
, pp. 2539-2550
-
-
Akin, B.1
Orguner, U.2
Toliyat, H.A.3
Rainer, M.4
-
27
-
-
33947426420
-
Neural network-based selective compensation of current quality problems in distribution system
-
DOI 10.1109/TIE.2006.888754
-
B. Singh, V. Verma, and J. Solanki, "Neural network-based selective compensation of current quality problems in distribution system," IEEE Trans. Ind. Electron., vol. 54, no. 1, pp. 53-60, Feb. 2007. (Pubitemid 46444005)
-
(2007)
IEEE Transactions on Industrial Electronics
, vol.54
, Issue.1
, pp. 53-60
-
-
Singh, B.1
Verma, V.2
Solanki, J.3
-
28
-
-
66149106362
-
A fastering tool tracking system using an IMU and a position sensor with kalman filters and a fuzzy expert system
-
May
-
S. Won, F. Golnaraghi, and W. Melek, "A fastering tool tracking system using an IMU and a position sensor with Kalman filters and a fuzzy expert system," IEEE Trans. Ind. Electron., vol. 56, no. 5, pp. 1782-1792, May 2009.
-
(2009)
IEEE Trans. Ind. Electron.
, vol.56
, Issue.5
, pp. 1782-1792
-
-
Won, S.1
Golnaraghi, F.2
Melek, W.3
-
29
-
-
79951602548
-
Scalable self-organizing technology for sensor networks
-
B. Szymanski and B. Yener Eds. New York: Springer-Verlag
-
K. P. Birman, S. Guha, and R. Murty, "Scalable, self-organizing technology for sensor networks," in Advances in Pervasive Computing and Networking, B. Szymanski and B. Yener, Eds. New York: Springer- Verlag, 2005, pp. 1-16.
-
(2005)
Advances in Pervasive Computing and Networking
, pp. 1-16
-
-
Birman, K.P.1
Guha, S.2
Murty, R.3
-
30
-
-
33646341611
-
-
IEEE 802 3af CSMA CD Access Method and Physical Layer Specifications Amendment: Data Terminal Equipment DTE Power via Media Dependent Interface MDI Accessed: Mar. 20 2009 Online Available
-
IEEE 802.3af, (CSMA/CD) Access Method and Physical Layer Specifications Amendment: Data Terminal Equipment (DTE) Power via Media Dependent Interface (MDI), IEEE Computer Society, 2003, [Accessed: Mar. 20, 2009]. [Online]. Available:
-
(2003)
IEEE Computer Society
-
-
-
31
-
-
36349024236
-
Unplugged but connected - Design and implementation of a truly wireless real-time sensor/actuator interface
-
DOI 10.1109/MIE.2007.901481
-
G. Scheible, D. Dzung, J. Endresen, and J. E. Frey, "Unplugged but connected, design and implementation of a truly wireless real-time sensor/actuator interface," IEEE Ind. Electron. Mag., vol. 1, no. 2, pp. 25-34, Jul. 2007. (Pubitemid 350141725)
-
(2007)
IEEE Industrial Electronics Magazine
, vol.1
, Issue.2
, pp. 25-34
-
-
Scheible, G.1
Dzung, D.2
Endresen, J.3
Frey, J.-E.4
-
33
-
-
0004225165
-
The intrusion detection message exchange format IDMEF
-
Accessed: Mar. 20 2009 Online Available
-
H. Debar, D. Curry, and B. Feinstein, The Intrusion Detection Message Exchange Format (IDMEF), Internet Engineering Task Force, 2007, [Accessed: Mar. 20, 2009]. [Online]. Available:
-
(2007)
Internet Engineering Task Force
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
|