-
1
-
-
61849175333
-
Efficient deterministic method for detecting new U2R attacks
-
DOI 10.1016/j.comcom.2008.12.037
-
Beghdad, R.(2009). Efficient deterministic method for detecting new U2R attacks. Computer Communications, 32(6), 1104-1110. DOI 10.1016/j.comcom.2008.12.037
-
(2009)
Computer Communications
, vol.32
, Issue.6
, pp. 1104-1110
-
-
Beghdad, R.1
-
2
-
-
53049099150
-
Critical study of neural networks in detecting intrusions
-
October
-
Beghdad, R.(2008, October). Critical study of neural networks in detecting intrusions. Computers & Security, 27(5-6), 168-175
-
(2008)
Computers & Security
, vol.27
, Issue.5-6
, pp. 168-175
-
-
Beghdad, R.1
-
3
-
-
10644257876
-
Modelling and solving the intrusion detection problem in computer networks
-
Beghdad, R.(2004). Modelling and solving the intrusion detection problem in computer networks. Computers & Security, 23(8), 687-696
-
(2004)
Computers & Security
, vol.23
, Issue.8
, pp. 687-696
-
-
Beghdad, R.1
-
4
-
-
2442424268
-
Naive Bayes vs. decision trees in intrusion detection systems
-
Ben Amor, N., Benferhat, S., and Elouadi, Z.(2004). Naive Bayes vs. decision trees in intrusion detection systems. Proceedings of the ACM Symposium on Applied Computing, pp. 420-424
-
(2004)
Proceedings of the ACM Symposium On Applied Computing
, pp. 420-424
-
-
Ben, A.N.1
Benferhat, S.2
Elouadi, Z.3
-
5
-
-
0003802343
-
-
Monterey, CA: Wadsworth & Brooks
-
Breiman, L., Friedman, J., Olshen, R. A., and Stone, C. J.(1984). Classification and regression trees. Monterey, CA: Wadsworth & Brooks
-
(1984)
Classification and regression trees
-
-
Breiman, L.1
Friedman, J.2
Olshen, R.A.3
Stone, C.J.4
-
6
-
-
51149119276
-
Wrapper-based computation and evaluation of sampling methods for imbalanced datasets
-
ACM, New York (2005)
-
Chawla, N. V., Hall, L. O., and Joshi, A.(2005). Wrapper-based computation and evaluation of sampling methods for imbalanced datasets. In Proceedings of the 1st international Workshop on Utility-based Data Mining UBDM '05. ACM, New York, 24-33
-
Proceedings of the 1st International Workshop On Utility-based Data Mining UBDM '05
, pp. 24-33
-
-
Chawla, N.V.1
Hall, L.O.2
Joshi, A.3
-
7
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Chebrolu, S., Abraham, A., and Thomas, J. P.(2005). Feature deduction and ensemble design of intrusion detection systems. Journal of Computers and Security, 24(4), 295-307
-
(2005)
Journal of Computers and Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
8
-
-
85015191605
-
Rule induction with CN2: Some recent improvements
-
In Y. Kodratoff (Ed.), (EWSL-91), Berlin: Springer-Verlag
-
Clark, P.(1991). Rule induction with CN2: some recent improvements. In Y. Kodratoff (Ed.), Machine Learning - Proceedings of the Fifth European Conference (EWSL-91), pp. 151-163. Berlin: Springer-Verlag
-
(1991)
Machine Learning - Proceedings of the Fifth European Conference
, pp. 151-163
-
-
Clark, P.1
-
10
-
-
25444465350
-
Learning From Little: Comparison of Classifiers Given Little Training
-
September, Pisa, Italy
-
Forman, G. and Cohen, I.(2004). Learning from little: comparison of classifiers given little training. Proceeding of 15th European Conference on Machine Learning and the 8th European Conference on Principles and Practice of Knowledge Discovery in Databases, September 20-24, Pisa, Italy
-
(2004)
Proceeding of 15th European Conference On Machine Learning and The 8th European Conference On Principles and Practice of Knowledge Discovery In Databases
, pp. 20-24
-
-
Forman, G.1
Cohen, I.2
-
12
-
-
33745463455
-
Learning classifiers for misuse and anomaly detection using a bag of system calls representation
-
West Point, New York
-
Kang, D. K., Fuller, D., and Honavar, V.(2005). Learning classifiers for misuse and anomaly detection using a bag of system calls representation. In Proceedings of the 2005 IEEE Workshop on Information Assurance and Security United States Military Academy, West Point, New York, pp. 118-125
-
(2005)
Proceedings of The 2005 IEEE Workshop on Information Assurance and Security United States Military Academy
, pp. 118-125
-
-
Kang, D.K.1
Fuller, D.2
Honavar, V.3
-
13
-
-
79960678900
-
-
KDD Data Set Retrieved October 2008 from
-
KDD Data Set.(1999). Retrieved October 2008 from http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
(1999)
-
-
-
14
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Kruegel, C., Mutz, D., Robertson, W., and Valeur, F.(2003). Bayesian event classification for intrusion detection. In Proceedings of the 19th Annual Computer Security Applications Conference, IEEE Computer Society, pp. 14-23
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference, IEEE Computer Society
, pp. 14-23
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
15
-
-
35248819234
-
Using decision trees to improve signaturebased intrusion detection
-
Pittsburgh, PA 8-10, September
-
Kruegel, C. and Toth, T.(2003). Using decision trees to improve signaturebased intrusion detection. In Proceeding of 6th International Symposium, RAID 2003, September 8-10, Pittsburgh, PA, pp. 173-191
-
(2003)
Proceeding of 6th International Symposium, RAID 2003
, pp. 173-191
-
-
Kruegel, C.1
Toth, T.2
-
18
-
-
79960675675
-
A Scalable Clustering Technique For Intrusion Signature Recognition
-
West Point, NY, June
-
Nong, Y. and Xiangyang, L.(2001). A scalable clustering technique for intrusion signature recognition. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security United States Military Academy, June 5-6, West Point, NY
-
(2001)
Proceedings of the 2001 IEEE Workshop On Information Assurance and Security United States Military Academy
, pp. 5-6
-
-
Nong, Y.1
Xiangyang, L.2
-
19
-
-
79960662758
-
Intrusion detection systems using decision trees and support vector machines
-
Department of Computer Science, Oklahoma State University
-
Peddabachigari, S., Abraham, A., and Thomas, J.(2003). Intrusion detection systems using decision trees and support vector machines. Technica l Report, Department of Computer Science, Oklahoma State University
-
(2003)
Technica L Report
-
-
Peddabachigari, S.1
Abraham, A.2
Thomas, J.3
-
20
-
-
33744584654
-
Induction of decision trees
-
Quinlan, J. R (1986). Induction of decision trees. Machine Learning, 1, 1-106
-
(1986)
Machine Learning
, vol.1
, pp. 1-106
-
-
Quinlan, J.R.1
-
22
-
-
33749469755
-
Tanagra: A Free Software For Training and Research
-
Winning Strategy in KDD99. Available from
-
Rakotomalala, R.(2005). Tanagra: a free software for training and research. Actes de EGC'2005, RNTI-E-3, 2, 697-702. Winning Strategy in KDD99. (1999). Available from: http://kdd.ccs.uci.edu/databases/kddcup99/task.html
-
(1999)
Actes de EGC'2005, RNTI-E-3
, vol.2
, pp. 697-702
-
-
Rakotomalala, R.1
|