-
1
-
-
0036508551
-
2002 CSI/FBI computer crime and security survey
-
R. Power, CSI/FBI computer crime & security survey, Computer Security Journal, Vol.18, No.2, pp:7-30, 2002. (Pubitemid 34725543)
-
(2002)
Computer Security Journal
, vol.18
, Issue.2
, pp. 7-30
-
-
Power, R.1
-
2
-
-
76249083039
-
-
Master's thesis, Donau University, Krems, Austria
-
A. Delamer, intrusion detection with data mining, Master's thesis, Donau University, Krems, Austria, 2002.
-
(2002)
Intrusion Detection with Data Mining
-
-
Delamer, A.1
-
4
-
-
0037105910
-
Intrusion detection techniques and approaches
-
DOI 10.1016/S0140-3664(02)00037-3, PII S0140366402000373
-
T. Verwoed and R. Hunt, intrusion detection techniques and approaches, Elsevier: computer communications, Vol.25, No.10, pp: 1356-1365, 2002. (Pubitemid 34506182)
-
(2002)
Computer Communications
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
5
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
S. Chobrolu, A. Abraham, P. Johnson, feature deduction and ensemble design of intrusion detection systems, Elsevier computers & security, Vol.24, pp: 195-307, 2005.
-
(2005)
Elsevier Computers & Security
, vol.24
, pp. 195-307
-
-
Chobrolu, S.1
Abraham, A.2
Johnson, P.3
-
6
-
-
33746983029
-
Detection of intrusions in information systems by sequential change-point methods
-
DOI 10.1016/j.stamet.2005.05.003, PII S1572312705000493
-
A. Tartakovsky, et al., detection intrusion in information system by sequential change-point methods, Elsevier, statistical methodology, Vol.3, pp: 252-293, 2006 (Pubitemid 44202523)
-
(2006)
Statistical Methodology
, vol.3
, Issue.3
, pp. 252-293
-
-
Tartakovsky, A.G.1
Rozovskii, B.L.2
Blazek, R.B.3
Kim, H.4
-
7
-
-
0034301517
-
1999-DARPA offline intrusion detection evaluation
-
R. Lippmann, et al., 1999-DARPA offline intrusion detection evaluation, Computer networks, Vol.34, pp: 579-595, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
-
8
-
-
79954584616
-
-
http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html/
-
-
-
-
9
-
-
76249094946
-
-
G. Mum, Y. Kim, et al., network intrusion detection using statistical probability distribution, information systems & information technology, Vol. 3984, pp: 340-348, 2006.
-
(2006)
Network Intrusion Detection Using Statistical Probability Distribution, Information Systems & Information Technology
, vol.3984
, pp. 340-348
-
-
Mum, G.1
Kim, Y.2
-
12
-
-
76249098723
-
Anomaly intrusion detection approach using hybrid MLP/CNN neural network, intelligent systems design & applications
-
Y. Yu, Y. Wei, et al., anomaly intrusion detection approach using hybrid MLP/CNN neural network, intelligent systems design & applications. ISDA 6th int. conference, Vol.2, issue.16-18, pp: 1095-1102, 2006.
-
(2006)
ISDA 6th Int. Conference
, vol.2
, Issue.16-18
, pp. 1095-1102
-
-
Yu, Y.1
Wei, Y.2
-
14
-
-
85047322127
-
An application of machine learning to network intrusion detection
-
L.P. Sinclair and S. Matzner, An Application of Machine Learning to Network Intrusion Detection, proceedings of the 15th annual computer security applications conference, ACSAC 99, p.371-378, 1999.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference, ACSAC
, vol.99
, pp. 371-378
-
-
Sinclair, L.P.1
Matzner, S.2
|