-
1
-
-
79952436484
-
A Survey On QoS In Next Generation Networks
-
Fazal Wahab Karam, Terje Jensen, A Survey on QoS in Next Generation Networks, Advances in Information Sciences and Service Sciences, vol. 2, no. 4, pp. 91-102, 2010.
-
(2010)
Advances in Information Sciences and Service Sciences
, vol.2
, Issue.4
, pp. 91-102
-
-
Karam, F.W.1
Jensen, T.2
-
2
-
-
29244451861
-
ACAS: Automated Construction of Application Signatures
-
Haffner P, Sen S, Spatscheck O, Wang D. ACAS: Automated construction of application signatures. In Proceedings of SIGCOMM'05 Workshops, pp. 197-202, 2005.
-
(2005)
In Proceedings of SIGCOMM'05 Workshops
, pp. 197-202
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
3
-
-
78651522831
-
Improving SVM by modifying kernel functions for speaker identification task
-
Siwar Boujelbene, Dorra Mezghani, Noureddine Ellouze. Improving SVM by modifying kernel functions for speaker identification task. International Journal of Digital Content Technology and its Applications, vol. 4, no. 6, pp. 100-105, 2010.
-
(2010)
International Journal of Digital Content Technology and Its Applications
, vol.4
, Issue.6
, pp. 100-105
-
-
Boujelbene, S.1
Mezghani, D.2
Ellouze, N.3
-
4
-
-
78651563693
-
An intelligent distributed intrusion detection system using genetic algorithm
-
Janakiraman S, Vasudevan V. An intelligent distributed intrusion detection system using genetic algorithm, Journal of Convergence Information Technology, vol. 4, no. 1, pp. 70-76, 2009.
-
(2009)
Journal of Convergence Information Technology
, vol.4
, Issue.1
, pp. 70-76
-
-
Janakiraman, S.1
Vasudevan, V.2
-
5
-
-
78651547976
-
Anomaly detection analysis of intrusion data ising supervised & unsupervised approach
-
Prasanta G, Borah B, Bhattacharyya D. Anomaly detection analysis of intrusion data ising supervised & unsupervised approach, Journal of Convergence Information Technology, vol. 5, no. 1, pp. 95-110, 2010.
-
(2010)
Journal of Convergence Information Technology
, vol.5
, Issue.1
, pp. 95-110
-
-
Prasanta, G.1
Borah, B.2
Bhattacharyya, D.3
-
6
-
-
78651545441
-
ACO based distributed intrusion detection system
-
Janakiraman S, Vasudevan V. ACO based distributed intrusion detection system, International Journal of Digital Content Technology and its Applications, vol. 3, no. 1, pp. 66-72, 2009.
-
(2009)
International Journal of Digital Content Technology and Its Applications
, vol.3
, Issue.1
-
-
Janakiraman, S.1
Vasudevan, V.2
-
8
-
-
21844433474
-
Application of online-training SVMs for real-time intrusion detection with different considerations
-
Zhang Z, Shen H. Application of online-training SVMs for real-time intrusion detection with different considerations, Computer Communications, vol. 28, no.12, pp. 1428-1442, 2005.
-
(2005)
Computer Communications
, vol.28
, Issue.12
, pp. 1428-1442
-
-
Zhang, Z.1
Shen, H.2
-
9
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
Peddabachigari S, Abraham A, Grosan C. Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications, vol. 30, no. 1, pp. 114-132, 2007.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
-
10
-
-
78149465598
-
Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems
-
Su Ming-Yang. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, vol. 34, no. 1, pp. 107-117, 2011.
-
(2011)
Computer Communications
, vol.34
, Issue.1
, pp. 107-117
-
-
Ming-Yang, S.1
-
11
-
-
77956395448
-
Efficient hardware support for pattern matching in network intrusion detection
-
Guinde Nitesh, Ziavras Sotirios. Efficient hardware support for pattern matching in network intrusion detection. Computers and Security, vol. 29, no. 7, pp. 756-769, 2010.
-
(2010)
Computers and Security
, vol.29
, Issue.7
, pp. 756-769
-
-
Nitesh, G.1
Sotirios, Z.2
-
12
-
-
78650662129
-
Enhancing intrusion detection system with proximity information
-
Zhuang Zhenyun, Li Ying, Chen, Zesheng. Enhancing intrusion detection system with proximity information. International Journal of Security and Networks, vol. 5, no. 4, pp. 207-219, 2010.
-
(2010)
International Journal of Security and Networks
, vol.5
, Issue.4
, pp. 7-219
-
-
Zhenyun, Z.1
Li, Y.2
Chen, Z.3
-
13
-
-
77950298520
-
Anomaly intrusion detection by clustering transactional audit streams in a host computer
-
Park Nam, Sang Hyun, Lee Won. Anomaly intrusion detection by clustering transactional audit streams in a host computer. Information Sciences, vol. 180, no. 12, pp. 2375-2389, 2010.
-
(2010)
Information Sciences
, vol.180
, Issue.12
, pp. 2375-2389
-
-
Nam, P.1
Hyun, S.2
Won, L.3
-
14
-
-
79951793502
-
Hybrid pattern matching for trusted intrusion detection
-
Soewito Benfano, Vespa Lucas, Weng Ning. Hybrid pattern matching for trusted intrusion detection. Security and Communication Networks, vol. 4, no. 1, pp. 33-43, 2011.
-
(2011)
Security and Communication Networks
, vol.4
, Issue.1
, pp. 33-43
-
-
Benfano, S.1
Lucas, V.2
Ning, W.3
-
15
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
Zhou Chenfeng, Leckie Christopher, Karunasekera Shanika. A survey of coordinated attacks and collaborative intrusion detection. Computers and Security, vol. 29, no. 1, pp. 124-140, 2010.
-
(2010)
Computers and Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Chenfeng, Z.1
Christopher, L.2
Shanika, K.3
-
17
-
-
0035338003
-
A New Intrusion Detection Method Based On Discriminant Analysis
-
Asaka M, Onabura T, Inoue S. A new intrusion detection method based on discriminant analysis. IEICE Transactions on Information and Systems, vol. 84, no. 5, pp. 570-577, 2001.
-
(2001)
IEICE Transactions on Information and Systems
, vol.84
, Issue.5
, pp. 570-577
-
-
Asaka, M.1
Onabura, T.2
Inoue, S.3
-
18
-
-
0242468747
-
An anomaly intrusion detection method by clustering normal user behavior
-
Sang H, Won S. An anomaly intrusion detection method by clustering normal user behavior. Computers and Security. vol.22, no.7, pp. 596-612, 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.7
, pp. 596-612
-
-
Sang, H.1
Won, S.2
-
19
-
-
33745243253
-
Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies
-
Jing J, Papavassiliou S. Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies. Computer Communications, vol.29, no. 10, pp. 1627-1638, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.10
, pp. 1627-1638
-
-
Jing, J.1
Papavassiliou, S.2
-
20
-
-
0347512512
-
Lagrangian support vector machines
-
Mangasarian O L, Musicant D R. Lagrangian support vector machines. Journal of Machine Learning Research, vol. 1, no. 3, pp. 161-177, 2001.
-
(2001)
Journal of Machine Learning Research
, vol.1
, Issue.3
, pp. 161-177
-
-
Mangasarian, O.L.1
Musicant, D.R.2
-
21
-
-
33750079864
-
A hierarchy of support vector machines for pattern detection
-
Sahbi Hichem, Geman Donald. A hierarchy of support vector machines for pattern detection. Journal of Machine Learning Research, vol. 7, no. 10, pp. 2087-2123, 2006.
-
(2006)
Journal of Machine Learning Research
, vol.7
, Issue.10
, pp. 2087-2123
-
-
Hichem, S.1
Donald, G.2
|