-
1
-
-
34548613852
-
Network Intrusion Detection Using Wavelet Analysis
-
Das, G., Gulati, V.P. (eds.) CIT 2004. Springer, Heidelberg
-
Rawat, S., Sastry, C.S.: Network Intrusion Detection Using Wavelet Analysis. In: Das, G., Gulati, V.P. (eds.) CIT 2004. LNCS, vol. 3356, pp. 224-232. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3356
, pp. 224-232
-
-
Rawat, S.1
Sastry, C.S.2
-
2
-
-
33745498517
-
Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems
-
Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. Springer, Heidelberg
-
Guan, J., Liu, D.-x., Wang, T.: Applications of Fuzzy Data Mining Methods for Intrusion Detection Systems. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3045, pp. 706-714. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3045
, pp. 706-714
-
-
Guan, J.1
Liu, D.-X.2
Wang, T.3
-
3
-
-
26944501944
-
Intelligent Bayesian Classifiers in Network Intrusion Detection
-
Ali, M., Esposito, F. (eds.) IEA/AIE 2005. Springer, Heidelberg
-
Bosin, A., Dessì, N., Pes, B.: Intelligent Bayesian Classifiers in Network Intrusion Detection. In: Ali, M., Esposito, F. (eds.) IEA/AIE 2005. LNCS (LNAI), vol. 3533, pp. 445-447. Springer, Heidelberg (2005)
-
(2005)
LNCS (LNAI)
, vol.3533
, pp. 445-447
-
-
Bosin, A.1
Dessì, N.2
Pes, B.3
-
4
-
-
24944586818
-
Network-based intrusion detection with support vector machines
-
Kahng, H.-K. (ed.) ICOIN 2003. Springer, Heidelberg
-
Kim, D.S., Park, J.S.: Network-based intrusion detection with support vector machines. In: Kahng, H.-K. (ed.) ICOIN 2003. LNCS, vol. 2662, pp. 747-756. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2662
, pp. 747-756
-
-
Kim, D.S.1
Park, J.S.2
-
5
-
-
11244287524
-
An intrusion detection system based on support vector machine
-
Rao, X., Dong, C.-x., Yang, S.-q.: An intrusion detection system based on support vector machine. Journal of Software 4, 798-803 (2003)
-
(2003)
Journal of Software
, vol.4
, pp. 798-803
-
-
Rao, X.1
Dong, C.-X.2
Yang, S.-Q.3
-
6
-
-
70449445893
-
Application of support vector machines on network abnormal intrusion detection
-
Zhang, K., Cao, H.-x., Yan, H.: Application of support vector machines on network abnormal intrusion detection. Application Research of Computers 5, 98-100 (2006)
-
(2006)
Application Research of Computers
, vol.5
, pp. 98-100
-
-
Zhang, K.1
Cao, H.-X.2
Yan, H.3
-
8
-
-
79960299968
-
-
KDD Cup99 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
KDD Cup99 Data
-
-
-
9
-
-
85132011160
-
An application of a recurrent network to an Intrusion Detection System
-
Debar, H., Dorizzi, B.: An application of a recurrent network to an Intrusion Detection System. In: Proceedings of IJCNN, pp. 78-83 (1992)
-
(1992)
Proceedings of IJCNN
, pp. 78-83
-
-
Debar, H.1
Dorizzi, B.2
-
10
-
-
4944244751
-
Intrusion Detection on NN
-
MIT Press, Cambridge
-
Ryan, J., Lin, M.J., Mikkulalan, R.: Intrusion Detection on NN. In: Advances in Neural Information Processing System. MIT Press, Cambridge (1997)
-
(1997)
Advances in Neural Information Processing System
-
-
Ryan, J.1
Lin, M.J.2
Mikkulalan, R.3
-
11
-
-
0028384240
-
SOM neural network as a fuzzy classifier
-
Mitra, S., Pal, S.K.: SOM neural network as a fuzzy classifier. IEEE Transaction of Systems, Man and Cybernetics 24(3), 385-399 (1994)
-
(1994)
IEEE Transaction of Systems, Man and Cybernetics
, vol.24
, Issue.3
, pp. 385-399
-
-
Mitra, S.1
Pal, S.K.2
-
12
-
-
34548111900
-
Intrusion Detection using neural network and SVM
-
Mukkamala, S., Jonaski, A., Sung, A.T.: Intrusion Detection using neural network and SVM. In: Proceedings of the IEEE IJCNN, pp. 202-207 (2002)
-
(2002)
Proceedings of the IEEE IJCNN
, pp. 202-207
-
-
Mukkamala, S.1
Jonaski, A.2
Sung, A.T.3
-
13
-
-
10844230994
-
Intrusion Detection using intelligent paradigm
-
Mukkamala, S., Sung, A.H., Ajith, A.: Intrusion Detection using intelligent paradigm. Journal of Network and Computer Application 28, 167-182 (2005)
-
(2005)
Journal of Network and Computer Application
, vol.28
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Ajith, A.3
-
14
-
-
15944375471
-
Intrusion Detection using hierachical NN
-
Zhong, C., Jiong, J., Kanel, M.: Intrusion Detection using hierachical NN. Pattern Recognition Letters 26, 779-791 (2005)
-
(2005)
Pattern Recognition Letters
, vol.26
, pp. 779-791
-
-
Zhong, C.1
Jiong, J.2
Kanel, M.3
-
16
-
-
24944563451
-
Robust SVM for anomaly detection in Computer Security
-
Hu, W., Liao, Y., Rao, V., Venurri, R.R.: Robust SVM for anomaly detection in Computer Security. In: Proceedings of the 2003 International Conf. on MC and Application, LA California (2003)
-
(2003)
Proceedings of the 2003 International Conf. on MC and Application, la California
-
-
Hu, W.1
Liao, Y.2
Rao, V.3
Venurri, R.R.4
-
17
-
-
21844433474
-
Application of Online training SVM for real time intrusion detection
-
Zhang, Z., Shen, H.: Application of Online training SVM for real time intrusion detection. Computer Communications 28, 14281442 (2005)
-
(2005)
Computer Communications
, vol.28
, pp. 14281442
-
-
Zhang, Z.1
Shen, H.2
-
20
-
-
77954310491
-
Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems
-
August
-
El-Khatib, K.: Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems. IEEE Transactions on Parallel And Distributed Systems 21(8) (August 2010)
-
(2010)
IEEE Transactions on Parallel and Distributed Systems
, vol.21
, Issue.8
-
-
El-Khatib, K.1
-
25
-
-
79960293482
-
Classification of Heart Diseases in Ultrasonic Images Using Neural Networks
-
Classification Of Heart Diseases In Ultrasonic Images Using Neural Networks, E D By Genetic Algorithms Proceedings of Xsp 1998 (1998)
-
(1998)
E D by Genetic Algorithms Proceedings of Xsp 1998
-
-
|