-
2
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun K., Kemmerer R. A., Porras P. A.: State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Softw. Eng. 21, 3, pages 181-199, 1995
-
(1995)
IEEE Trans. Softw. Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
3
-
-
84887968015
-
-
Available at
-
JAMA (2008) Available at: http://math.nist.gov/javanumerics/jama/
-
(2008)
JAMA
-
-
-
5
-
-
25144453997
-
A novel IDS agent distributing protocol for MANETs
-
V.S. Sunderan et al. (Eds.), ICCS 2005
-
Jin X., Zhang Y., Zhou Y., Wei Y.: A novel IDS agent distributing protocol for MANETs, V.S. Sunderan et al. (Eds.), ICCS 2005, LNCS 3515, pages 502-509, 2005
-
(2005)
LNCS
, vol.3515
, pp. 502-509
-
-
Jin, X.1
Zhang, Y.2
Zhou, Y.3
Wei, Y.4
-
6
-
-
84887947525
-
-
JPCAP, Available at
-
JPCAP (2008) Available at: jpcap.sourceforge.net/javadoc/index.html
-
(2008)
-
-
-
7
-
-
33749404535
-
DIDMA: A distributed intrusion detection system using mobile agents
-
Kannadiga P., Zulkernine M.: DIDMA: A distributed intrusion detection system using mobile agents, Proceedings of Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks, pp. 238-245, 2005.
-
(2005)
Proceedings of Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks
, pp. 238-245
-
-
Kannadiga, P.1
Zulkernine, M.2
-
8
-
-
0004088531
-
Advances in distributed and parallel knowledge discovery
-
chapter 5, AAAI/MIT Press
-
Kargupta H., Park B., Hershberger D., Johnson E.: Advances in distributed and parallel knowledge discovery, chapter 5, Collective Data Mining: A New Perspective Toward Distributed Data Mining. AAAI/MIT Press, 2000.
-
(2000)
Collective Data Mining: A New Perspective Toward Distributed Data Mining
-
-
Kargupta, H.1
Park, B.2
Hershberger, D.3
Johnson, E.4
-
11
-
-
84887871806
-
-
lipeRMI, Available at
-
lipeRMI (2006). Available at http://lipermi.sourceforge.net/
-
(2006)
-
-
-
12
-
-
51849165002
-
An overview of recent advances in intrusion detection
-
Marhusin M., Cornforth D., Larkin H.: An overview of recent advances in intrusion detection. CIT, 2008.
-
(2008)
CIT
-
-
Marhusin, M.1
Cornforth, D.2
Larkin, H.3
-
13
-
-
48349105162
-
Distributed hierarchical IDS for MANET over AODV+
-
May 14-17
-
Pahlevanzadeh, B., Samsudin, A.: Distributed hierarchical IDS for MANET over AODV+, IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, pages 220-225, May 14-17, 2007.
-
(2007)
IEEE International Conference on Telecommunications and Malaysia International Conference on Communications
, pp. 220-225
-
-
Pahlevanzadeh, B.1
Samsudin, A.2
-
14
-
-
38349093568
-
Collateral representative subspace projection modeling for supervised classification
-
Quirino T., Xie Z., Shyu M.-L., Chen S.-C., Chang L.: Collateral representative subspace projection modeling for supervised classification. The Proceedings of 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06), pages 98-105, 2006.
-
(2006)
The Proceedings of 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06
, pp. 98-105
-
-
Quirino, T.1
Xie, Z.2
Shyu, M.-L.3
Chen, S.-C.4
Chang, L.5
-
15
-
-
70349488016
-
A hybrid layered multiagent architecture with low cost and low response time communication protocol for network intrusion detection systems
-
Accepted for publication
-
Sainani V., Shyu M.-L.: A hybrid layered multiagent architecture with low cost and low response time communication protocol for network intrusion detection systems. The IEEE 23rd International Conference on Advanced Information Networking and Applications, Accepted for publication, 2009.
-
(2009)
The IEEE 23rd International Conference on Advanced Information Networking and Applications
-
-
Sainani, V.1
Shyu, M.-L.2
-
16
-
-
78049278861
-
Principal component-based anomaly detection scheme
-
Springer-Verlag
-
Shyu M.-L., Chen S.-C., Sarinnapakorn K., Chang L.: Principal component-based anomaly detection scheme. Foundations and Novel Approaches in Data Mining, pages 311-329, Springer-Verlag, Vol. 9, 2006.
-
(2006)
Foundations and Novel Approaches in Data Mining
, vol.9
, pp. 311-329
-
-
Shyu, M.-L.1
Chen, S.-C.2
Sarinnapakorn, K.3
Chang, L.4
-
17
-
-
0034300682
-
Intrusion detection using autonomous agents
-
Spafford E., Zamboni D.: Intrusion detection using autonomous agents. Computer Networks 34, 4, 547-570, 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.1
Zamboni, D.2
-
18
-
-
85172423269
-
JAM: Java agents for meta-learning over distributed databases
-
Newport Beach, California, USA
-
Stolfo S., Prodromidis A., Tselepis S., Lee W., Fan D., Chan P.: JAM: Java agents for meta-learning over distributed databases. Proceedings of KDD-97, pages 74-81, Newport Beach, California, USA, 1997.
-
(1997)
Proceedings of KDD-97
, pp. 74-81
-
-
Stolfo, S.1
Prodromidis, A.2
Tselepis, S.3
Lee, W.4
Fan, D.5
Chan, P.6
-
20
-
-
33845409757
-
A distributed agent-based approach to intrusion detection using the lightweight PCC anomaly detection classifier
-
Xie Z., Quirino T., Shyu M.-L.: A distributed agent-based approach to intrusion detection using the lightweight PCC anomaly detection classifier. Proceedings of the IEEE International Conference on Sensor Networks, Ubiqquitous, and Trustworthy Computing (SUTC'06), pages 446-453, 2006.
-
(2006)
Proceedings of the IEEE International Conference on Sensor Networks, Ubiqquitous, and Trustworthy Computing (SUTC'06
, pp. 446-453
-
-
Xie, Z.1
Quirino, T.2
Shyu, M.-L.3
|