-
1
-
-
34047126237
-
Anomaly-based intrusion detection for SCADA systems
-
Albuquerque, NM, Nov 12-16
-
D. Yang, A. Usynin, J. W. Hines, "Anomaly-Based Intrusion Detection for SCADA Systems," in Proc. of 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05), Albuquerque, NM, Nov 12-16, 2006.
-
(2006)
Proc. of 5th Intl. Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies (NPIC&HMIT 05)
-
-
Yang, D.1
Usynin, A.2
Hines, J.W.3
-
2
-
-
70449380901
-
Design of networks for distributed digital control systems in nuclear power plants
-
Washington, DC, November
-
H. S. Kim, J. M. Lee, T. Park, W. H. Kwon, "Design of networks for distributed digital control systems in nuclear power plants," Intl. Topical Meeting on Nuclear Plant Instrumentation, Controls, and Human- Machine Interface Technologies (NPIC&HMIT 2000), Washington, DC, November 2000.
-
(2000)
Intl. Topical Meeting on Nuclear Plant Instrumentation, Controls, and Human- Machine Interface Technologies (NPIC&HMIT 2000)
-
-
Kim, H.S.1
Lee, J.M.2
Park, T.3
Kwon, W.H.4
-
3
-
-
79961179005
-
Critical infrastructure: Control systems and the terrorist threat
-
February
-
Dana A. Shea, "Critical Infrastructure: Control Systems and the Terrorist Threat," Report for Congress RL31534, February, 2003.
-
(2003)
Report for Congress RL31534
-
-
Shea, D.A.1
-
4
-
-
70349989256
-
Resilient control systems: Next generation design research
-
Catania, Italy, May
-
nd IEEE Conf. on Human System Interactions, Catania, Italy, pp. 632-636, May 2009.
-
(2009)
nd IEEE Conf. on Human System Interactions
, pp. 632-636
-
-
Rieger, C.G.1
Gertman, D.I.2
McQueen, M.A.3
-
6
-
-
0023294428
-
An intrusion detection model
-
February
-
D. E. Denning, "An Intrusion Detection Model," in IEEE Trans. on Software Engineering,vol. SE-13, pp. 222-232, February 1987.
-
(1987)
IEEE Trans. on Software Engineering
, vol.SE-13
, pp. 222-232
-
-
Denning, D.E.1
-
7
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Oakland, California
-
R. Sommer, V. Paxson, "Outside the Closed World: On Using Machine Learning For Network Intrusion Detection," in Proc. of IEEE Symp. on Security and Privacy, Oakland, California, pp. 305-316, 2010.
-
(2010)
Proc. of IEEE Symp. on Security and Privacy
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
8
-
-
67049149448
-
-
Technical Report, University of Minnesota
-
V. Chandola, A. Banerjee, V. Kumar, "Anomaly Detection: A Survey," Technical Report, University of Minnesota, 2007.
-
(2007)
Anomaly Detection: A Survey
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
10
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
Z. Zhang, J. Li, C. Manikopulos, J. Jorgenson, J. Ucles, "HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification," in Proc. IEEE Workshop on Information Assurance and Security, 2001.
-
(2001)
Proc. IEEE Workshop on Information Assurance and Security
-
-
Zhang, Z.1
Li, J.2
Manikopulos, C.3
Jorgenson, J.4
Ucles, J.5
-
11
-
-
84898944587
-
Intrusion detection with neural networks
-
Cambridge, MA, MIT Press
-
J. Ryan, M. Llin, R. Miikkulainen, "Intrusion Detection with Neural Networks, " in Advances in Neural Information Processing Systems 10, Cambridge, MA, MIT Press, 1998.
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
-
-
Ryan, J.1
Llin, M.2
Miikkulainen, R.3
-
13
-
-
70449371464
-
Neural network based intrusion detection system for critical infrastructures
-
Atlanta, Georgia, June 14-19
-
O. Linda, T. Vollmer, M. Manic,"Neural Network Based Intrusion Detection System for Critical Infrastructures," in Proc. Int. Joint INNSIEEE Conf. on Neural Networks, Atlanta, Georgia, June 14-19, 2009.
-
(2009)
Proc. Int. Joint INNSIEEE Conf. on Neural Networks
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
15
-
-
77953759247
-
Decision tree classifier for network intrusion detection with GA-based feature selection
-
Kennesaw, GA, March
-
G. Stein, B. Chen, A. S. Wu, K. A. Hua, "Decision Tree Classifier For Network Intrusion Detection With GA-based Feature Selection," in Proc. of the 43rd ACM Southeast Conference, Kennesaw, GA, March 2005.
-
(2005)
Proc. of the 43rd ACM Southeast Conference
-
-
Stein, G.1
Chen, B.2
Wu, A.S.3
Hua, K.A.4
-
16
-
-
33646831390
-
An evolutionary approach to generate fuzzy anomaly signatures
-
June
-
F. Gonzalez, D. Dasgupta, J. Gomez, M. Kaniganti, "An Evolutionary Approach to Generate Fuzzy Anomaly Signatures," in Proc. the IEEE Information Assurance Workshop, June 2003.
-
(2003)
Proc. The IEEE Information Assurance Workshop
-
-
Gonzalez, F.1
Dasgupta, D.2
Gomez, J.3
Kaniganti, M.4
-
17
-
-
79961181082
-
Detecting cyber attacks with fuzzy data mining techniques
-
San Francisco, CA, May
-
J. Gomez, D. Dasgupta, F. Gonzalez, "Detecting Cyber Attacks with Fuzzy Data Mining Techniques," in Proc. of the Workshop on Data Mining for Counter Terrorism and Security, 3rd SIAM Conference on Data Mining, San Francisco, CA, May, 2003.
-
(2003)
Proc. of the Workshop on Data Mining for Counter Terrorism and Security, 3rd SIAM Conference on Data Mining
-
-
Gomez, J.1
Dasgupta, D.2
Gonzalez, F.3
-
18
-
-
34249896701
-
Clustering-based network intrusion detection
-
DOI 10.1142/S0218539307002568, PII S0218539307002568
-
S. Zhong, T. Khoshgoftaar, N. Seliya, "Clustering-based network intrusion detection," in Intl. Journal of Reliability, Quality and Safety, Vol. 14, No. 2, 2007, pp. 169-187. (Pubitemid 46871788)
-
(2007)
International Journal of Reliability, Quality and Safety Engineering
, vol.14
, Issue.2
, pp. 169-187
-
-
Zhong, S.1
Khoshgoftaar, T.M.2
Seliya, N.3
-
19
-
-
51849162226
-
A clustering agorithm for intrusion detection
-
Orlando, Florida, USA
-
Q. Wang, V. Mehalooikonomou, "A Clustering Agorithm for Intrusion Detection," in SPIE Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, Orlando, Florida, USA, 2005.
-
(2005)
SPIE Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
-
-
Wang, Q.1
Mehalooikonomou, V.2
-
20
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA, November 5-8
-
L. Portnoy, E. Eskin, S. Solfo, "Intrusion detection with unlabeled data using clustering," in Proc. Of ACM CSS Workshop on Data Mining Applied Security, Philadelphia, PA, November 5-8, 2001.
-
(2001)
Proc. of ACM CSS Workshop on Data Mining Applied Security
-
-
Portnoy, L.1
Eskin, E.2
Solfo, S.3
-
21
-
-
67650434654
-
An architecture for exploiting multi-core processor to parallelize network intrusion prevention
-
R. Sommer, V. Paxson, N. Weaver, "An architecture for exploiting multi-core processor to parallelize network intrusion prevention," Concurrency Computation: Practice and Experience, 21: 1255-1279, 2009.
-
(2009)
Concurrency Computation: Practice and Experience
, vol.21
, pp. 1255-1279
-
-
Sommer, R.1
Paxson, V.2
Weaver, N.3
-
22
-
-
79961202806
-
-
from October
-
Tofino webpage [URL], Available: http://www.tofinosecurity.com, from October 2010.
-
(2010)
Tofino Webpage
-
-
-
28
-
-
79961202310
-
-
from October
-
Nmap webpage [URL], Available: http://nmap.org, from October 2010.
-
(2010)
Nmap Webpage
-
-
-
29
-
-
79961195561
-
-
from October
-
Nessus webpage [URL], Available: http://www.nessus.org.org/nessus/, from October 2010.
-
(2010)
Nessus Webpage
-
-
|