-
1
-
-
80052304527
-
-
CTIT Ph.D.-thesis Series No. 10-180, Centre for Telematics and Information Technology, University of Twente
-
A. Sperotto, Flow-Based Intrusion Detection, CTIT Ph.D.-thesis Series No. 10-180, Centre for Telematics and Information Technology, University of Twente, 2010.
-
(2010)
Flow-Based Intrusion Detection
-
-
Sperotto, A.1
-
3
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
December
-
C. F. Tsai, Y. F. Hsu, C. Y. Lin and W. Y. Lin, Intrusion detection by machine learning: A review, Expert Systems with Applications, Vol 36, Issue 10, pp. 11994-12000, December 2009.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsai, C.F.1
Hsu, Y.F.2
Lin, C.Y.3
Lin, W.Y.4
-
4
-
-
67349099506
-
Conversion methods for symbolic features: A comparison applied to an intrusion detection problem
-
E. Hernandez-Pereira, J. A. Suarez-Romero, O. Fontenla-Romero, A. Alonso-Betanzos, Conversion methods for symbolic features: A comparison applied to an intrusion detection problem, Expert Systems with Applications, 36 (2009) 10612-10617.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 10612-10617
-
-
Hernandez-Pereira, E.1
Suarez-Romero, J.A.2
Fontenla-Romero, O.3
Alonso-Betanzos, A.4
-
5
-
-
80052313122
-
An information theoretic approach for feature selection
-
Wiley Blackwel publisher- Accepted
-
G. Kumar, K. Kumar, An information theoretic approach for feature selection, Security and communication networks, Wiley Blackwel publisher- Accepted.
-
Security and Communication Networks
-
-
Kumar, G.1
Kumar, K.2
-
6
-
-
80052334682
-
An Empirical Comparative Analysis of Feature Reduction Methods for Intrusion Detection
-
ISSN: 0976-5972
-
G. Kumar, K. Kumar, M. Sachdeva, An Empirical Comparative Analysis of Feature Reduction Methods For Intrusion Detection, International Journal of Information and Telecommunication, 1 (2010) 44-51, ISSN: 0976-5972.
-
(2010)
International Journal of Information and Telecommunication
, vol.1
, pp. 44-51
-
-
Kumar, G.1
Kumar, K.2
Sachdeva, M.3
-
7
-
-
78650169163
-
The Use of Artificial Intelligence based Techniques for Intrusion Detection - A Review
-
Springer, Netherlands, DOI: 10.1007/s10462-010-9179-5 ISSN: 0269-2821
-
G. Kumar, K. Kumar and M. Sachdeva, The Use of Artificial Intelligence based Techniques For Intrusion Detection - A Review, Artificial Intelligence Review, vol. 34, No. 4, pp. 369-387, Springer, Netherlands, DOI: 10.1007/s10462-010-9179-5 ISSN: 0269-2821.
-
Artificial Intelligence Review
, vol.34
, Issue.4
, pp. 369-387
-
-
Kumar, G.1
Kumar, K.2
Sachdeva, M.3
-
8
-
-
0003957032
-
-
Second Edition, Morgan Kaufmann, An imprint of Elsevier, ISBN 0-12-088407-0
-
I. H. Witten, E. Frank, Data Mining-Practical machine learning tools and techniques, Second Edition, Morgan Kaufmann, An imprint of Elsevier, ISBN 0-12-088407-0, 2005.
-
(2005)
Data Mining-Practical Machine Learning Tools and Techniques
-
-
Witten, I.H.1
Frank, E.2
-
9
-
-
80052329685
-
-
Available: Sept.
-
Internet 2. Internet 2 research network. Available: http://www.internet2. edu/, Sept. 2010.
-
(2010)
Internet 2
-
-
-
10
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh, Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, ACM Transactions on Information and System Security, 3- 4, 262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3-4
, pp. 262-294
-
-
McHugh, J.1
-
11
-
-
0141723181
-
-
KDD99, Available
-
KDD99, KDD cup 1999 data. (1999). Available: http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html.
-
(1999)
KDD Cup 1999 Data
-
-
-
13
-
-
1642355954
-
Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context
-
M. Sabhnani, G. Serpen, Application of machine learning algorithms to KDD intrusion detection dataset within misuse detection context, In International conference on machine learning: Models, technologies and applications, New York, 623-630, 2003.
-
(2003)
International Conference on Machine Learning: Models, Technologies and Applications, New York
, pp. 623-630
-
-
Sabhnani, M.1
Serpen, G.2
-
14
-
-
77950575061
-
A Detailed Analysis of the KDD CUP 99 Data Set
-
M. Tavallaee, E. Bagheri, W. Lu, A. A. Ghorbani, A Detailed Analysis of the KDD CUP 99 Data Set, In proceedings of IEEE symposium on computational intelligence in security and defense applications (CISDA), 2009.
-
(2009)
Proceedings of IEEE Symposium on Computational Intelligence in Security and Defense Applications (CISDA)
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
15
-
-
33644961664
-
DARPA intrusion detection evaluation design and procedure
-
MIT Lincolon Laboratory, Feb
-
MIT Lincolon Laboratory, 1999 DARPA intrusion detection evaluation design and procedure, DARPA Technical report, Feb 2001.
-
(1999)
DARPA Technical Report
-
-
-
16
-
-
80052340058
-
Intrusion Detection System with Artificial Intelligence
-
edition-1/28 Universidad Pontificia Comillas de Madrid
-
Ponce Mario Castro, Intrusion Detection System with Artificial Intelligence, FIST Conference - June 2004 edition-1/28 Universidad Pontificia Comillas de Madrid, 2004.
-
(2004)
FIST Conference - June 2004
-
-
Castro, P.M.1
-
18
-
-
34250801472
-
A hybrid machine learning approach to network anomaly detection
-
DOI 10.1016/j.ins.2007.03.025, PII S0020025507001648
-
T. Shon, J. Moon, A hybrid machine learning approach to network anomaly detection, Information Sciences, 177 (2007) 3799-3821. (Pubitemid 46978336)
-
(2007)
Information Sciences
, vol.177
, Issue.18
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
|