-
1
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and L. J. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security, vol.3, no.4, pp.227-261, 2000.
-
(2000)
ACM Transactions On Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, L.J.2
-
2
-
-
34548260327
-
A three-tier IDS via data mining approach
-
CA
-
T. S. Hwang, T.-J. Lee and Y.-J. Lee, A three-tier IDS via data mining approach, Proc. of ACM Conference MineNet, CA, pp.1-6, 2007.
-
(2007)
Proc. of ACM Conference MineNet
, pp. 1-6
-
-
Hwang, T.S.1
Lee, T.-J.2
Lee, Y.-J.3
-
4
-
-
34047229997
-
An automatically tuning intrusion detection system
-
Z. Yu, J. J. P. Tsai and T. Weigert, An automatically tuning intrusion detection system, IEEE Transactions on Systems, Man, And Cybernetics {Part B: Cybernetics, vol.37, no.2, pp.373-384, 2007.
-
(2007)
IEEE Transactions On Systems, Man, and Cybernetics {Part B: Cybernetics
, vol.37
, Issue.2
, pp. 373-384
-
-
Yu, Z.1
Tsai, J.J.P.2
Weigert, T.3
-
5
-
-
70449353683
-
Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree
-
N. B. Anuar, H. Sallehudin, A. Gani and O. Zakari, Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree, Malaysian Journal of Computer Science, vol.21, no.(2), pp.101-105, 2008.
-
(2008)
Malaysian Journal of Computer Science
, vol.21
, Issue.2
, pp. 101-105
-
-
Anuar, N.B.1
Sallehudin, H.2
Gani, A.3
Zakari, O.4
-
7
-
-
33745498517
-
Applications of fuzzy data mining methods for intrusion detection systems
-
J. Guan, D. Liu and T. Wang, Applications of fuzzy data mining methods for intrusion detection systems, ICCSA, pp.706-714, 2004.
-
(2004)
ICCSA
, pp. 706-714
-
-
Guan, J.1
Liu, D.2
Wang, T.3
-
9
-
-
33750520151
-
D-SCIDS: Distributed soft computing intrusion detection system
-
A. Abraham, R. Jain, J. Thomas and S. Y. Han, D-SCIDS: Distributed soft computing intrusion detection system, Elsevier, Journal of Network and Computer Applications, pp.81-98, 2007.
-
(2007)
Elsevier, Journal of Network and Computer Applications
, pp. 81-98
-
-
Abraham, A.1
Jain, R.2
Thomas, J.3
Han, S.Y.4
-
10
-
-
34247636165
-
Genetic-fuzzy rule mining approach and evaluation of fea-ture selection techniques for anomaly intrusion detection
-
C.-H. Tsang, S. Kwong and H. Wang, Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection, Elsevier, Journal of Pattern Recognition Society, vol.40, pp.2373-2391, 2007.
-
(2007)
Elsevier, Journal of Pattern Recognition Society
, vol.40
, pp. 2373-2391
-
-
Tsang, C.-H.1
Kwong, S.2
Wang, H.3
-
11
-
-
49549109847
-
Graphical inference for multiple intrusion detection
-
T. Le and C. N. Hadjicostis, Graphical inference for multiple intrusion detection, IEEE Transactions on Information Forensics and Security, vol.3, no.3, pp.370-380, 2008.
-
(2008)
IEEE Transactions On Information Forensics and Security
, vol.3
, Issue.3
, pp. 370-380
-
-
Le, T.1
Hadjicostis, C.N.2
-
12
-
-
26944437843
-
An adaptive network intrusion detection method based on PCA and support vector machines
-
X. Xu and X. Wang, An adaptive network intrusion detection method based on PCA and support vector machines, ADMA 05, pp.696-703, 2005.
-
(2005)
ADMA
, vol.5
, pp. 696-703
-
-
Xu, X.1
Wang, X.2
-
14
-
-
34250801472
-
A hybrid machine learning approach to network anomaly detection
-
T. Shon and J. Moon, A hybrid machine learning approach to network anomaly detection, Elsevier, Journal of Information Sciences, vol.177, pp.3799-3821, 2007.
-
(2007)
Elsevier, Journal of Information Sciences
, vol.177
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
-
15
-
-
33745937896
-
A study of adaBoost with SVM based weak learners
-
Montreal, Canada
-
X. Li, L. Wang and E. Sung, A study of adaBoost with SVM based weak learners, Proc. of International Joint Conference on Neural Networks, Montreal, Canada, pp.196-201, 2005.
-
(2005)
Proc. of Interna- Tional Joint Conference On Neural Networks
, pp. 196-201
-
-
Li, X.1
Wang, L.2
Sung, E.3
-
16
-
-
41749107387
-
AdaBoost-based algorithm for network intrusion detection
-
W. Hu, W. Hu and S. Maybank, AdaBoost-based algorithm for network intrusion detection, IEEE Transactions on Systems, Man, and Cybernetics {Part B: Cybernetics, vol.38, no.2, pp.577-583, 2008.
-
(2008)
IEEE Transactions On Systems, Man, and Cybernetics {Part B: Cybernetics
, vol.38
, Issue.2
, pp. 577-583
-
-
Hu, W.1
Hu, W.2
Maybank, S.3
-
17
-
-
33846294027
-
Automatic generation of buffer overow attack signatures: An approach based on program behavior models
-
Tucson, AZ
-
Z. Liang and R. Sekar, Automatic generation of buffer overow attack signatures: An approach based on program behavior models, The 21st Annual Computer Security Applications Conference, Tucson, AZ, 2005.
-
(2005)
The 21st Annual Computer Security Applications Conference
-
-
Liang, Z.1
Sekar, R.2
-
20
-
-
77953888473
-
FA and SVDFRM base network detection classification model
-
L. Xie and H. Yang, FA and SVDFRM base network detection classification model, ICIC Express Letters, vol.3, no.3(A), pp.421-426, 2009.
-
(2009)
ICIC Express Letters
, vol.3
, Issue.3
, pp. 421-426
-
-
Xie, L.1
Yang, H.2
-
21
-
-
63649137061
-
Intrusion detection using a hybrid support vector machine based on entropy and TF-IDF
-
R.-C. Chen and S.-P. Chen, Intrusion detection using a hybrid support vector machine based on entropy and TF-IDF, International Journal of Innovative Computing, Information and Control, vol.4, no.2, pp.413-424, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.2
, pp. 413-424
-
-
Chen, R.-C.1
Chen, S.-P.2
-
22
-
-
63549088306
-
Application of BPNN in classification of time inter-vals for intelligent intrusion detection decision response system
-
H. Zhu, H. Kai, K. Eguchi, Z. Guo and J. Wang, Application of BPNN in classification of time inter-vals for intelligent intrusion detection decision response system, International Journal of Innovative Computing, Information and Control, vol.4, no.10, pp.2483-2492, 2008.
-
(2008)
International Journal of Innovative Computing, Information and Control
, vol.4
, Issue.10
, pp. 2483-2492
-
-
Zhu, H.1
Kai, H.2
Eguchi, K.3
Guo, Z.4
Wang, J.5
|