-
1
-
-
0029242750
-
A method for fuzzy rules extraction directly from numerical data and its application to pattern classification
-
Abe, S., & Lan, M.-S. (1995). A method for fuzzy rules extraction directly from numerical data and its application to pattern classification. IEEE Transactions on Fuzzy Systems, 3(1), 18-28
-
(1995)
IEEE Transactions on Fuzzy Systems
, vol.3
, Issue.1
, pp. 18-28
-
-
Abe, S.1
Lan, M.-S.2
-
2
-
-
83455186043
-
Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES
-
Menlo Park, CA
-
Anderson, D., Lunt, T.F., Javitz, H., Tamaru, A., Valdes, A., 1995. Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES).SRI-CSL-95-06, SRI International, Menlo Park, CA
-
(1995)
SRI-CSL-95-06, SRI International
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
5
-
-
0036588773
-
Incorporating soft computing techniques into a probabilistic intrusion detection system
-
DOI 10.1109/TSMCC.2002.801356
-
Cho, Sung-Bae (2002). Incorporating soft computing techniques into a probabilistic intrusion detection system. IEEE Transactions on Systems, Man and Cybernetics, Part C, 32(2), 154-160 (Pubitemid 35289399)
-
(2002)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.32
, Issue.2
, pp. 154-160
-
-
Cho, S.-B.1
-
6
-
-
0346781553
-
Ten years of genetic fuzzy systems current framework and new trends
-
Cordon, O., Gomide, F., Herrera, F., Hofmann, F., & Magdalena, L. (2004). Ten years of genetic fuzzy systems current framework and new trends. Fuzzy Sets and Systems, 141, 5-31
-
(2004)
Fuzzy Sets and Systems
, vol.141
, pp. 5-31
-
-
Cordon, O.1
Gomide, F.2
Herrera, F.3
Hofmann, F.4
Magdalena, L.5
-
9
-
-
0036079474
-
Discovering interesting classification rules with genetic programming
-
De Falco, I., Cioppa, A. D., & Tarantino, E. (2002). Discovering interesting classification rules with genetic programming. Applied Soft Computing, 23, 1-13
-
(2002)
Applied Soft Computing
, vol.23
, pp. 1-13
-
-
De Falco, I.1
Cioppa, A.D.2
Tarantino, E.3
-
10
-
-
0038428854
-
Results of the KDD-99 classifier learning
-
Elkan, C. (2000). Results of the KDD-99 classifier learning. ACM SIGKDD Explorations, 1, 63-64
-
(2000)
ACM SIGKDD Explorations
, vol.1
, pp. 63-64
-
-
Elkan, C.1
-
11
-
-
0142095474
-
Using artificial anomalies to detect unknown and know network intrusions
-
Fan, W., Lee, W., Miller, M., Stolfo, S. J., & Chan, P. K. (2001). Using artificial anomalies to detect unknown and know network intrusions. In Proceedings of the first IEEE international conference on data mining
-
(2001)
Proceedings of the First IEEE International Conference on Data Mining
-
-
Fan, W.1
Lee, W.2
Miller, M.3
Stolfo, S.J.4
Chan, P.K.5
-
14
-
-
0036613003
-
An artificial immune system architecture for computer security applications
-
Harmer, P. K., Williams, P. D., Gunsch, G. H., & Lamont, G. B. (2002). An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation, 6(3
-
(2002)
IEEE Transactions on Evolutionary Computation
, vol.6
, pp. 3
-
-
Harmer, P.K.1
Williams, P.D.2
Gunsch, G.H.3
Lamont, G.B.4
-
15
-
-
33847144165
-
Artificial intelligence techniques applied to intrusion detection
-
DOI 10.1109/INDCON.2005.1590122, 1590122, Proceedings of INDICON 2005: An International Conference of IEEE India Council
-
Idris, N. B., & Shanmugam, B. (2005). Artificial intelligence techniques applied to intrusion detection. Annual IEEE INDICON, 52-55 (Pubitemid 46276047)
-
(2005)
Proceedings of INDICON 2005: An International Conference of IEEE India Council
, vol.2005
, pp. 52-55
-
-
Idris, N.B.1
Shanmugam, B.2
-
16
-
-
0027150412
-
USTAT: A real-time intrusion detection system for UNIX
-
Oakland, CA, 24-26 May, IEEEComputer Society Press, Los Alamitos, CA
-
Ilgun, K., 1993. USTAT: A real-time intrusion detection system for UNIX.In: Proceedings of the 1993 Computer Society Symposium on Research in Security and Privacy, Oakland, CA, 24-26 May, IEEEComputer Society Press, Los Alamitos, CA, pp. 16-29
-
(1993)
Proceedings of the 1993 Computer Society Symposium on Research in Security and Privacy
, pp. 16-29
-
-
Ilgun, K.1
-
17
-
-
0035426682
-
Three-objective genetics-based machine learning for linguistic rule extraction
-
DOI 10.1016/S0020-0255(01)00144-X, PII S002002550100144X
-
Ishibuchi, H., Nakashima, T., & Murata, T. (2001). Three-objective genetics-based machine learning for linguistic rule extraction. Information Sciences, 109-133 (Pubitemid 32621497)
-
(2001)
Information Sciences
, vol.136
, Issue.1-4
, pp. 109-133
-
-
Ishibuchi, H.1
Nakashima, T.2
Murata, T.3
-
18
-
-
84873993999
-
-
KDD-Cup data set: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
-
KDD-Cup Data Set
-
-
-
20
-
-
0035402096
-
Training a neural-network based intrusion detector to recognize novel attacks
-
DOI 10.1109/3468.935046, PII S1083442701054443, Information Assurance
-
Lee, S.C., Heinbuch, D.V., 2001. Training a neural-network based intrusion detector to recognize novel attacks. IEEE Trans. Syst. Man Cybernet. A 31, 294-299 (Pubitemid 33142055)
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans.
, vol.31
, Issue.4
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
23
-
-
83455178723
-
-
Lincoln Laboratory MIT
-
Lincoln Laboratory MIT. http://www.ll.mit.edu
-
-
-
-
24
-
-
0003451777
-
-
Final Report. SRI International, Menlo Park, CA
-
Lunt, T., Tamaru, A., Gilham, F., Jagannathan, R., Jalali, C., Neumann, P.G., Javitz, H.S., Valdes, A., Garvey, T.D., 1992.A real time intrusion detection expert system (IDES).Final Report.SRI International, Menlo Park, CA
-
(1992)
A Real Time Intrusion Detection Expert System (IDES
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Jalali, C.5
Neumann, P.G.6
Javitz, H.S.7
Valdes, A.8
Garvey, T.D.9
-
25
-
-
35548992415
-
A parallel genetic local search algorithm for intrusion detection in computer networks
-
DOI 10.1016/j.engappai.2007.02.007, PII S0952197607000206
-
Mohammad Saniee Abadeh, Jafar Habibi, Zeynab Barzegar, Muna Sergi (2007), A parallel genetic local search algorithm for intrusion detection, Engineering Applications of Artificial Intelligence 20 (8) 1058-1069 (Pubitemid 350016848)
-
(2007)
Engineering Applications of Artificial Intelligence
, vol.20
, Issue.8
, pp. 1058-1069
-
-
Saniee Abadeh, M.1
Habibi, J.2
Barzegar, Z.3
Sergi, M.4
-
26
-
-
0242468747
-
An anomaly intrusion detection method by clustering normal user behavior
-
Oh, S. H., & Lee, W. S. (2003). An anomaly intrusion detection method by clustering normal user behavior. Computers & Security, 22(7), 596-612
-
(2003)
Computers & Security
, vol.22
, Issue.7
, pp. 596-612
-
-
Oh, S.H.1
Lee, W.S.2
-
27
-
-
33750512162
-
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
-
DOI 10.1016/j.jnca.2005.06.002, PII S1084804505000433, Network and Information Security: A Computational Intelligence Approach
-
Ozyer, T., Alhajj, R., & Barker, K. (2007). Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. Journal of Network and Computer Applications, 30, 99-113 (Pubitemid 44666485)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 99-113
-
-
Ozyer, T.1
Alhajj, R.2
Barker, K.3
-
30
-
-
84898944587
-
Intrusion detection with neural networks
-
Cambridge, MA: MIT Press
-
Ryan, J., Lin, M., & Miikkulainen, R. (1998). Intrusion detection with neural networks. Advances in neural information processing systems (Vol. 10). Cambridge, MA: MIT Press
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
-
-
Ryan, J.1
Lin, M.2
Miikkulainen, R.3
-
31
-
-
33750528950
-
Intrusion detection using a fuzzy genetics-based learning algorithm
-
DOI 10.1016/j.jnca.2005.05.002, PII S1084804505000305, Network and Information Security: A Computational Intelligence Approach
-
Saniee Abadeh, M., Habibi, J., & Lucas, C. (2007). Intrusion detection using a fuzzy geneticsbased learning algorithm. Journal of Network and Computer Applications, 30(1), 414-428 (Pubitemid 44666474)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 414-428
-
-
Abadeh, M.S.1
Habibi, J.2
Lucas, C.3
-
32
-
-
33847113954
-
Application of support vector clustering algorithm to network intrusion detection
-
Xu, B., & Zhang, A. (2005). Application of support vector clustering algorithm to network intrusion detection. In International conference on neural networks and brain 2005, ICNN&B '05 (Vol. 2, pp. 1036-1040
-
(2005)
International Conference on Neural Networks and Brain 2005, ICNN&B '05
, vol.2
, pp. 1036-1040
-
-
Xu, B.1
Zhang, A.2
-
33
-
-
33847113954
-
Application of support vector clustering algorithm to network intrusion detection
-
Xu, B., & Zhang, A. (2005). Application of support vector clustering algorithm to network intrusion detection. In International conference on neural networks and brain, 2005, ICNN&B '05 (Vol. 2, pp. 1036-1040
-
(2005)
International Conference on Neural Networks and Brain, 2005, ICNN&B '05
, vol.2
, pp. 1036-1040
-
-
Xu, B.1
Zhang, A.2
-
36
-
-
10244261530
-
EWMA forecast of normal system activity for computer intrusion detection
-
Ye, N., Chen, Qiang, & Borror, Connie M. (2004). EWMA forecast of normal system activity for computer intrusion detection. IEEE Transactions on Reliability, 53(4
-
(2004)
IEEE Transactions on Reliability
, vol.53
, pp. 4
-
-
Ye, N.1
Chen, Q.2
Borror Connie, M.3
-
37
-
-
0037333205
-
Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
-
Ye, N., Vilbert, S., & Chen, Q. (2003). Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability, 52(1).
-
(2003)
IEEE Transactions on Reliability
, vol.52
, pp. 1
-
-
Ye, N.1
Vilbert, S.2
Chen, Q.3
|