-
1
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
Washington, D.C
-
Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules Between Sets of Items in Large Databases. In: Proceedings of the International Conference on Management of Data, Washington, D.C, pp. 207-216 (1993)
-
(1993)
Proceedings of the International Conference on Management of Data
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
2
-
-
69749098126
-
A new generic basis of factual and implicative association rules
-
Ben Yahia, S., Gasmi, G., Nguifo, E.M.: A New Generic Basis of Factual and Implicative Association rules. Intelligent Data Analysis 13(4), 633-656 (2009)
-
(2009)
Intelligent Data Analysis
, vol.13
, Issue.13
, pp. 633-656
-
-
Ben Yahia, S.1
Gasmi, G.2
Nguifo, E.M.3
-
3
-
-
33845518125
-
Detecting known and novel network intrusions
-
DOI 10.1007/0-387-33406-8-22, Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden
-
Bouzida, Y., Cuppens, F.: Detecting known and novel network intrusion. In: Proceedings of the 21st IFIP International Conference on Information Security, Karlstad, Sweden, pp. 258-270 (2006) (Pubitemid 44920659)
-
(2006)
IFIP International Federation for Information Processing
, vol.201
, pp. 258-270
-
-
Bouzida, Y.1
Cuppens, F.2
-
4
-
-
80052435165
-
A snort-based mobile agent for A distributed intrusion detection system
-
Seville, Spain to appear
-
Brahmi, I., Yahia, S.B., Poncelet, P.: A Snort-Based Mobile Agent For A Distributed Intrusion Detection System. In: Proceedings of the International Conference on Security and Cryptography, Seville, Spain (to appear, 2011)
-
(2011)
Proceedings of the International Conference on Security and Cryptography
-
-
Brahmi, I.1
Yahia, S.B.2
Poncelet, P.3
-
5
-
-
84888463595
-
AD-clust: Détection des anomalies basée sur le clustering
-
Brest, France
-
Brahmi, I., Yahia, S.B., Poncelet, P.: AD-Clust: Détection des Anomalies Basée sur le Clustering. In: Atelier Clustering Incrémental et Méthodes de Détection de Nouveauté en conjonction avec 11ème Conférence Francophone d'Extraction et de Gestion de Connaissances EGC 2011, Brest, France, pp. 27-41 (2011)
-
(2011)
Atelier Clustering Incrémental et Méthodes de Détection de Nouveauté en Conjonction avec 11ème Conférence Francophone D'Extraction et de Gestion de Connaissances EGC 2011
, pp. 27-41
-
-
Brahmi, I.1
Yahia, S.B.2
Poncelet, P.3
-
6
-
-
84255181181
-
Effective data mining techniques for intrusion detection and prevention system
-
Chandugari, India
-
Chalak, A., Bhosale, R., Harale, N.D.: Effective data mining techniques for intrusion detection and prevention system. In: Proceedings of the International Conference on Advanced Computing, Communication and Networks 2011, Chandugari, India, pp. 1130-1134 (2011)
-
(2011)
Proceedings of the International Conference on Advanced Computing, Communication and Networks 2011
, pp. 1130-1134
-
-
Chalak, A.1
Bhosale, R.2
Harale, N.D.3
-
7
-
-
70349696809
-
Data mining for cyber security
-
Singhal, A. (ed.) Springer, Heidelberg
-
Chandola, V., Eilertson, E., Ertoz, L., Simon, G., Kumar, V.: Data Mining for Cyber Security. In: Singhal, A. (ed.) Data Warehousing and Data Mining Techniques for Computer Security, pp. 83-103. Springer, Heidelberg (2006)
-
(2006)
Data Warehousing and Data Mining Techniques for Computer Security
, pp. 83-103
-
-
Chandola, V.1
Eilertson, E.2
Ertoz, L.3
Simon, G.4
Kumar, V.5
-
8
-
-
67650311550
-
A new data-mining based approach for network intrusion detection
-
Moncton, New Brunswick, Canada
-
Christine, D., Hyun Ik, J., Wenjun, Z.: A New Data-Mining Based Approach for Network Intrusion Detection. In: Proceedings of the 7th Annual Conference on Communication Networks and Services Research, Moncton, New Brunswick, Canada, pp. 372-377 (2009)
-
(2009)
Proceedings of the 7th Annual Conference on Communication Networks and Services Research
, pp. 372-377
-
-
Christine, D.1
Hyun Jr., I.K.2
Wenjun, Z.3
-
9
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Debar, H., Dacier, M., Wespi, A.: Towards a Taxonomy of Intrusion-Detection Systems. Computer Networks 31, 805-822 (1999)
-
(1999)
Computer Networks
, vol.31
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
10
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
-
Depren, O., Topallar, M., Anarim, E., Ciliz, M.K.: An Intelligent Intrusion Detection System (IDS) for Anomaly and Misuse Detection in Computer Networks. Expert System with Applications 29, 713-722 (2005) (Pubitemid 41394445)
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
11
-
-
85170282443
-
A density-based algorithm for discovering clusters in large spatial databases with noise
-
Portland, Oregon
-
Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In: Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, Portland, Oregon, pp. 226-231 (1996)
-
(1996)
Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
12
-
-
0030285403
-
The KDD process for extracting useful knowledge from volumes of data
-
Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: The KDD Process of Extracting Useful Knowledge from Volumes of Data. Communications of the ACM 39(11), 27-34 (1996) (Pubitemid 126428076)
-
(1996)
Communications of the ACM
, vol.39
, Issue.11
, pp. 27-34
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
13
-
-
0020177941
-
A fast Algorithm for the many pattern/many object pattern match problem
-
DOI 10.1016/0004-3702(82)90020-0
-
Forgy, C.: Rete: A Fast Algorithm for the many Pattern/many Object Pattern match Problem. Artificial Intelligence 19(1), 17-37 (1982) (Pubitemid 13465076)
-
(1982)
Artificial Intelligence
, vol.19
, Issue.1
, pp. 17-37
-
-
Forgy Charles, L.1
-
14
-
-
31644438826
-
A framework for distributed intrusion detection using interest driven cooperating agents
-
Davis, CA, USA
-
Gopalakrishna, R., Spafford, E.H.: A Framework for Distributed Intrusion Detection using Interest Driven Cooperating Agents. In: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection, Davis, CA, USA (2001)
-
(2001)
Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
-
-
Gopalakrishna, R.1
Spafford, E.H.2
-
15
-
-
0141540496
-
Y-means: A clustering method for intrusion detection
-
Montréal, Québec, Canada
-
Guan, Y., Ghorbani, A., Belacel, N.: Y-Means: A Clustering Method for Intrusion Detection. In: Proceedings of Canadian Conference on Electrical and Computer Engineering, Montréal, Québec, Canada, pp. 1083-1086 (2003)
-
(2003)
Proceedings of Canadian Conference on Electrical and Computer Engineering
, pp. 1083-1086
-
-
Guan, Y.1
Ghorbani, A.2
Belacel, N.3
-
16
-
-
0037083574
-
Automated discovery of concise predictive rules for intrusion detection
-
DOI 10.1016/S0164-1212(01)00088-7, PII S0164121201000887
-
Helmer, G., Wong, J.S.K., Honavar, V.G., Miller, L.: Automated Discovery of Concise Predictive Rules for Intrusion Detection. Journal of Systems and Software 60(3), 165-175 (2002) (Pubitemid 34154116)
-
(2002)
Journal of Systems and Software
, vol.60
, Issue.3
, pp. 165-175
-
-
Helmer, G.1
Wong, J.S.K.2
Honavar, V.3
Miller, L.4
-
17
-
-
84255204178
-
Adaptive ensemble multi-agent based intrusion detection model
-
Ragab, K., Helmy, T., Hassanien, A.E. (eds.) IGI Global
-
Helmy, T.: Adaptive Ensemble Multi-Agent Based Intrusion Detection Model. In: Ragab, K., Helmy, T., Hassanien, A.E. (eds.) Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations, pp. 36-48. IGI Global (2010)
-
(2010)
Developing Advanced Web Services Through P2P Computing and Autonomous Agents: Trends and Innovations
, pp. 36-48
-
-
Helmy, T.1
-
18
-
-
77954528035
-
Multiagent systems for network intrusion detection: A review
-
Herrero, Á., Gastaldo, P., Zunino, R., Corchado, E. (eds.) Springer, Heidelberg
-
Herrero, Á., Corchado, E.: Multiagent Systems for Network Intrusion Detection: A Review. In: Herrero, Á., Gastaldo, P., Zunino, R., Corchado, E. (eds.) CISIS 09. Advances in Soft Computing, vol. 63, pp. 143-154. Springer, Heidelberg (2009)
-
(2009)
CISIS 09. Advances in Soft Computing
, vol.63
, pp. 143-154
-
-
Herrero, A.1
Corchado, E.2
-
19
-
-
78149354078
-
A multi-agent-based distributed intrusion detection system
-
Chengdu, Sichuan province, China
-
Huang, W., An, Y., Du, W.: A Multi-Agent-based Distributed Intrusion Detection System. In: Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering, Chengdu, Sichuan province, China, pp. 141-143 (2010)
-
(2010)
Proceedings of the 3rd International Conference on Advanced Computer Theory and Engineering
, pp. 141-143
-
-
Huang, W.1
An, Y.2
Du, W.3
-
20
-
-
68749122250
-
Intrusion detection method using neural networks based on the reduction of characteristics
-
Salamanca, Spain
-
Iren, L.-F., Francisco, M.-P., José, M.-G.F., Rogelio, L.-F., Antonio, G.-M.-A.J., Diego, M.-J.: Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics. In: Proceedings of the 10th International Work-Conference on Artificial Neural Networks, Salamanca, Spain, pp. 1296-1303 (2009)
-
(2009)
Proceedings of the 10th International Work-conference on Artificial Neural Networks
, pp. 1296-1303
-
-
Iren, L.-F.1
Francisco, M.-P.2
José, M.-G.F.3
Rogelio, L.-F.4
Antonio, G.-M.-A.J.5
Diego, M.-J.6
-
21
-
-
85006340454
-
An intrusion detection and prevention model based on intelligent multi-agent systems, signatures and reaction rules ontologies
-
PAAMS 2009, Salamanca, Spain
-
Isaza, G.A., Castillo, A.G., Duque, N.D.: An Intrusion Detection and Prevention Model Based on Intelligent Multi-Agent Systems, Signatures and Reaction Rules Ontologies. In: Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-Agent Systems, PAAMS 2009, Salamanca, Spain, pp. 237-245 (2009)
-
(2009)
Proceedings of the 7th International Conference on Practical Applications of Agents and Multi-agent Systems
, pp. 237-245
-
-
Isaza, G.A.1
Castillo, A.G.2
Duque, N.D.3
-
23
-
-
0004204719
-
-
Phd thesis, Columbia University, New York, NY, USA
-
Lee, W.: A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. Phd thesis, Columbia University, New York, NY, USA (1999)
-
(1999)
A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems
-
-
Lee, W.1
-
24
-
-
33845348900
-
Intrusion detection system based on new association rule mining model
-
Beijing, China
-
Li, T.R., Pan, W.M.: Intrusion Detection System Based on New Association Rule Mining Model. In: Proceedings of the International Conference on Granular Computing, Beijing, China, pp. 512-515 (2005)
-
(2005)
Proceedings of the International Conference on Granular Computing
, pp. 512-515
-
-
Li, T.R.1
Pan, W.M.2
-
25
-
-
33646811831
-
Agent-based network intrusion detection system using data mining approaches
-
1488784, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
-
Lui, C.-L., Fu, T.-C., Cheung, T.-Y.: Agent-Based Network Intrusion Detection System Using Data Mining Approaches. In: Proceedings of the 3rd International Conference on Information Technology and Applications, Sydney, Australia, pp. 131-136 (2005) (Pubitemid 43763029)
-
(2005)
Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005
, vol.1
, pp. 131-136
-
-
Lui, C.-L.1
Fu, T.-C.2
Cheung, T.-Y.3
-
28
-
-
79960728974
-
Design and implementation of a data mining-based network intrusion detection scheme
-
Mohammed, R.G., Awadelkarim, A.M.: Design and Implementation of a Data Mining-Based Network Intrusion Detection Scheme. Asian Journal of Information Technology 10(4), 136-141 (2011)
-
(2011)
Asian Journal of Information Technology
, vol.10
, Issue.10
, pp. 136-141
-
-
Mohammed, R.G.1
Awadelkarim, A.M.2
-
29
-
-
60449088978
-
A snort-based agent for a JADE multi-agent intrusion detection system
-
Mosqueira-Rey, E., Alonso-Betanzos, A., Guijarro-Berdinãs, B., Alonso-Ríos, D., Lago-Piñeiro, J.: A Snort-based Agent for a JADE Multi-agent Intrusion Detection System. International Journal of Intelligent Information and Database Systems 3(1), 107-121 (2009)
-
(2009)
International Journal of Intelligent Information and Database Systems
, vol.3
, Issue.1
, pp. 107-121
-
-
Mosqueira-Rey, E.1
Alonso-Betanzos, A.2
Guijarro-Berdinãs, B.3
Alonso-Ríos, D.4
Lago-Piñeiro, J.5
-
30
-
-
69949165030
-
A self-organized multiagent system for intrusion detection
-
Budapest, Hungary
-
Palomo, E.J., Domínguez, E., Luque, R.M., Muñoz, J.: A Self-Organized Multiagent System for Intrusion Detection. In: Proceedings of the 4th International Workshop on Agents and Data Mining Interaction, Budapest, Hungary, pp. 84-94 (2009)
-
(2009)
Proceedings of the 4th International Workshop on Agents and Data Mining Interaction
, pp. 84-94
-
-
Palomo, E.J.1
Domínguez, E.2
Luque, R.M.3
Muñoz, J.4
-
31
-
-
0033096890
-
Efficient mining of association rules using closed itemset lattices
-
Pasquier, N., Bastide, Y., Taouil, R., Lakhal, L.: Efficient Mining of Association Rules Using Closed Itemset Lattices. Journal of Information Systems 24(1), 25-46 (1999)
-
(1999)
Journal of Information Systems
, vol.24
, Issue.24
, pp. 25-46
-
-
Pasquier, N.1
Bastide, Y.2
Taouil, R.3
Lakhal, L.4
-
32
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
-
Patcha, A., Park, J.M.: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks 51, 3448-3470 (2007) (Pubitemid 46921030)
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
33
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
DOI 10.1016/j.jnca.2005.06.003, PII S1084804505000445, Network and Information Security: A Computational Intelligence Approach
-
Peddabachigari, S., Abraham, A., Grosan, C., Thomas, J.: Modeling Intrusion Detection System Using Hybrid Intelligent Systems. Journal of Network Computer Applications 30, 114-132 (2007) (Pubitemid 44666486)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
34
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA
-
Portnoy, L., Eskin, E., Stolfo, W.S.J.: Intrusion Detection with Unlabeled Data using Clustering. In: Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), Philadelphia, PA (2001)
-
(2001)
Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001)
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, W.S.J.3
-
35
-
-
84899979751
-
CAMNEP: Agent-based network intrusion detection system
-
Estoril, Portugal
-
Rehák, M., Pechoucek, M., Celeda, P., Novotny, J., Minarik, P.: CAMNEP: Agent-Based Network Intrusion Detection System. In: Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems, Estoril, Portugal, pp. 133-136 (2008)
-
(2008)
Proceedings of the 7th International Conference on Autonomous Agents and Multiagent Systems
, pp. 133-136
-
-
Rehák, M.1
Pechoucek, M.2
Celeda, P.3
Novotny, J.4
Minarik, P.5
-
37
-
-
57649211241
-
Network intrusion detection system using neural networks
-
Jinan, China
-
Shun, J., Malki, H.A.: Network Intrusion Detection System Using Neural Networks. In: Proceedings of the 4th International Conference on Natural Computation (ICNC 2008), Jinan, China, pp. 242-246 (2008)
-
(2008)
Proceedings of the 4th International Conference on Natural Computation (ICNC 2008)
, pp. 242-246
-
-
Shun, J.1
Malki, H.A.2
-
38
-
-
79960708660
-
A multiagent-based intrusion detection system with the support of multi-class supervised classification
-
Springer, Heidelberg
-
Shyu, M.-L., Sainani, V.: A Multiagent-based Intrusion Detection System with the Support of Multi-Class Supervised Classification. In: Data Mining and MultiAgent Integration, pp. 127-142. Springer, Heidelberg (2009)
-
(2009)
Data Mining and MultiAgent Integration
, pp. 127-142
-
-
Shyu, M.-L.1
Sainani, V.2
-
40
-
-
85172423269
-
JAM: Java agents for meta-learning over distributed databases
-
Newport Beach, California
-
Stolfo, S., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D.W., Chan, P.K.: JAM: Java Agents for Meta-Learning over Distributed Databases. In: Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, Newport Beach, California, pp. 74-81 (1997)
-
(1997)
Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining
, pp. 74-81
-
-
Stolfo, S.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.W.5
Chan, P.K.6
-
43
-
-
38849093376
-
Modeling intrusion detection system by discovering association rule in rough set theory framework
-
Sydney, Australia
-
Xuren, W., Famei, H., Rongsheng, X.: Modeling Intrusion Detection System by Discovering Association Rule in Rough Set Theory Framework. In: Proceedings of the International Conference on Computational Intelligence for Modelling Control and Automation, Sydney, Australia, pp. 24-29 (2006)
-
(2006)
Proceedings of the International Conference on Computational Intelligence for Modelling Control and Automation
, pp. 24-29
-
-
Xuren, W.1
Famei, H.2
Rongsheng, X.3
-
44
-
-
28444460711
-
Distributed intrusion detection based on clustering
-
Yeung, D.S., Liu, Z.-Q., Wang, X.-Z., Yan, H. (eds.) LNCS (LNAI) Springer, Heidelberg
-
Zhang, Y., Xiong, Z., Wang, X.: Distributed Intrusion Detection Based on Clustering. In: Yeung, D.S., Liu, Z.-Q., Wang, X.-Z., Yan, H. (eds.) ICMLC 2005. LNCS (LNAI), vol. 3930, pp. 2379-2383. Springer, Heidelberg (2006)
-
(2006)
ICMLC 2005
, vol.3930
, pp. 2379-2383
-
-
Zhang, Y.1
Xiong, Z.2
Wang, X.3
-
45
-
-
70349159962
-
G-means: A clustering algorithm for intrusion detection
-
Auckland, New Zealand
-
Zhao, Z., Guo, S., Xu, Q., Ban, T.: G-Means: A Clustering Algorithm for Intrusion Detection. In: Processing of the 15th International Conference on Advances in Neuro-Information, Auckland, New Zealand, pp. 563-570 (2008)
-
(2008)
Processing of the 15th International Conference on Advances in Neuro-information
, pp. 563-570
-
-
Zhao, Z.1
Guo, S.2
Xu, Q.3
Ban, T.4
|