-
1
-
-
77949439705
-
Research of Data Mining in intrusion detection system and the Uncertainty of the Attack
-
18-20 January ISBN:978-1-4244-5272-9, INSPEC Accession Number: 11069703
-
Wei Liu, Research of Data Mining in intrusion detection system and the Uncertainty of the Attack, in: International Symposium on Computer Network and Multimedia Technology, 2009, CNMT 2009, 18-20 January 2009, pp. 1-4, ISBN:978-1-4244-5272-9, INSPEC Accession Number: 11069703.
-
(2009)
International Symposium on Computer Network and Multimedia Technology, 2009, CNMT 2009
, pp. 1-4
-
-
Liu, W.1
-
3
-
-
84856234332
-
-
Data Mining and Knowledge Discovery Handbook Springer
-
Oded Z. Maimon Lior Rokach Data Mining and Knowledge Discovery Handbook 2005 Springer
-
(2005)
Lior Rokach
-
-
Maimon, O.Z.1
-
4
-
-
77950551315
-
Efficient intrusion detection with reduced dimension using data mining classification methods and their performance comparison
-
V.V. Das et al. (Eds.) Springer-Verlag, Berlin, Heidelberg
-
B. Kavitha, S. Karthikeyan, B. Chitra, Efficient intrusion detection with reduced dimension using data mining classification methods and their performance comparison, in: V.V. Das et al. (Eds.): BAIP 2010, CCIS 70, 2010, Springer-Verlag, Berlin, Heidelberg, 2010, pp. 96-101.
-
(2010)
BAIP 2010, CCIS 70, 2010
, pp. 96-101
-
-
Kavitha, B.1
Karthikeyan, S.2
Chitra, B.3
-
5
-
-
77950797703
-
An empirical approach to modeling uncertainty in intrusion analysis
-
Dec
-
Xinming Ou, S.R. Rajagopalan, S. Sakthivelmurugan, An empirical approach to modeling uncertainty in intrusion analysis, in: Computer Security Applications Conference, 2009, ACSAC '09, Dec. 2009.
-
(2009)
Computer Security Applications Conference, 2009, ACSAC '09
-
-
Ou, X.1
Rajagopalan, S.R.2
Sakthivelmurugan, S.3
-
6
-
-
77950797703
-
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
-
Kansas State Univ., Manhattan, KS, USA, December
-
Xinming Ou, S.R. Rajagopalan, S. Sakthivelmurugan, Kansas State Univ., Manhattan, KS, USA, An Empirical Approach to Modeling Uncertainty in Intrusion Analysis, in: Computer Security Applications Conference, 2009, ACSAC '09, pp. 7-11, December 2009.
-
(2009)
Computer Security Applications Conference, 2009, ACSAC '09
, pp. 7-11
-
-
Ou, X.1
Rajagopalan, S.R.2
Sakthivelmurugan, S.3
-
7
-
-
84856230754
-
Cyberjaya
-
Fac. of Inf. Technol., Multimedia Univ. 13-15 May
-
Kok-Chin Khor, Choo-Yee Ting, S.-P. Amnuaisuk, Fac. of Inf. Technol., Multimedia Univ., Cyberjaya, in: Second Asia International Conference on A Probabilistic Approach for Network Intrusion Detection Modeling & Simulation, AICMS 08, 13-15 May 2008.
-
(2008)
Second Asia International Conference on A Probabilistic Approach for Network Intrusion Detection Modeling & Simulation, AICMS 08
-
-
Khor, K.1
Ting, C.2
Amnuaisuk, S.-P.3
-
9
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
Srinivas Mukkamala, Guadalupe Janoski, Andrew Sung, Intrusion detection using neural networks and support vector machines, in: Proceedings of IEEE Intrnational Joint Conference on Neural Networks, 2002, pp. 1702-1701.
-
(2002)
Proceedings of IEEE Intrnational Joint Conference on Neural Networks
, pp. 1702-1701
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
10
-
-
84856230755
-
Enhancing profiles for anomaly detection using time granularities, Center for secure information systems
-
in press
-
Yingjiu Li et al., Enhancing profiles for anomaly detection using time granularities, Center for secure information systems, Journal of Computer Security, in press.
-
Journal of Computer Security
-
-
Li, Y.1
-
12
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Chalmers University of Technology, Sweden, March
-
Stefan Axelsson, Intrusion detection systems: a survey and taxonomy, Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March 2000.
-
(2000)
Technical Report No 99-15, Dept. of Computer Engineering
-
-
Axelsson, S.1
-
13
-
-
84856234333
-
-
KDDCup99datasets,The UCI KDD Archive
-
KDDCup99datasets,The UCI KDD Archive: http:/ kdd.ics.ucs.edu / databases /kddcup99 /kddcup99.html.
-
-
-
-
14
-
-
26944485964
-
A Unifying Field in Logics: Neutrosophic Field
-
F. Smarandache, A unifying field in logics: neutrosophic logic, Multiple-Valued Logic/An International Journal 8 (3) (2002) 385-438, http://www.gallup.unm.edu/∼smarandache/eBook-neutrosophics2.pdf. (Pubitemid 36047938)
-
(2002)
Multiple Valued Logic
, vol.8
, Issue.3
, pp. 385-438
-
-
Smarandache, F.1
-
15
-
-
33751110112
-
Neutrosophy, a New Branch of Philosophy
-
F. Smarandache, Neutrosophy, A new branch of philosophy, in multiple-valued logic, An International Journal 8(3) (2002) 297-384. (Pubitemid 36047937)
-
(2002)
Multiple Valued Logic
, vol.8
, Issue.3
, pp. 297-384
-
-
Smarandache, F.1
-
16
-
-
79952337616
-
-
University of New Mexico, Gallup Campus, Xiquan, Phoenix
-
F. Smarandache (Eds.), Proceedings of the First International Conference on Neutrosophy, Neutrosophic Logic, Neutrosophic Set, Neutrosophic Probability and Statistics, University of New Mexico, Gallup Campus, Xiquan, Phoenix, 2002, p. 147, www.gallup.unm.edu/∼smarandache/NeutrosophicProceedings.pdf.
-
(2002)
Proceedings of the First International Conference on Neutrosophy, Neutrosophic Logic, Neutrosophic Set, Neutrosophic Probability and Statistics
, pp. 147
-
-
Smarandache, F.1
-
17
-
-
84856235659
-
-
World Academy of Science, Engineering and Technology
-
Grigorios N. Beligiannis, Georgios A. Tsirogiannis, Panayotis E. Pintelas, Restartings: a technique to improve classic genetic algorithms' performance, World Academy of Science, Engineering and Technology, 2005.
-
(2005)
Restartings: A Technique to Improve Classic Genetic Algorithms' Performance
-
-
Beligiannis, G.N.1
Tsirogiannis, G.A.2
Pintelas, P.E.3
-
18
-
-
84948667727
-
-
ieeexplore.ieee.org
-
Jonatan Gomez, Dipankar Dasgupta, Olfa Nasraoui, Fabio Gonzalez, Complete Expression Trees for Evolving Fuzzy Classifier Systems with Gentic Algorithms and Application to Network Intrusion Detection, NAFIPS, 2002, 2002 - ieeexplore.ieee.org.
-
(2002)
Complete Expression Trees for Evolving Fuzzy Classifier Systems with Gentic Algorithms and Application to Network Intrusion Detection, NAFIPS, 2002
-
-
Gomez, J.1
Dasgupta, D.2
Nasraoui, O.3
Gonzalez, F.4
-
21
-
-
34548453089
-
An agent based and biological inspired real-time intrusion detection and security model for computer network operations
-
DOI 10.1016/j.comcom.2007.03.008, PII S0140366407001181
-
Azzedine Boukerche, Renato B. Machado, Kathia R.L. Jucá, João Bosco M. Sobral, and Mirela S.M.A. Notare An agent based and biological inspired real-time intrusion detection and security model for computer network operations Computer Communications 30 13 2007 2649 2660 (Pubitemid 47368641)
-
(2007)
Computer Communications
, vol.30
, Issue.13
, pp. 2649-2660
-
-
Boukerche, A.1
Machado, R.B.2
Juca, K.R.L.3
Sobral, J.B.M.4
Notare, M.S.M.A.5
-
22
-
-
59349106158
-
Distributed agents model for intrusion detection based on AIS
-
Jin Yang, XiaoJie Liu, Tao Li, Gang Liang, and SunJun Liu Distributed agents model for intrusion detection based on AIS Knowledge-Based Systems 22 2 2009 115 119
-
(2009)
Knowledge-Based Systems
, vol.22
, Issue.2
, pp. 115-119
-
-
Yang, J.1
Liu, X.2
Li, T.3
Liang, G.4
Liu, S.5
-
23
-
-
78650805266
-
Finding key attribute subset in dataset for outlier detection
-
Peng Yang, and Qingsheng Zhu Finding key attribute subset in dataset for outlier detection Knowledge-Based Systems 24 2 2011 269 274
-
(2011)
Knowledge-Based Systems
, vol.24
, Issue.2
, pp. 269-274
-
-
Yang, P.1
Zhu, Q.2
|