-
2
-
-
74049129143
-
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
-
Swarm Intelligence and Patterns special session at WSTST-05 - 4th IEEE International Conference on Soft Computing as Trans disciplinary Science and Technology - Japan, Springer-Verlag, Germany, May
-
V. Ramos, A. Abraham, ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System, In Swarm Intelligence and Patterns special session at WSTST-05 - 4th IEEE International Conference on Soft Computing as Trans disciplinary Science and Technology - Japan, LNCS series, Springer-Verlag, Germany, May 2005, pp. 977-986.
-
(2005)
LNCS Series
, pp. 977-986
-
-
Ramos, V.1
Abraham, A.2
-
4
-
-
0007473204
-
An Introduction to Intrusion Detection
-
April
-
A. Sundaram, An Introduction to Intrusion Detection, Crossroads: The ACM student magazine, Vol. 2, No. 4, April 1996.
-
(1996)
Crossroads: The ACM Student Magazine
, vol.2
, Issue.4
-
-
Sundaram, A.1
-
8
-
-
0037332841
-
Rough set methods in feature selection and recognition
-
March
-
Roman W. Swiniarski, Andrzej Skowron, Rough set methods in feature selection and recognition, Pattern Recognition Letters, v.24 n.6, p.833-849, March 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.6
, pp. 833-849
-
-
Swiniarski, R.W.1
Skowron, A.2
-
10
-
-
84856522277
-
Immune Systems, Danger Theory and Intrusion Detection
-
presented at the
-
J. Twycross, Immune Systems, Danger Theory and Intrusion Detection, presented at the AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004
-
AISB 2004 Symposium on Immune System and Cognition, Leeds, U.K., March 2004
-
-
Twycross, J.1
-
11
-
-
33645961388
-
An artificial immune system for fuzzy-rule induction in data mining
-
Berlin: Springer-Verlag
-
R.T. Alves, M.R.B.S. Delgado, H.S. Lopes, A.A. Freitas, An artificial immune system for fuzzy-rule induction in data mining, Lecture Notes in Computer Science, Berlin: Springer-Verlag,Vol.3242, 2004, pp.1011-1020.
-
(2004)
Lecture Notes in Computer Science
, vol.3242
, pp. 1011-1020
-
-
Alves, R.T.1
Delgado, M.R.B.S.2
Lopes, H.S.3
Freitas, A.A.4
-
14
-
-
0031166708
-
Efficiently supporting ad hoc queries in large datasets of time sequences
-
presented at
-
F. Korn, H. V. Jagadish, and C. Faloutsos, "Efficiently supporting ad hoc queries in large datasets of time sequences.," presented at ACM-SIGMOD International Conference on Management of Data, Tucson, 1997.
-
ACM-SIGMOD International Conference on Management of Data, Tucson, 1997
-
-
Korn, F.1
Jagadish, H.V.2
Faloutsos, C.3
-
16
-
-
13544269338
-
Application of SVM and ANN for intrusion
-
W.H. Chen, S.H. Hsu, and H.P. Shen, Application of SVM and ANN for intrusion, Computers &Operations Research, ELSEVIER, Vol. 32, No.10, 2005, pp. 2617-2634.
-
(2005)
Computers &Operations Research, ELSEVIER
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.H.1
Hsu, S.H.2
Shen, H.P.3
-
17
-
-
1542284996
-
Improving one-class SVM for anomaly detection
-
K.L. Li, H.K. Huang, S.F. Tian, and W. Xu, Improving one-class SVM for anomaly detection, International Conference on Machine Learning and Cybernetics, Vol.5, 2003, pp. 3077-3081.
-
(2003)
International Conference on Machine Learning and Cybernetics
, vol.5
, pp. 3077-3081
-
-
Li, K.L.1
Huang, H.K.2
Tian, S.F.3
Xu, W.4
-
19
-
-
33744522522
-
Intrusion Detection System Based on Multi-class SVM
-
H. Lee, J. Song, D. Park, Intrusion Detection System Based on Multi-class SVM, RSFDGrC, Vol. 2, 2005, pp. 511-519
-
(2005)
RSFDGrC
, vol.2
, pp. 511-519
-
-
Lee, H.1
Song, J.2
Park, D.3
-
22
-
-
85118436573
-
Extracting support data for a given task
-
U.M. Fayyad, and R. Uthurusamy, editors, AAAI Press, MenloPark, CA
-
B. Schoelkopf, C. Burges, and V. Vapnik., Extracting support data for a given task. In U.M. Fayyad, and R. Uthurusamy, editors, Proceedings, First International Conference on Knowledge Discovery & Data Mining, AAAI Press, MenloPark, CA, 1995.
-
(1995)
Proceedings, First International Conference on Knowledge Discovery & Data Mining
-
-
Schoelkopf, B.1
Burges, C.2
Vapnik, V.3
-
23
-
-
0003250435
-
Single-layer Learning Revisited: A Stepwise Procedure for Building and Training a Neural Network
-
J. Fogelman, editor, Springer-Verlag
-
S. Knerrr, L. Personnaz, and G. Dreyfus, Single-layer Learning Revisited: a Stepwise Procedure for Building and Training a Neural Network, In J. Fogelman, editor, Neurocomputing: Algorithms, Architectures and Applications, Springer-Verlag, 1990.
-
(1990)
Neurocomputing: Algorithms, Architectures and Applications
-
-
Knerrr, S.1
Personnaz, L.2
Dreyfus, G.3
-
24
-
-
24944586818
-
Network-Based Intrusion Detection with Support Vector Machines
-
D. S. Kim, J. S. Park, Network-Based Intrusion Detection with Support Vector Machines, ICOIN, 2003, pp. 747-756.
-
(2003)
ICOIN
, pp. 747-756
-
-
Kim, D.S.1
Park, J.S.2
-
25
-
-
84856544792
-
-
KDD data set, 1999; http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html
-
(1999)
-
-
-
26
-
-
84874124494
-
Visualization of anomaly detection using prediction sensitivity
-
P. Laskov, K. Rieck, C. Schäfer, K.R. Müller, Visualization of anomaly detection using prediction sensitivity, Proceedings of Sicherheit, April 2005, pp.197-208
-
Proceedings of Sicherheit, April 2005
, pp. 197-208
-
-
Laskov, P.1
Rieck, K.2
Schäfer, C.3
Müller, K.R.4
-
27
-
-
32344452166
-
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
-
A. Lazarevic, A. Ozgur, L. Ertoz, J. Srivastava, and V. Kumar, (2003), "A Comparative Study Of Anomaly Detection Schemes In Network Intrusion Detection", In SIAM International Conference on Data Mining, 2003
-
(2003)
SIAM International Conference on Data Mining, 2003
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
|