-
2
-
-
2942640996
-
Data Mining for intrusion detection
-
Dokas P, Ertoz L, Kumar V, Lazarevie A, Srivastava J, and Tan P., "Data Mining for intrusion detection", In: Proc. of NSF workshop on next generation data mining, 2002.
-
Proc. of NSF Workshop on next Generation Data Mining, 2002
-
-
Dokas, P.1
Ertoz, L.2
Kumar, V.3
Lazarevie, A.4
Srivastava, J.5
Tan, P.6
-
3
-
-
24944559226
-
Building an Intrusion detection system based on SVM and genetic algorithm
-
proceedings
-
Chen RC, Chen J, Chen TS, Hsieh C, Chen TY and Wu KK, "Building an Intrusion detection system based on SVM and genetic algorithm", In: Advances in NN-ISNN 2005, pt 3, proceedings, 2005; 3498:409-14.
-
(2005)
Advances in NN-ISNN 2005
, vol.3498
, Issue.PART 3
, pp. 409-414
-
-
Chen, R.C.1
Chen, J.2
Chen, T.S.3
Hsieh, C.4
Chen, T.Y.5
Wu, K.K.6
-
4
-
-
0242489523
-
Feature selection for intrusion detection with neural network and Support vector machines
-
Mukkamala S and Sung AH, "Feature selection for intrusion detection with neural network and Support vector machines", Transportation security infrastructure prot., 2003; 1822:33-9.
-
(2003)
Transportation Security Infrastructure Prot.
, vol.1822
, pp. 33-39
-
-
Mukkamala, S.1
Sung, A.H.2
-
6
-
-
8344251737
-
Comparison of back propagation learning and radial basis function network in Intrusion detection system
-
Zhang CL, Jiang J and Karnel M., "Comparison of back propagation learning and radial basis function network in Intrusion detection system", In: Rough set, fuzzy set, data mining and granular computing, 2003; 2639:466-70.
-
(2003)
Rough Set, Fuzzy Set, Data Mining and Granular Computing
, vol.2639
, pp. 466-470
-
-
Zhang, C.L.1
Jiang, J.2
Karnel, M.3
-
8
-
-
33750514606
-
Modelling intrusion detection system using hybrid intelligent systems
-
Peddabachigari S, Abraham A, Grosan C and Thomas J, "Modelling intrusion detection system using hybrid intelligent"systems, Journal of computer and network applications journal 2007;30(1):114-32.
-
(2007)
Journal of Computer and Network Applications Journal
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
10
-
-
84940104123
-
A data mining framework for building intrusion detection model
-
Lee W, Stolfo S and Mok K, "A data mining framework for building intrusion detection model", In: Proc. of IEEE symposium on security and privacy, 1999, 120-32.
-
Proc. of IEEE Symposium on Security and Privacy, 1999
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
11
-
-
85013603694
-
Mining association rules for constructing a network intrusion detection model
-
Panda M and Patra MR. Mining association rules for constructing a network intrusion detection model, International journal of applied engineering research, 2009,4(3):381-98.
-
(2009)
International Journal of Applied Engineering Research
, vol.4
, Issue.3
, pp. 381-398
-
-
Panda, M.1
Patra, M.R.2
-
12
-
-
77955847605
-
Towards credible evaluation ofanomaly based intrusion detection methods
-
Tavallaee M, Stakhanova N and Ghorbani AA., "Towards credible evaluation ofanomaly based intrusion detection methods", IEEE Transaction on System, Man and Cybernetics, Part-c, Applications and Reviews, 2010; 40(5):516-24.
-
(2010)
IEEE Transaction on System, Man and Cybernetics, Part-c, Applications and Reviews
, vol.40
, Issue.5
, pp. 516-524
-
-
Tavallaee, M.1
Stakhanova, N.2
Ghorbani, A.A.3
-
13
-
-
63749120226
-
Network intrusion detection design using feature selection of soft computing paradigms
-
Chan TS, Yen KK and Luo J., "Network intrusion detection design using feature selection of soft computing paradigms", International journal of computational intelligence, 2008, 4(3):196-208.
-
(2008)
International Journal of Computational Intelligence
, vol.4
, Issue.3
, pp. 196-208
-
-
Chan, T.S.1
Yen, K.K.2
Luo, J.3
-
15
-
-
71649088415
-
A Hybrid clustering approach for network intrusion detection using cobweb and FFT
-
Panda M and Patra MR., "A Hybrid clustering approach for network intrusion detection using cobweb and FFT", Journal of Intelligent systems,2009,18(3):229-45.
-
(2009)
Journal of Intelligent Systems
, vol.18
, Issue.3
, pp. 229-245
-
-
Panda, M.1
Patra, M.R.2
-
16
-
-
84916230424
-
A new approach to intrusion detection using ANN and fuzzy clustering
-
Elsevier
-
Wang G, Hao J, Ma J and Huang L, "A new approach to intrusion detection using ANN and fuzzy clustering", Expert systems with application journal, 2010, Elsevier.
-
(2010)
Expert Systems with Application Journal
-
-
Wang, G.1
Hao, J.2
Ma, J.3
Huang, L.4
-
18
-
-
76649097981
-
Semi Naïve Bayesian method for anomaly based network intrusion detection
-
Proc. of ICONIP 2009, Thailand
-
Panda M and Patra MR., "Semi Naïve Bayesian method for anomaly based network intrusion detection", In: Proc. of ICONIP 2009, Thailand, Lecture Notes in Computer Science,2009; 5863:614-21.
-
(2009)
Lecture Notes in Computer Science
, vol.5863
, pp. 614-621
-
-
Panda, M.1
Patra, M.R.2
-
19
-
-
84859096648
-
A hybrid intelligent approach for automated alert clustering and filtering in intrusion alert analysis
-
Siraj MMd, Maarof MdAand Hashim SZ Md., " A hybrid intelligent approach for automated alert clustering and filtering in intrusion alert analysis", Intl. Journal of computer theory and engineering, 2009; 1(5):539-45.
-
(2009)
Intl. Journal of Computer Theory and Engineering
, vol.1
, Issue.5
, pp. 539-545
-
-
Siraj, M.Md.1
Maarof, Md.A.2
Hashim, S.Z.Md.3
-
23
-
-
33646395091
-
Ensembles of balanced nested dichotomies for multiclass problems
-
Dong L, Frank E and Kramer S., "Ensembles of balanced nested dichotomies for multiclass problems", In: Proc. of PKDD, 2005, p. 84-95.
-
Proc. of PKDD, 2005
, pp. 84-95
-
-
Dong, L.1
Frank, E.2
Kramer, S.3
-
25
-
-
0035478854
-
Machine Learning
-
Breiman L. Random Forests, "Machine Learning", 2001, 45(1):5-32.
-
(2001)
Random Forests
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
|