-
1
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer Networks
-
August
-
Animesh Patcha, Jung-Min Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends, Computer Networks," The International Journal of Computer and Telecommunications Networking, Vol.51, No.12, August, 2007, pp.3448-3470.
-
(2007)
The International Journal of Computer and Telecommunications Networking
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
2
-
-
0342600000
-
An introduction to intrusion detection and assessment for system and network security management
-
Rebecca Bace, "An introduction to intrusion detection and assessment for system and network security management." ICSA Intrusion Detection Systems Consortium Technical Report, 1999.
-
(1999)
ICSA Intrusion Detection Systems Consortium Technical Report
-
-
Bace, R.1
-
3
-
-
0004048154
-
-
James P. Anderson Co., Fort Washington, Pennsylvania, technical Report, April
-
James P. Anderson, "Computer security threat monitoring and surveillance," James P. Anderson Co., Fort Washington, Pennsylvania, technical Report, April 1980.
-
(1980)
Computer Security Threat Monitoring and Surveillance
-
-
Anderson, J.P.1
-
4
-
-
33746150390
-
Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art
-
Tarek S. Sobh, "Wired and wireless intrusion detection system: Classifications, good characteristics and state-of-the-art," Computer Standards & Interfaces 28, 2006, pp. 670- 694.
-
(2006)
Computer Standards & Interfaces
, vol.28
, pp. 670-694
-
-
Sobh, T.S.1
-
5
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
Fredrik.Valeur, Giovanni Vigna, Christopher Kruegel, Richard A. Kemmerer, "A comprehensive approach to intrusion detection alert correlation," IEEE Transactions on Dependable and Secure Computing, Vol. 1, NO. 3, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
6
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
Shelly X. Wu, Wolfgang Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Applied Soft Computing Journal 10, 2010, pp. 1-35.
-
(2010)
Applied Soft Computing Journal
, vol.10
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
7
-
-
68949196337
-
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
Xuan D. Hoang, Jiankun Hu, Peter Bertok, "A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference," Journal of Net- work and Computer Applications 32, 2009, pp. 1219-1228.
-
(2009)
Journal of Net- Work and Computer Applications
, vol.32
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
8
-
-
79960556588
-
Alert correlation in collaborative intelligent intrusion detection systems - A survey
-
Elshoush H. Tagelsir, Izzeldin M. Osman, "Alert correlation in collaborative intelligent intrusion detection systems - A survey." Applied Soft Computing 11, 2011, pp. 4349-4365.
-
(2011)
Applied Soft Computing
, vol.11
, pp. 4349-4365
-
-
Tagelsir, E.H.1
Osman, I.M.2
-
9
-
-
65249105995
-
Accurate anomaly detection through parallelism
-
Shanbhag, Shashank, Tilman Wolf. "Accurate anomaly detection through parallelism." IEEE Network 23.1, 2009, pp. 22-28.
-
(2009)
IEEE Network
, vol.23
, Issue.1
, pp. 22-28
-
-
Shanbhag, S.1
Wolf, T.2
-
14
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenge
-
Pedro García-Teodoroa, Jesus E. Díaz-Verdejoa, Gabriel .Macia-Fernándeza, Enrique Vázquezb, "Anomaly-based network intrusion detection: Techniques, systems and challenge," Computers Security 28.1-2, 2009, pp. 18-28.
-
(2009)
Computers Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
García-Teodoroa, P.1
Díaz-Verdejoa, J.E.2
Macia- Fernándeza, G.3
Vázquezb, E.4
-
15
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
December
-
Chih-Fong Tsai, YuFeng Hsu, Chia-Ying Lin, W.Y.Lin, "Intrusion detection by machine learning: A review," Expert Systems with Applications, Vol 36, No.10. December 2009, pp.11994-12000.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsai, C.-F.1
Hsu, Y.F.2
Lin, C.-Y.3
Lin, W.Y.4
-
18
-
-
84861520518
-
A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems
-
Indraneel Mukhopadhyay, Mohuya Chakraborty and Satyajit Chakrabarti, "A Comparative Study of Related Technologies of Intrusion Detection & Prevention Systems," Journal of Information Security, Vol. 2 No. 1, pp. 28-38.
-
Journal of Information Security
, vol.2
, Issue.1
, pp. 28-38
-
-
Mukhopadhyay, I.1
Chakraborty, M.2
Chakrabarti, S.3
-
19
-
-
84882775533
-
A Survey of Intrusion Detection Analysis Methods
-
University of California, San Diego, Spring
-
Justin Lee, Stuart Moskovics, Lucas Silacci, "A Survey of Intrusion Detection Analysis Methods," CSE 221, University of California, San Diego, Spring 1999.
-
(1999)
CSE
, vol.221
-
-
Lee, J.1
Moskovics, S.2
Silacci, L.3
-
20
-
-
79955763151
-
Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system
-
Ning Weng, Luke Vespa, Benfano Soewito, "Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system," Computer Networks, Vol. 55, 2011, pp. 1648-1661.
-
(2011)
Computer Networks
, vol.55
, pp. 1648-1661
-
-
Weng, N.1
Vespa, L.2
Soewito, B.3
-
21
-
-
62249168871
-
A hybrid intrusion detection system design for computer network security
-
Ali M. Aydin, Halim A. Zaim, Gokhan K. Ceylan, "A hybrid intrusion detection system design for computer network security," Computers and Electrical Engineering, Vol. 35, 2009, pp. 517-526.
-
(2009)
Computers and Electrical Engineering
, vol.35
, pp. 517-526
-
-
Aydin, A.M.1
Zaim, H.A.2
Ceylan, G.K.3
|