-
1
-
-
0343417352
-
Semantic Networks
-
Shapiro, S.C. (ed.) Wiley, New York
-
Sowa, J.: Semantic Networks. In: Shapiro, S.C. (ed.) Encyclopedia of Artificial Intelligence, pp. 1493-1511. Wiley, New York (1992)
-
(1992)
Encyclopedia of Artificial Intelligence
, pp. 1493-1511
-
-
Sowa, J.1
-
3
-
-
84947198779
-
Knowledge discovery in databases DARPA archive
-
Knowledge discovery in databases DARPA archive. Task Description, http://www.kdd.ics.uci.edu/databases/kddcup99/task.html
-
Task Description
-
-
-
5
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh, J.: Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3(4), 262-294 (2001)
-
(2001)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
6
-
-
34748822627
-
Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms
-
Atlanta, USA
-
Kayacik, G., Zincir, A.: Analysis of Three Intrusion Detection System Benchmark Datasets Using Machine Learning Algorithms. In: IEEE Intelligence and Security Informatics, Atlanta, USA (2005)
-
(2005)
IEEE Intelligence and Security Informatics
-
-
Kayacik, G.1
Zincir, A.2
-
7
-
-
71649094670
-
Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts
-
Spaccapietra, S., Delcambre, L. (eds.) Journal on Data Semantics XIV. Springer, Heidelberg
-
Karabatis, G., Chen, Z., Janeja, V.P., Lobo, T., Advani, M., Lindvall, M., Feldmann, R.L.: Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts. In: Spaccapietra, S., Delcambre, L. (eds.) Journal on Data Semantics XIV. LNCS, vol. 5880, pp. 74-104. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5880
, pp. 74-104
-
-
Karabatis, G.1
Chen, Z.2
Janeja, V.P.3
Lobo, T.4
Advani, M.5
Lindvall, M.6
Feldmann, R.L.7
-
8
-
-
0345411509
-
Comparison of Similarity Coefficients Based on Rapid Markers in the Common Bean
-
Duarte, J., Dos, S., Melo, L.: Comparison of Similarity Coefficients Based On Rapid Markers In The Common Bean. Genetics and Molecular Biology 22(3), 427-432 (1999)
-
(1999)
Genetics and Molecular Biology
, vol.22
, Issue.3
, pp. 427-432
-
-
Duarte, J.1
Dos, S.2
Melo, L.3
-
9
-
-
84947196476
-
Assessment of Discretization Techniques for Relevant Pattern Discovery from Gene Expression Data
-
Pensa, R., Leschi, C., Besson, J., Boulicaut, J.: Assessment of Discretization Techniques For Relevant Pattern Discovery From Gene Expression Data. In: 4th Workshop on Data Mining in Bioinformatics (2004)
-
4th Workshop on Data Mining in Bioinformatics (2004)
-
-
Pensa, R.1
Leschi, C.2
Besson, J.3
Boulicaut, J.4
-
10
-
-
84947196788
-
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99
-
Güneş, A., Nur, Z., Malcolm, I.: Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. In: Third Annual Conference on Privacy, Security and Trust, PST, Canada (2005)
-
Third Annual Conference on Privacy, Security and Trust, PST, Canada (2005)
-
-
Güneş, A.1
Nur, Z.2
Malcolm, I.3
-
11
-
-
76949091527
-
Layered Approach Using Conditional Random Fields for Intrusion Detection
-
Kumar, K., Nath, B., Kotagiri, R.: Layered Approach Using Conditional Random Fields for Intrusion Detection. IEEE Transactions on Dependable and Secure Computing 7(1), 35-49 (2010)
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.1
, pp. 35-49
-
-
Kumar, K.1
Nath, B.2
Kotagiri, R.3
-
18
-
-
34548168646
-
A Semantics Based Application Level Intrusion Detection System
-
Vaidehil, V., Srinivasan, N., Anand, P., Balajil, A., Prashanthl, V., Sangeethal, S.: A Semantics Based Application Level Intrusion Detection System. In: International Conference on Signal Processing, Communications and Networking (2007)
-
International Conference on Signal Processing, Communications and Networking (2007)
-
-
Vaidehil, V.1
Srinivasan, N.2
Anand, P.3
Balajil, A.4
Prashanthl, V.5
Sangeethal, S.6
-
20
-
-
56349158810
-
Signature Based Intrusion Detection using Latent Semantic Analysis
-
Lassez, J., Rossi, R., Sheel, S., Mukkamala, S.: Signature Based Intrusion Detection using Latent Semantic Analysis. In: IEEE International Joint Conference on Computational Intelligence, pp. 1068-1074 (2008)
-
(2008)
IEEE International Joint Conference on Computational Intelligence
, pp. 1068-1074
-
-
Lassez, J.1
Rossi, R.2
Sheel, S.3
Mukkamala, S.4
-
21
-
-
84947200504
-
A Context Aware Network-IDS
-
Lexi, P., Benedikt, W., Volker, W.: A Context Aware Network-IDS. In: 13th Nordic Workshop on Secure IT Systems, NordSec Copenhagen, Denmark (2008)
-
13th Nordic Workshop on Secure IT Systems, NordSec Copenhagen, Denmark (2008)
-
-
Lexi, P.1
Benedikt, W.2
Volker, W.3
-
22
-
-
84947200361
-
Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases
-
Frédéric, M., Mathieu, C., Lionel, B., Yvan, L.: Context-Based Intrusion Detection Using Snort, Nessus and Bugtraq Databases. In: Third Annual Conference on Privacy, Security and Trust, Fredericton, New Brunswick, Canada (2005)
-
Third Annual Conference on Privacy, Security and Trust, Fredericton, New Brunswick, Canada (2005)
-
-
Frédéric, M.1
Mathieu, C.2
Lionel, B.3
Yvan, L.4
-
23
-
-
44249103300
-
Using Vulnerability Analysis to Model Attack Scenario for Collaborative Intrusion Detection
-
Liu, X., Xiao, D.: Using Vulnerability Analysis to Model Attack Scenario for Collaborative Intrusion Detection. In: 10th International Conference on Advanced Communication Technology, pp. 1273-1277 (2008)
-
(2008)
10th International Conference on Advanced Communication Technology
, pp. 1273-1277
-
-
Liu, X.1
Xiao, D.2
-
24
-
-
33847137650
-
Modeling Network Intrusion Detection Alerts for Correlation
-
Zhou, J., Heckman, M., Reynolds, B., Carlson, A., Bishop, M.: Modeling Network Intrusion Detection Alerts For Correlation. ACM Transactions and Information System Security 10(1), 1-31 (2007)
-
(2007)
ACM Transactions and Information System Security
, vol.10
, Issue.1
, pp. 1-31
-
-
Zhou, J.1
Heckman, M.2
Reynolds, B.3
Carlson, A.4
Bishop, M.5
-
25
-
-
84878701863
-
Detecting anomalies in network using maximum entropy estimation
-
Gu, Y., McCallum, A., Towsley, D.: Detecting anomalies in network using maximum entropy estimation. In: ACM SIG-COMM Conference on Internet Measurement, pp. 345-351 (2005)
-
(2005)
ACM SIG-COMM Conference on Internet Measurement
, pp. 345-351
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
|