-
1
-
-
34250801472
-
A hybrid machine learning approach to network anomaly detection
-
Shon, T., Moon, J.: A hybrid machine learning approach to network anomaly detection. Information Sciences 177, 3799-3821 (2007)
-
(2007)
Information Sciences
, vol.177
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
-
2
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
Fort Washington April
-
Anderson, J.P.: Computer security threat monitoring and surveillance. Technical Report, James P. Anderson Co., Fort Washington (April 1980)
-
(1980)
Technical Report, James P. Anderson Co.
-
-
Anderson, J.P.1
-
4
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
Tsai, C., Hsu, Y., Lin, C., Lin, W.: Intrusion detection by machine learning: A review. Expert Systems with Applications 36, 11994-12000 (2009)
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 11994-12000
-
-
Tsai, C.1
Hsu, Y.2
Lin, C.3
Lin, W.4
-
5
-
-
0035665469
-
A comparison of intrusion detection systems
-
Biermann, E., Cloete, E., Venter, L.M.: A comparison of intrusion detection Systems. Computer and Security 20, 676-683 (2001)
-
(2001)
Computer and Security
, vol.20
, pp. 676-683
-
-
Biermann, E.1
Cloete, E.2
Venter, L.M.3
-
6
-
-
0037105910
-
Intrusion detection techniques And approaches
-
Verwoerd, T., Hunt, R.: Intrusion detection techniques and approaches. Computer Communications 25, 1356-1365 (2002)
-
(2002)
Computer Communications
, vol.25
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
7
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun, K., Kemmerer, R.A., Porras, P.A.: State transition analysis: A rule-based intrusion detection approach. IEEE Trans. Software Eng. 21, 181-199 (1995)
-
(1995)
IEEE Trans. Software Eng.
, vol.21
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
9
-
-
0036085392
-
Intrusion detection: Support vector machines and neural networks
-
St. Louis, MO
-
Mukkamala, S., Janoski, G., Sung, A.: Intrusion detection: support vector machines and neural networks. In: Proceedings of the IEEE International Joint Conference on Neural Networks (ANNIE), St. Louis, MO, pp. 1702-1707 (2002)
-
(2002)
Proceedings of the IEEE International Joint Conference on Neural Networks (ANNIE)
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
10
-
-
0034300797
-
Anomaly-based intrusion detection: Privacy concerns and other problems
-
Lundin, E., Jonsson, E.: Anomaly-based intrusion detection: privacy concerns and other problems. Computer Networks 34, 623-640 (2002)
-
(2002)
Computer Networks
, vol.34
, pp. 623-640
-
-
Lundin, E.1
Jonsson, E.2
-
11
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
Wu, S., Banzhaf, W.: The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing 10, 1-35 (2010)
-
(2010)
Applied Soft Computing
, vol.10
, pp. 1-35
-
-
Wu, S.1
Banzhaf, W.2
-
13
-
-
33745805403
-
A fast learning algorithm for deep belief nets
-
Hinton, G.E.: A fast learning algorithm for deep belief nets. Neural Computation 18, 1527-1554 (2006)
-
(2006)
Neural Computation
, vol.18
, pp. 1527-1554
-
-
Hinton, G.E.1
-
17
-
-
59449087310
-
Exploring strategies for training deep neural networks
-
Larochelle, H., Bengio, Y., Louradour, J., Lamblin, P.: Exploring Strategies for Training Deep Neural Networks. Journal of Machine Learning Research 10, 1-40 (2009)
-
(2009)
Journal of Machine Learning Research
, vol.10
, pp. 1-40
-
-
Larochelle, H.1
Bengio, Y.2
Louradour, J.3
Lamblin, P.4
-
18
-
-
37849000197
-
Feature selection using principal feature analysis
-
Augsburg, Germany, September 25-29
-
Cohen, I., Tian, Q., Zhou, X.S., Huang, T.S.: Feature Selection Using Principal Feature Analysis. In: Proceedings of the 15th International Conference on Multimedia, Augsburg, Germany, September 25-29 (2007)
-
(2007)
Proceedings of the 15th International Conference on Multimedia
-
-
Cohen, I.1
Tian, Q.2
Zhou, X.S.3
Huang, T.S.4
-
19
-
-
84867752578
-
-
CA, USA July
-
KDD 1999 dataset Irvine, CA, USA (July 2010), http://kdd.ics.uci.edu/ databases
-
(2010)
KDD 1999 Dataset Irvine
-
-
-
20
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
CISDA
-
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A Detailed Analysis of the KDD CUP 99 Data Set. In: Proceeding of the IEEE Symposium on Computational Intelligence in security and defense application, CISDA (2009)
-
(2009)
Proceeding of the IEEE Symposium on Computational Intelligence in Security and Defense Application
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
|