-
3
-
-
62849107731
-
Efficient intrusion detection using principal component analysis
-
SAR
-
Y. Bouzida, F. Cuppens, N. Cuppens-Boulahia, S. Gombault, Efficient intrusion detection using principal component analysis, in: Proceedings of the 3eme Conference Surla Securite et Architectures Reseaux, SAR, 2004.
-
(2004)
Proceedings of the 3eme Conference Surla Securite et Architectures Reseaux
-
-
Bouzida, Y.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Gombault, S.4
-
5
-
-
43249105264
-
An assessment of the DARPA IDS evaluation dataset using Snort
-
Davis, Department of Computer Science, Davis, CA
-
S.-T. Brugger, J. Chow, An assessment of the DARPA IDS evaluation dataset using Snort, Technical Report CSE-2007-1, University of California, Davis, Department of Computer Science, Davis, CA, 2007.
-
(2007)
Technical Report CSE-2007-1, University of California
-
-
Brugger, S.-T.1
Chow, J.2
-
12
-
-
25844491810
-
An intelligent intrusion detection system for anomaly and misuse detection in computer networks
-
O. Depren, M. Topallar, E. Anarim, and M.K. CilizAn An intelligent intrusion detection system for anomaly and misuse detection in computer networks Expert Systems with Applications 29 2005 713 722
-
(2005)
Expert Systems with Applications
, vol.29
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Cilizan, M.K.4
-
17
-
-
0003704318
-
-
University of California, Irvine
-
S. Hettich, S. Bay, The UCI KDD archive, University of California, Irvine, 1999. http://kdd.ics.uci.edu.
-
(1999)
The UCI KDD Archive
-
-
Hettich, S.1
Bay, S.2
-
21
-
-
17544388668
-
On the capability of an SOM based intrusion detection system
-
H.G. Kayacik, Z.-H. Nur, M.I. Heywood, On the capability of an SOM based intrusion detection system, in: Proceedings of the Int'l Joint Conference on Neural Networks, vol. 3, 2003.
-
(2003)
Proceedings of the Int'l Joint Conference on Neural Networks
, vol.3
-
-
Kayacik, H.G.1
Nur, Z.-H.2
Heywood, M.I.3
-
23
-
-
34548651677
-
Network anomaly detection based on TCM-KNN algorithm
-
Y. Li, B. Fang, L. Guo, Y. Chen, Network anomaly detection based on TCM-KNN algorithm, in: Proceedings of ACM Symposium on Information, Computer and Communications Security, 2007.
-
(2007)
Proceedings of ACM Symposium on Information, Computer and Communications Security
-
-
Li, Y.1
Fang, B.2
Guo, L.3
Chen, Y.4
-
24
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R.K. Cunningham, M. Zissman, Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, in: Proceedings of the DARPA Information Survivability Conference and Exposition, 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.11
-
26
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by Lincoln laboratory
-
J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by Lincoln laboratory ACM Transactions on Information and System Security 3 4 2000 262 294
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
29
-
-
58849142192
-
A new GHSOM model applied to network security
-
E. Palomo, E. Dominguez, R. Luque, J. Munoz, A new GHSOM model applied to network security, in: Proceedings of the 18th Int'l Conference on Artificial Neural Networks, 2008.
-
(2008)
Proceedings of the 18th Int'l Conference on Artificial Neural Networks
-
-
Palomo, E.1
Dominguez, E.2
Luque, R.3
Munoz, J.4
-
31
-
-
17444432965
-
Hierarchical Kohonenen net for anomaly detection in network security
-
S. Sarasamma, Q. Zhu, and J. Huff Hierarchical Kohonenen net for anomaly detection in network security IEEE Transaction on Systems, Man, and Cybernetics - Part B: Cybernetics 35 2 2005 302 312
-
(2005)
IEEE Transaction on Systems, Man, and Cybernetics - Part B: Cybernetics
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.1
Zhu, Q.2
Huff, J.3
-
32
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
M.G. Schultz, E. Eskin, E. Zadok, S.J. Stolfo, Data mining methods for detection of new malicious executables, in: Proceedings of the IEEE Symposium on Security and Privacy, 2001.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Schultz, M.G.1
Eskin, E.2
Zadok, E.3
Stolfo, S.J.4
-
33
-
-
0442296744
-
A Bayesian paradigm for designing intrusion detection systems
-
S.L. Scott A Bayesian paradigm for designing intrusion detection systems Computational Statistics and Data Analysis 45 2004 69 83
-
(2004)
Computational Statistics and Data Analysis
, vol.45
, pp. 69-83
-
-
Scott, S.L.1
-
36
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C. Tsai, Y. Hsu, C. Lin, and W. Lin Intrusion detection by machine learning: a review Expert Systems with Applications 36 10 2009 11994 12000
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsai, C.1
Hsu, Y.2
Lin, C.3
Lin, W.4
|