-
2
-
-
0242314805
-
The spread of the sapphire/slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, The spread of the sapphire/slammer worm, in: Technical Report, International Computer Science Institute - University of California at Berkeley, 2003.
-
(2003)
Technical Report, International Computer Science Institute - University of California at Berkeley
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
4
-
-
37049002837
-
Processing of massive audit data streams for real-time anomaly intrusion detection
-
W. Wang, X. Guan, and X. Zhang Processing of massive audit data streams for real-time anomaly intrusion detection Computer Communications 31 2008 58 72
-
(2008)
Computer Communications
, vol.31
, pp. 58-72
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
7
-
-
0028433895
-
A survey of research in deliberative real-time artificial intelligence
-
A. Garvey, and V. Lesser A survey of research in deliberative real-time artificial intelligence Real-Time Systems 6 1994 317 347
-
(1994)
Real-Time Systems
, vol.6
, pp. 317-347
-
-
Garvey, A.1
Lesser, V.2
-
8
-
-
0026832790
-
Guardian: A prototype intensive-care monitoring agent
-
B. Hayes-Roth, R. Washington, D. Ash, A. Collinot, A. Vina, and A. Seiver Guardian: A prototype intensive-care monitoring agent Artificial Intelligence in Medicine 4 1992 165 185
-
(1992)
Artificial Intelligence in Medicine
, vol.4
, pp. 165-185
-
-
Hayes-Roth, B.1
Washington, R.2
Ash, D.3
Collinot, A.4
Vina, A.5
Seiver, A.6
-
9
-
-
0009913296
-
Addressing real-time constraints in the design of autonomous agents
-
A.E. Howe, D.M. Hart, and P.R. Cohen Addressing real-time constraints in the design of autonomous agents Real-Time Systems 2 1990 81 97
-
(1990)
Real-Time Systems
, vol.2
, pp. 81-97
-
-
Howe, A.E.1
Hart, D.M.2
Cohen, P.R.3
-
10
-
-
0027694049
-
CIRCA: A cooperative intelligent real-time control architecture
-
D.J. Musliner, E.H. Durfee, and K.G. Shin CIRCA: A cooperative intelligent real-time control architecture IEEE Transactions on Systems, Man, and Cybernetics 23 1993 1561 1574
-
(1993)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.23
, pp. 1561-1574
-
-
Musliner, D.J.1
Durfee, E.H.2
Shin, K.G.3
-
12
-
-
33750561462
-
MOVICAB-IDS: Visual analysis of network traffic data streams for intrusion detection
-
E. Corchado, H. Yin, V. Botti, C. Fyfe, Springer Heidelberg
-
Á. Herrero, E. Corchado, and J.M. Sáiz MOVICAB-IDS: Visual analysis of network traffic data streams for intrusion detection E. Corchado, H. Yin, V. Botti, C. Fyfe, 7th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2006) 2006 Springer Heidelberg 1424 1433
-
(2006)
7th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2006)
, pp. 1424-1433
-
-
Herrero, Á.1
Corchado, E.2
Sáiz, J.M.3
-
14
-
-
78751621903
-
Neural visualization of network traffic data for intrusion detection
-
E. Corchado, and Á. Herrero Neural visualization of network traffic data for intrusion detection Applied Soft Computing 11 2011 2042 2056
-
(2011)
Applied Soft Computing
, vol.11
, pp. 2042-2056
-
-
Corchado, E.1
Herrero, Á.2
-
15
-
-
74849129541
-
Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies
-
F.-Y. Leu, C.-T. Yang, and F.-C. Jiang Improving reliability of a heterogeneous grid-based intrusion detection platform using levels of redundancies Future Generation Computer Systems 26 2010 554 568
-
(2010)
Future Generation Computer Systems
, vol.26
, pp. 554-568
-
-
Leu, F.-Y.1
Yang, C.-T.2
Jiang, F.-C.3
-
16
-
-
0028401306
-
Case-based reasoning - Foundational issues, methodological variations, and system approaches
-
A. Aamodt, and E. Plaza Case-based reasoning - foundational issues, methodological variations, and system approaches AI Communications 7 1994 39 59
-
(1994)
AI Communications
, vol.7
, pp. 39-59
-
-
Aamodt, A.1
Plaza, E.2
-
17
-
-
58149421595
-
Analysis of a complex of statistical variables into principal components
-
H. Hotelling Analysis of a complex of statistical variables into principal components Journal of Education Psychology 24 1933 417 444
-
(1933)
Journal of Education Psychology
, vol.24
, pp. 417-444
-
-
Hotelling, H.1
-
18
-
-
0000325341
-
On lines and planes of closest fit to systems of points in space
-
K. Pearson On lines and planes of closest fit to systems of points in space Philosophical Magazine 2 1901 559 572
-
(1901)
Philosophical Magazine
, vol.2
, pp. 559-572
-
-
Pearson, K.1
-
19
-
-
0002399288
-
Neural networks, principal components, and subspaces
-
E. Oja Neural networks, principal components, and subspaces International Journal of Neural Systems 1 1989 61 68
-
(1989)
International Journal of Neural Systems
, vol.1
, pp. 61-68
-
-
Oja, E.1
-
20
-
-
0016102310
-
A projection pursuit algorithm for exploratory data-analysis
-
J.H. Friedman, and J.W. Tukey A projection pursuit algorithm for exploratory data-analysis IEEE Transactions on Computers 23 1974 881 890
-
(1974)
IEEE Transactions on Computers
, vol.23
, pp. 881-890
-
-
Friedman, J.H.1
Tukey, J.W.2
-
22
-
-
27544512530
-
Data mining for intrusion detection: A critical review
-
D. Barbará, S. Jajodia, Kluwer Academic Publishers
-
K. Julisch Data mining for intrusion detection: a critical review D. Barbará, S. Jajodia, Applications of Data Mining in Computer Security 2002 Kluwer Academic Publishers 33 62
-
(2002)
Applications of Data Mining in Computer Security
, pp. 33-62
-
-
Julisch, K.1
-
26
-
-
2442526701
-
Unsupervised learning techniques for an intrusion detection system
-
S. Zanero, S. Savaresi, Unsupervised learning techniques for an intrusion detection system, in: ACM Symposium on Applied Computing, 2004, pp. 412-419.
-
(2004)
ACM Symposium on Applied Computing
, pp. 412-419
-
-
Zanero, S.1
Savaresi, S.2
-
27
-
-
15944375471
-
Intrusion detection using hierarchical neural networks
-
C. Zhang, J. Jiang, and M. Kamel Intrusion detection using hierarchical neural networks Pattern Recognition Letters 26 2005 779 791
-
(2005)
Pattern Recognition Letters
, vol.26
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
28
-
-
69249203697
-
Neural projection techniques for the visual inspection of network traffic
-
Á. Herrero, E. Corchado, P. Gastaldo, and R. Zunino Neural projection techniques for the visual inspection of network traffic Neurocomputing 72 2009 3649 3658
-
(2009)
Neurocomputing
, vol.72
, pp. 3649-3658
-
-
Herrero, Á.1
Corchado, E.2
Gastaldo, P.3
Zunino, R.4
-
31
-
-
70349568270
-
Visual information seeking: Tight coupling of dynamic query filters with starfield displays
-
Morgan Kaufmann Publishers Inc.
-
C. Ahlberg, and B. Shneiderman Visual information seeking: tight coupling of dynamic query filters with starfield displays Readings in Information Visualization: using Vision to Think 1999 Morgan Kaufmann Publishers Inc. 244 250
-
(1999)
Readings in Information Visualization: Using Vision to Think
, pp. 244-250
-
-
Ahlberg, C.1
Shneiderman, B.2
-
33
-
-
0036448607
-
Case study: Interactive visualization for internet security
-
IEEE Computer Society Boston, Massachusetts
-
S.T. Teoh, K.L. Ma, S.F. Wu, and X. Zhao Case study: interactive visualization for internet security IEEE Conference on Visualization, Vis 2002 2002 IEEE Computer Society Boston, Massachusetts
-
(2002)
IEEE Conference on Visualization, Vis 2002
-
-
Teoh, S.T.1
Ma, K.L.2
Wu, S.F.3
Zhao, X.4
-
34
-
-
84870897584
-
Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration
-
T. Capers
-
K. Nyarko, T. Capers, C. Scott, and K.A. Ladeji-Osias Network intrusion visualization with NIVA, an intrusion detection visual analyzer with haptic integration T. Capers, 10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, HAPTICS 2002 2002 277 284
-
(2002)
10th Symposium on Haptic Interfaces for Virtual Environment and Teleoperator Systems, HAPTICS 2002
, pp. 277-284
-
-
Nyarko, K.1
Capers, T.2
Scott, C.3
Ladeji-Osias, K.A.4
-
35
-
-
33749532337
-
Preserving the big picture: Visual network traffic analysis with TNV
-
IEEE Computer Society
-
J.R. Goodall, W.G. Lutters, P. Rheingans, and A. Komlodi Preserving the big picture: visual network traffic analysis with TNV IEEE Workshop on Visualization for Computer Security, VizSEC 05 2005 IEEE Computer Society 47 54
-
(2005)
IEEE Workshop on Visualization for Computer Security, VizSEC 05
, pp. 47-54
-
-
Goodall, J.R.1
Lutters, W.G.2
Rheingans, P.3
Komlodi, A.4
-
37
-
-
33745653877
-
Interactive visualization for network and port scan detection
-
D. Zamboni, C. Kruegel, Springer Heidelberg
-
C. Muelder, K.L. Ma, and T. Bartoletti Interactive visualization for network and port scan detection D. Zamboni, C. Kruegel, Nineth International Symposium on Recent Advances in Intrusion Detection, RAID 2006 2006 Springer Heidelberg 265 283
-
(2006)
Nineth International Symposium on Recent Advances in Intrusion Detection, RAID 2006
, pp. 265-283
-
-
Muelder, C.1
Ma, K.L.2
Bartoletti, T.3
-
38
-
-
33745460819
-
Visualizing network data for intrusion detection
-
A. Kulsoom, C. Lee, G. Conti, J.A. Copeland, Visualizing network data for intrusion detection, in: Sixth Annual IEEE Information Assurance Workshop - Systems, Man and Cybernetics, SMC, 2005, pp. 100-108.
-
(2005)
Sixth Annual IEEE Information Assurance Workshop - Systems, Man and Cybernetics, SMC
, pp. 100-108
-
-
Kulsoom, A.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
-
40
-
-
33645238804
-
IDGraphs: Intrusion detection and analysis using stream compositing
-
P. Ren, Y. Gao, Z.C. Li, Y. Chen, and B. Watson IDGraphs: intrusion detection and analysis using stream compositing IEEE Computer Graphics and Applications 26 2006 28 39
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, pp. 28-39
-
-
Ren, P.1
Gao, Y.2
Li, Z.C.3
Chen, Y.4
Watson, B.5
-
42
-
-
33749520207
-
IDS RainStorm: Visualizing IDS alarms
-
IEEE Computer Society
-
K. Abdullah, C.P. Lee, G. Conti, J.A. Copeland, and J. Stasko IDS RainStorm: Visualizing IDS alarms IEEE Workshop on Visualization for Computer Security, VizSEC 05 2005 IEEE Computer Society 1 10
-
(2005)
IEEE Workshop on Visualization for Computer Security, VizSEC 05
, pp. 1-10
-
-
Abdullah, K.1
Lee, C.P.2
Conti, G.3
Copeland, J.A.4
Stasko, J.5
-
44
-
-
33749533756
-
A user-centered look at glyph-based security visualization
-
IEEE Computer Society
-
A. Komlodi, P. Rheingans, A. Utkarsha, J.R. Goodall, and J. Amit A user-centered look at glyph-based security visualization IEEE Workshop on Visualization for Computer Security (VizSEC 05) 2005 IEEE Computer Society 21 28
-
(2005)
IEEE Workshop on Visualization for Computer Security (VizSEC 05)
, pp. 21-28
-
-
Komlodi, A.1
Rheingans, P.2
Utkarsha, A.3
Goodall, J.R.4
Amit, J.5
-
46
-
-
0001493668
-
Asymptotics of graphical projection pursuit
-
P. Diaconis, and D. Freedman Asymptotics of graphical projection pursuit The Annals of Statistics 12 1984 793 815
-
(1984)
The Annals of Statistics
, vol.12
, pp. 793-815
-
-
Diaconis, P.1
Freedman, D.2
-
48
-
-
35948957403
-
Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats
-
F. Mansmann, D.A. Keim, S.C. North, B. Rexroad, and D. Sheleheda Visual analysis of network traffic for resource planning, interactive monitoring, and interpretation of security threats IEEE Transactions on Visualization and Computer Graphics 13 2007 1105 1112
-
(2007)
IEEE Transactions on Visualization and Computer Graphics
, vol.13
, pp. 1105-1112
-
-
Mansmann, F.1
Keim, D.A.2
North, S.C.3
Rexroad, B.4
Sheleheda, D.5
-
49
-
-
33749519234
-
IDGraphs: Intrusion detection and analysis using histographs
-
IEEE Computer Society
-
P. Ren, Y. Gao, Z.C. Li, Y. Chen, and B. Watson IDGraphs: Intrusion detection and analysis using histographs IEEE Workshop on Visualization for Computer Security (VizSEC 05) 2005 IEEE Computer Society 39 46
-
(2005)
IEEE Workshop on Visualization for Computer Security (VizSEC 05)
, pp. 39-46
-
-
Ren, P.1
Gao, Y.2
Li, Z.C.3
Chen, Y.4
Watson, B.5
-
52
-
-
24344493979
-
CIDS: An agent-based intrusion detection system
-
D. Dasgupta, F. Gonzalez, K. Yallapu, J. Gomez, and R. Yarramsettii CIDS: An agent-based intrusion detection system Computers & Security 24 2005 387 398
-
(2005)
Computers & Security
, vol.24
, pp. 387-398
-
-
Dasgupta, D.1
Gonzalez, F.2
Yallapu, K.3
Gomez, J.4
Yarramsettii, R.5
-
56
-
-
35048820538
-
APHIDS: A mobile agent-based programmable hybrid intrusion detection system
-
Springer Heidelberg
-
K. Deeter, K. Singh, S. Wilson, L. Filipozzi, and S. Vuong APHIDS: A mobile agent-based programmable hybrid intrusion detection system First International Workshop on Mobility Aware Technologies and Applications, MATA 2004 2004 Springer Heidelberg 244 253
-
(2004)
First International Workshop on Mobility Aware Technologies and Applications, MATA 2004
, pp. 244-253
-
-
Deeter, K.1
Singh, K.2
Wilson, S.3
Filipozzi, L.4
Vuong, S.5
-
57
-
-
33745317862
-
A mobile agent approach to intrusion detection in network systems
-
Springer Heidelberg
-
G. Kolaczek, A. Pieczynska-Kuchtiak, K. Juszczyszyn, A. Grzech, R.P. Katarzyniak, and N.T. Nguyen A mobile agent approach to intrusion detection in network systems Knowledge-Based Intelligent Information and Engineering Systems 2005 Springer Heidelberg 514 519
-
(2005)
Knowledge-Based Intelligent Information and Engineering Systems
, pp. 514-519
-
-
Kolaczek, G.1
Pieczynska-Kuchtiak, A.2
Juszczyszyn, K.3
Grzech, A.4
Katarzyniak, R.P.5
Nguyen, N.T.6
-
60
-
-
73449132121
-
Towards a distributed, environment-centered agent framework
-
Springer-Verlag
-
J.R. Graham, and K. Decker Towards a distributed, environment-centered agent framework 6th International Workshop on Intelligent Agents VI, Agent Theories, Architectures, and Languages (ATAL) 2000 Springer-Verlag 290 304
-
(2000)
6th International Workshop on Intelligent Agents VI, Agent Theories, Architectures, and Languages (ATAL)
, pp. 290-304
-
-
Graham, J.R.1
Decker, K.2
-
61
-
-
0033739646
-
Towards a real-time agent architecture: A whitepaper
-
L.C. DiPippo, E. Hodys, B. Thuraisingham, Towards a real-time agent architecture: a whitepaper, in: Fifth International Workshop on Object-Oriented Real-Time Dependable Systems, 1999, pp. 59-64.
-
(1999)
Fifth International Workshop on Object-Oriented Real-Time Dependable Systems
, pp. 59-64
-
-
Dipippo, L.C.1
Hodys, E.2
Thuraisingham, B.3
-
62
-
-
84964034464
-
A real-time multi-agent system architecture for e-commerce applications
-
L. Cingiser DiPippo, V. Fay-Wolfe, L. Nair, E. Hodys, O. Uvarov, A real-time multi-agent system architecture for e-commerce applications, in: 5th International Symposium on Autonomous Decentralized Systems, 2001, pp. 357-364.
-
(2001)
5th International Symposium on Autonomous Decentralized Systems
, pp. 357-364
-
-
Cingiser Dipippo, L.1
Fay-Wolfe, V.2
Nair, L.3
Hodys, E.4
Uvarov, O.5
-
63
-
-
84866614740
-
-
Last access: 18/10/2010
-
Real-time CORBA, http://www.omg.org/technology/documents/formal/real- timeCORBA.htm. Last access: 18/10/2010.
-
Real-time CORBA
-
-
-
64
-
-
0034855325
-
The real-time objectagent software architecture for distributed satellite systems
-
D.M. Surka, M.C. Brito, C.G. Harvey, The real-time objectagent software architecture for distributed satellite systems, in: IEEE Aerospace Conference 2001, 2001, pp. 2731-2741.
-
(2001)
IEEE Aerospace Conference 2001
, pp. 2731-2741
-
-
Surka, D.M.1
Brito, M.C.2
Harvey, C.G.3
-
67
-
-
0022735890
-
Blackboard systems: The blackboard model of problem-solving and the evolution of blackboard architecture
-
P. Nit Blackboard systems: the blackboard model of problem-solving and the evolution of blackboard architecture AI Magazine 7 1986 38 53
-
(1986)
AI Magazine
, vol.7
, pp. 38-53
-
-
Nit, P.1
-
69
-
-
29244443366
-
On the use of singular value decomposition for a fast intrusion detection system
-
S. Rawat, A.K. Pujari, V.P. Gulati, On the use of singular value decomposition for a fast intrusion detection system, in: First International Workshop on Views on Designing Complex Architectures, VODCA 2004, 2006, pp. 215-228.
-
(2006)
First International Workshop on Views on Designing Complex Architectures, VODCA 2004
, pp. 215-228
-
-
Rawat, S.1
Pujari, A.K.2
Gulati, V.P.3
-
72
-
-
19944424800
-
Real-time intrusion detection for high-speed networks
-
W. Jiang, H. Song, and Y. Dai Real-time intrusion detection for high-speed networks Computers & Security 24 2005 287 294
-
(2005)
Computers & Security
, vol.24
, pp. 287-294
-
-
Jiang, W.1
Song, H.2
Dai, Y.3
-
73
-
-
20844439136
-
A data stream management system for network traffic management
-
S. Babu, L. Subramanian, J. Widom, A data stream management system for network traffic management, in: Workshop on Network-Related Data Management, NRDM 2001, 2001.
-
(2001)
Workshop on Network-Related Data Management, NRDM 2001
-
-
Babu, S.1
Subramanian, L.2
Widom, J.3
-
77
-
-
78650135042
-
MOVIH-IDS: A mobile-visualization hybrid intrusion detection system
-
Á. Herrero, E. Corchado, M.A. Pellicer, and A. Abraham MOVIH-IDS: A mobile-visualization hybrid intrusion detection system Neurocomputing 72 2009 2775 2784
-
(2009)
Neurocomputing
, vol.72
, pp. 2775-2784
-
-
Herrero, Á.1
Corchado, E.2
Pellicer, M.A.3
Abraham, A.4
-
79
-
-
34248566933
-
Hybrid multi-agent architecture as a real-time problem-solving model
-
C. Carrascosa, J. Bajo, V. Julián, J.M. Corchado, and V. Botti Hybrid multi-agent architecture as a real-time problem-solving model Expert Systems with Applications: An International Journal 34 2008 2 17
-
(2008)
Expert Systems with Applications: An International Journal
, vol.34
, pp. 2-17
-
-
Carrascosa, C.1
Bajo, J.2
Julián, V.3
Corchado, J.M.4
Botti, V.5
-
87
-
-
3543075142
-
Maximum and minimum likelihood Hebbian learning for exploratory projection pursuit
-
E. Corchado, D. MacDonald, and C. Fyfe Maximum and minimum likelihood Hebbian learning for exploratory projection pursuit Data Mining and Knowledge Discovery 8 2004 203 225
-
(2004)
Data Mining and Knowledge Discovery
, vol.8
, pp. 203-225
-
-
Corchado, E.1
MacDonald, D.2
Fyfe, C.3
-
88
-
-
0003343297
-
Simple Network Management Protocol, SNMP
-
J. Case, M.S. Fedor, M.L. Schoffstall, C. Davin, Simple Network Management Protocol, SNMP, in: IETF RFC 1157, 1990.
-
(1990)
IETF RFC 1157
-
-
Case, J.1
Fedor, M.S.2
Schoffstall, M.L.3
Davin, C.4
-
90
-
-
0030736375
-
Curvilinear component analysis: A self-organizing neural network for nonlinear mapping of data sets
-
P. Demartines, and J. Herault Curvilinear component analysis: a self-organizing neural network for nonlinear mapping of data sets IEEE Transactions on Neural Networks 8 1997 148 154
-
(1997)
IEEE Transactions on Neural Networks
, vol.8
, pp. 148-154
-
-
Demartines, P.1
Herault, J.2
-
91
-
-
0025489075
-
The self-organizing map
-
T. Kohonen The self-organizing map Proceedings of the IEEE 78 1990 1464 1480
-
(1990)
Proceedings of the IEEE
, vol.78
, pp. 1464-1480
-
-
Kohonen, T.1
|