-
1
-
-
33947660479
-
Covariance-matrix modeling and detecting various flooding attacks
-
S. Y. Daniel, J. Shuyuan, and W. Xizhao, "Covariance-matrix modeling and detecting various flooding attacks," Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, Vol. 37, No. 2, 2007, pp. 157-169,
-
(2007)
Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on
, vol.37
, Issue.2
, pp. 157-169
-
-
Daniel, S.Y.1
Shuyuan, J.2
Xizhao, W.3
-
2
-
-
51349142737
-
Optimal sleep-wake scheduling for quickest intrusion detection using wireless sensor networks
-
K. Premkumar and A. Kumar, "Optimal sleep-wake scheduling for quickest intrusion detection using wireless sensor networks," Proc. INFOCOM, 2008, pp. 1400-1408
-
Proc. INFOCOM, 2008
, pp. 1400-1408
-
-
Premkumar, K.1
Kumar, A.2
-
3
-
-
77954786610
-
Agent based correlation model for intrusion detection alerts
-
A. E. Taha, I. A. Ghaffar, A. M. Bahaa Eldin, and H. M. K. Mahdi, "Agent based correlation model for intrusion detection alerts," Proc. IEEE International Conference on intelligence and Security Informatics (ISI), 2010, pp. 89-94
-
Proc. IEEE International Conference on Intelligence and Security Informatics (ISI), 2010
, pp. 89-94
-
-
Taha, A.E.1
Ghaffar, I.A.2
Bahaa Eldin, A.M.3
Mahdi, H.M.K.4
-
5
-
-
34249319577
-
Intrusion detection based on data mining
-
23-26, April
-
D. Hoang, J. Hu and P. Bertok, "Intrusion detection based on data mining," The 5th International Conference on Enterprise Information Systems, Angers, France, vol. 3, , 23-26, April 2003, pp.341-346.
-
(2003)
The 5th International Conference on Enterprise Information Systems, Angers, France
, vol.3
, pp. 341-346
-
-
Hoang, D.1
Hu, J.2
Bertok, P.3
-
6
-
-
21644438395
-
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
-
16-19 November
-
X.D. Hoang and J. Hu, "An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls," IEEE International Conference on Networks (ICON 2004), Singapore, vol.2, 16-19 November 2004, pp.470-474.
-
(2004)
IEEE International Conference on Networks (ICON 2004), Singapore
, vol.2
, pp. 470-474
-
-
Hoang, X.D.1
Hu, J.2
-
7
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection using program sequences of system calls
-
th IEEE International Conference on Networks, Sydney, Australia, September 28-Oct 1, 2003, pp.531-536.
-
th IEEE International Conference on Networks, Sydney, Australia, September 28-Oct 1, 2003
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
10
-
-
0142000477
-
Differential evolution - A simple and efficient heuristic for global optimization over continuous spaces
-
R. Storn and K. Price, "Differential evolution - a simple and efficient heuristic for global optimization over continuous spaces". Journal of Global Optimization. Vol 11, 1997, pp 341-359
-
(1997)
Journal of Global Optimization
, vol.11
, pp. 341-359
-
-
Storn, R.1
Price, K.2
-
11
-
-
0031122887
-
Ant colony system: A cooperative learning approach to the traveling salesman problem
-
M. Dorigo and L. Gambardella, "Ant colony system: a cooperative learning approach to the traveling salesman problem," IEEE Transactions on Evolutionary Computation, Vol. 1, No. 1, 1997, pp. 53-66
-
(1997)
IEEE Transactions on Evolutionary Computation
, vol.1
, Issue.1
, pp. 53-66
-
-
Dorigo, M.1
Gambardella, L.2
-
12
-
-
34548290911
-
Immune-inspired adaptable error detection for automated teller machines
-
R. de Lemos, J. Timmis, M. Ayara, and S. Forrest, "Immune-inspired adaptable error detection for automated teller machines," IEEE Transactions on Systems, Man, and Cybernetics, Part C, vol. 37, no. 5, pp. 873- 886.
-
IEEE Transactions on Systems, Man, and Cybernetics, Part C
, vol.37
, Issue.5
, pp. 873-886
-
-
De Lemos, R.1
Timmis, J.2
Ayara, M.3
Forrest, S.4
-
13
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for unix processes," Proc. IEEE Symposium on in Security and Privacy, 1996, pp. 120-128
-
Proc. IEEE Symposium on in Security and Privacy, 1996
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
14
-
-
68949196337
-
A program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
Elsevier
-
X.D. Hoang, J. Hu, and P. Bertok, "A program based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference," Journal of Network and Computer Applications, Elsevier, Vol.32, Issue 6, 2009, pp.1219-1228.
-
(2009)
Journal of Network and Computer Applications
, vol.32
, Issue.6
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
15
-
-
65249107163
-
A simple and efficient data processing scheme for HMM based anomaly intrusion detection
-
Special Issue of Advances on Network Intrusion Detection. January
-
J. Hu, D. Qiu, H.H. Chen and X. Yu, "A simple and efficient data processing scheme for HMM based anomaly intrusion detection." Special Issue of Advances on Network Intrusion Detection. IEEE Network, Vol.23, No.1, January, 2009, pp.42-47
-
(2009)
IEEE Network
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Qiu, D.2
Chen, H.H.3
Yu, X.4
-
16
-
-
36348956823
-
Block-Based Neural Networks for Personalized ECG Signal Classification
-
W. Jiang and G. Seong Kong, "Block-Based Neural Networks for Personalized ECG Signal Classification", IEEE Transactions on Neural Networks, Vol. 18, No. 6, 2004, pp 1750-1761
-
(2004)
IEEE Transactions on Neural Networks
, vol.18
, Issue.6
, pp. 1750-1761
-
-
Jiang, W.1
Seong Kong, G.2
-
18
-
-
80052655519
-
Evolvable Block-Based Neural Network Design for Applications in Dynamic Environments
-
S. G. Merchant and G. D. Peterson. "Evolvable Block-Based Neural Network Design for Applications in Dynamic Environments." VLSI Design, 2010, pp 1-25
-
(2010)
VLSI Design
, pp. 1-25
-
-
Merchant, S.G.1
Peterson, G.D.2
-
19
-
-
50249164877
-
Study on encoding schemes in compact genetic algorithm for the continuous numerical problems
-
J.Y., Lee., M.S. Kim., C.T. Kim, J.J. Lee, "Study on encoding schemes in compact genetic algorithm for the continuous numerical problems." Proc. SICE Annual Conference, 2007, pp. 2694-2699
-
Proc. SICE Annual Conference, 2007
, pp. 2694-2699
-
-
Lee, J.Y.1
Kim, M.S.2
Kim, C.T.3
Lee, J.J.4
-
20
-
-
83755188103
-
An improved binary-real coded genetic algorithm for real parameter optimization
-
O. Abdul-Rahman., M. Munetomo, K. Akama, "An improved binary-real coded genetic algorithm for real parameter optimization." Proc. Third World Congress on Nature and Biologically Inspired Computing (NaBIC), 2011, pp. 149-156
-
Proc. Third World Congress on Nature and Biologically Inspired Computing (NaBIC), 2011
, pp. 149-156
-
-
Abdul-Rahman, O.1
Munetomo, M.2
Akama, K.3
-
21
-
-
80053985118
-
Hybrid Fuzzy Logic-Based Particle Swarm Optimization for Flow Shop Scheduling Problem
-
S.H. Ling, F. Jiang, K.Y. Chan, and H.T. Nguyen, "Hybrid Fuzzy Logic-Based Particle Swarm Optimization for Flow Shop Scheduling Problem", in International Journal of Computational Intelligence and Applications, Vol. 10, No. 3, 2011, pp. 335-356
-
(2011)
International Journal of Computational Intelligence and Applications
, vol.10
, Issue.3
, pp. 335-356
-
-
Ling, S.H.1
Jiang, F.2
Chan, K.Y.3
Nguyen, H.T.4
-
22
-
-
77049103625
-
A Labeled Data Set for Flow-based Intrusion Detection
-
A. Sperotto, R. Sadre, F. van Vliet, A. Pras, "A Labeled Data Set For Flow-based Intrusion Detection" Proc. 9th IEEE International on Workshop on IP Operations and Management (IPOM 09), pp.39-50
-
Proc. 9th IEEE International on Workshop on IP Operations and Management (IPOM 09)
, pp. 39-50
-
-
Sperotto, A.1
Sadre, R.2
Van Vliet, F.3
Pras, A.4
-
23
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
R.P. Lippman, D.J. Fried, et al, "Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation," Proc. The DARPA Information Survivability Conference and Exposition, vol. 2, 1999, pp. 12-26
-
(1999)
Proc. The DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 12-26
-
-
Lippman, R.P.1
Fried, D.J.2
-
24
-
-
0032594959
-
An overview of statistical learning theory
-
V.N. Vapnik, An overview of statistical learning theory. IEEE Transactions on Neural Networks, 1999, 10(5): 988-999
-
(1999)
IEEE Transactions on Neural Networks
, vol.10
, Issue.5
, pp. 988-999
-
-
Vapnik, V.N.1
|