-
1
-
-
79951682428
-
Network intrusion detection based on rough set and k-nearest neighbour
-
Adetunmbi, A.O., Falaki, S.O., Adewale, O.S., Alese, B.K.: Network intrusion detection based on rough set and k-nearest neighbour. International Journal of Computing and ICT Research 2, 60-66 (2008)
-
(2008)
International Journal of Computing and ICT Research
, vol.2
, pp. 60-66
-
-
Adetunmbi, A.O.1
Falaki, S.O.2
Adewale, O.S.3
Alese, B.K.4
-
2
-
-
33748100382
-
Rt-unnid: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
-
Amini, M., Jalili, R., Shahriari, H.R.: Rt-unnid: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. Computers & Security 25(6), 459-468 (2006)
-
(2006)
Computers & Security
, vol.25
, Issue.6
, pp. 459-468
-
-
Amini, M.1
Jalili, R.2
Shahriari, H.R.3
-
3
-
-
79952932462
-
NADO: Network anomaly detection using outlier approach
-
Bhuyan, M.H., Bhattacharyya, D.K., Kalita, J.K.: NADO: network anomaly detection using outlier approach. In: Proceedings of the ACM International Conference on Communication, Computing & Security, New York, NY, USA, pp. 531-536 (2011)
-
(2011)
Proceedings of the ACM International Conference on Communication, Computing & Security, New York, NY, USA
, pp. 531-536
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
4
-
-
0142253852
-
Adam: A testbed for exploring the use of data mining in intrusion detection
-
Daniel, B., Julia, C., Sushil, J., Ningning, W.: Adam: a testbed for exploring the use of data mining in intrusion detection. SIGMOD Rec. 30(4), 15-24 (2001)
-
(2001)
SIGMOD Rec.
, vol.30
, Issue.4
, pp. 15-24
-
-
Daniel, B.1
Julia, C.2
Sushil, J.3
Ningning, W.4
-
5
-
-
78651547976
-
Anomaly detection analysis of intrusion data using supervised & unsupervised approach
-
Gogoi, P., Borah, B., Bhattacharyya, D.K.: Anomaly detection analysis of intrusion data using supervised & unsupervised approach. Journal of Convergence Information Technology 5, 95-110 (2010)
-
(2010)
Journal of Convergence Information Technology
, vol.5
, pp. 95-110
-
-
Gogoi, P.1
Borah, B.2
Bhattacharyya, D.K.3
-
6
-
-
84868273867
-
Supervised anomaly detection using clustering based normal behaviour modeling
-
Gogoi, P., Borah, B., Bhattacharyya, D.K.: Supervised anomaly detection using clustering based normal behaviour modeling. International Journal of Advances in Engineering Sciences 1, 12-17 (2011)
-
(2011)
International Journal of Advances in Engineering Sciences
, vol.1
, pp. 12-17
-
-
Gogoi, P.1
Borah, B.2
Bhattacharyya, D.K.3
-
7
-
-
84868283151
-
Network anomaly detection using unsupervised model
-
Gogoi, P., Borah, B., Bhattacharyya, D.K.: Network anomaly detection using unsupervised model. International Journal of Computer Applications (Special Issue on Network Security and Cryptography) NSC, 19-30 (2011)
-
(2011)
International Journal of Computer Applications (Special Issue on Network Security and Cryptography) NSC
, pp. 19-30
-
-
Gogoi, P.1
Borah, B.2
Bhattacharyya, D.K.3
-
8
-
-
84868287663
-
Efficient rule set generation using rough set theory for classification of high dimensional data
-
Gogoi, P., Das, R., Borah, B., Bhattacharyya, D.K.: Efficient rule set generation using rough set theory for classification of high dimensional data. In: Proc. of Int'nl Conf. on Communication and Network Security (ICCNS 2011), Bhubaneswar, India, November 13-14, pp. 19-22 (2011)
-
(2011)
Proc. of Int'nl Conf. on Communication and Network Security (ICCNS 2011), Bhubaneswar, India, November 13-14
, pp. 19-22
-
-
Gogoi, P.1
Das, R.2
Borah, B.3
Bhattacharyya, D.K.4
-
9
-
-
0003478316
-
-
Tech. rep., Computer Science Department, University of New Mexico, New Mexico
-
Heady, R., Luger, G., Maccabe, A., Servilla, M.: The architecture of a network level intrusion detection system. Tech. rep., Computer Science Department, University of New Mexico, New Mexico (1990)
-
(1990)
The Architecture of A Network Level Intrusion Detection System
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
13
-
-
77950575061
-
-
Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set (2009), http://nsl.cs.unb.ca/NSL-KDD/
-
(2009)
A Detailed Analysis of the Kdd Cup 99 Data Set
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
14
-
-
77955847605
-
Toward credible evaluation of anomaly-based intrusion-detection methods
-
Tavallaee, M., Stakhanova, N., Ghorbani, A.A.: Toward credible evaluation of anomaly-based intrusion-detection methods. IEEE Transactions on Systems, Man, and Cybernetics, Part C 40, 516-524 (2010)
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics, Part C
, vol.40
, pp. 516-524
-
-
Tavallaee, M.1
Stakhanova, N.2
Ghorbani, A.A.3
|