-
1
-
-
77957985073
-
Soft computing models for network intrusion detection system
-
ch.16, Studies in Fuzziness and Soft Computing, Springer-Verlag, May
-
A. Abraham, and R. Jain, "Soft computing models for network intrusion detection system," Soft Computing in Knowledge Discovery: Methods and Applications, ch.16, Studies in Fuzziness and Soft Computing, Springer-Verlag, May 2004.
-
(2004)
Soft Computing in Knowledge Discovery: Methods and Applications
-
-
Abraham, A.1
Jain, R.2
-
2
-
-
0001882616
-
Fast algorithms for mining association rules
-
Santiago, Chile, Sep.
-
R. Agrawal, and R. Srikant, "Fast algorithms for mining association rules," Proceedings of The 20th International Conference on Very large Databases, pp. 487-499, Santiago, Chile, Sep. 1994.
-
(1994)
Proceedings of The 20th International Conference on Very large Databases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
0003914522
-
State of the Practice of Intrusion Detection Technologies, Carnegie Mellon Software Engineering Institute
-
CMU/SEI-99-TR-028
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel, and E. Stoner, State of the Practice of Intrusion Detection Technologies, Carnegie Mellon Software Engineering Institute, SEI Technical Report, CMU/SEI-99-TR-028, 2000.
-
(2000)
SEI Technical Report
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
4
-
-
0003907293
-
-
Macmillan Technical Publishing
-
R. G. Bace, Intrusion Detection, Macmillan Technical Publishing, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.G.1
-
5
-
-
0035879674
-
Intrusion detection through learning behavioral model
-
July 15
-
B. Balajinath and S.V. Raghavan, "Intrusion detection through learning behavioral model," Computer Communications, vol. 24, no. 12, pp. 1202-1212, July 15, 2001.
-
(2001)
Computer Communications
, vol.24
, Issue.12
, pp. 1202-1212
-
-
Balajinath, B.1
Raghavan, S.V.2
-
6
-
-
9444235573
-
Network-based intrusion detection using neural networks
-
St. Louis, Missouri, Nov.
-
A. Bivens, M. Embrechts, C. Palagiri, R. Smith, and B. Szymanski, "Network-based intrusion detection using neural networks," Proceedins of Artificial Neural networks In Engineering, vol. 12, pp. 10-13, St. Louis, Missouri, Nov. 2002.
-
(2002)
Proceedins of Artificial Neural networks In Engineering
, vol.12
, pp. 10-13
-
-
Bivens, A.1
Embrechts, M.2
Palagiri, C.3
Smith, R.4
Szymanski, B.5
-
7
-
-
3042514639
-
Fuzzy Data mining and Genetic algorithms applied to Intrusion Detection
-
Baltimore, MD, Oct
-
S. M. Bridges, and R. B. Vaughn, "Fuzzy Data mining and Genetic algorithms applied to Intrusion Detection," Proceedings of the 23rd National Information Systems Security Conference, Baltimore, MD, Oct. 2000.
-
(2000)
Proceedings of the 23rd National Information Systems Security Conference
-
-
Bridges, S.M.1
Vaughn, R.B.2
-
8
-
-
33947581868
-
Hybrid flexible neural-tree-based intrusion detection systems
-
Apr.
-
Y. Chen, A. Abraham, and B. Yang, "Hybrid flexible neural-tree-based intrusion detection systems," International Journal of Intelligent Systems, vol. 22, no. 4, pp. 337-352, Apr. 2007.
-
(2007)
International Journal of Intelligent Systems
, vol.22
, Issue.4
, pp. 337-352
-
-
Chen, Y.1
Abraham, A.2
Yang, B.3
-
9
-
-
2942638783
-
Model Generation for Intrusion Detection System using Genetic Algorithms
-
Ossining, NY, Nov. 27
-
A. Chittur, Model Generation for Intrusion Detection System using Genetic Algorithms, High School Honors Thesis, Ossining High School, Ossining, NY, Nov. 27, 2001.
-
(2001)
High School Honors Thesis, Ossining High School
-
-
Chittur, A.1
-
10
-
-
74949104861
-
Applying genetic programming to intrusion detection
-
AAAI Press, Nov
-
M. Crosbie, and E. Spafford, "Applying genetic programming to intrusion detection," Proceedings of AAAI Fall Symposium, pp. 1-8, AAAI Press, Nov. 1995.
-
(1995)
Proceedings of AAAI Fall Symposium
, pp. 1-8
-
-
Crosbie, M.1
Spafford, E.2
-
12
-
-
84948699481
-
"An improved algorithm for fuzzy data mining for intrusion detection
-
(NAFIPS 2002), New Orleans, LA, June
-
F. German, S. Bridges, and R. Vaughn, "An improved algorithm for fuzzy data mining for intrusion detection," Proceedings of the North American Fuzzy Information Processing Society Conference (NAFIPS 2002), New Orleans, LA, June 27-29, 2002.
-
(2002)
Proceedings of the North American Fuzzy Information Processing Society Conference
, pp. 27-29
-
-
German, F.1
Bridges, S.2
Vaughn, R.3
-
13
-
-
85042797742
-
Learning Program Behavior Profiles for Intrusion Detection
-
California, USA
-
A. K. Ghosh, A. Schwartzbard, and M. Schatz, "Learning Program Behavior Profiles for Intrusion Detection," USENIX Workshop on Intrusion Detection and Network Monitoring, pp. 51-62, California, USA, 1999.
-
(1999)
USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 51-62
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
14
-
-
0038537231
-
An immuno-fuzzy approach to anomaly detection
-
Memphis, TN, USA, May
-
J. Gomez, F. Gonzalez, and D. Dasgupta, "An immuno-fuzzy approach to anomaly detection," Proceedings of the 12th IEEE International Conference on Fuzzy Systems, vol. 2, pp 1219-1224, Memphis, TN, USA, May 2003.
-
(2003)
Proceedings of the 12th IEEE International Conference on Fuzzy Systems
, vol.2
, pp. 1219-1224
-
-
Gomez, J.1
Gonzalez, F.2
Dasgupta, D.3
-
15
-
-
3142701996
-
Soft Computing and Intelligent Systems Design, Theory
-
Addison Wesley, Pearson Education Limited, Essex, England, Sep.
-
F. Karray, and C. W. D. Silva, Soft Computing and Intelligent Systems Design, Theory, Tools and Applications, pp. 560, Addison Wesley, Pearson Education Limited, Essex, England, Sep. 2004.
-
(2004)
Tools and Applications
, pp. 560
-
-
Karray, F.1
Silva, C.W.D.2
-
16
-
-
33947251166
-
A hierarchical SOM-based intrusion detection system
-
June
-
H. G. Kayacik, A. N. Z. Heywood, and M. I. Heywood, "A hierarchical SOM-based intrusion detection system," Engineering Applications of Artificial Intelligence, vol. 20, no. 4, pp. 439-451, June 2007.
-
(2007)
Engineering Applications of Artificial Intelligence
, vol.20
, Issue.4
, pp. 439-451
-
-
Kayacik, H.G.1
Heywood, A.N.Z.2
Heywood, M.I.3
-
17
-
-
33646390798
-
Genetic algorithm to improve SVM based network intrusion detection system
-
D. S. Kim, H. N. Nguyen, and J. S. Park, "Genetic algorithm to improve SVM based network intrusion detection system," Proceedings of the 19th International Conference on Advanced Information Networking and Applications, vol. 2, pp. 155-158, 2005.
-
(2005)
Proceedings of the 19th International Conference on Advanced Information Networking and Applications
, vol.2
, pp. 155-158
-
-
Kim, D.S.1
Nguyen, H.N.2
Park, J.S.3
-
18
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Oakland, Canada
-
W. Lee, S. J. Stolfo, and K.W. Mok, "A data mining framework for building intrusion detection models," IEEE Security and Privacy Symposium, pp. 120-132, Oakland, Canada, 1999.
-
(1999)
IEEE Security and Privacy Symposium
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
19
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
IEEE Computer Society Press
-
R. P. Lippmann, et al., "Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation," Proceedings of the DARPA Information Survivability Conference and Exposition, IEEE Computer Society Press, 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
-
-
Lippmann, R.P.1
-
20
-
-
67650418236
-
Detecting new forms of network intrusion using genetic programming
-
Dec. 8-12
-
W. Lu, and I. Traore, "Detecting new forms of network intrusion using genetic programming," IEEE Evolutionary Computing, vol. 3. pp. 2165-2172, Dec. 8-12, 2003.
-
(2003)
IEEE Evolutionary Computing
, vol.3
, pp. 2165-2172
-
-
Lu, W.1
Traore, I.2
-
21
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection
-
M. V. Mahoney, and P. K. Chan, "An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection," Proceedings of Recent Advances in Intrusion Detection (RAID), pp. 220-237, 2003.
-
(2003)
Proceedings of Recent Advances in Intrusion Detection (RAID)
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
22
-
-
84874995499
-
Soft Computing Techniques for Intrusion Detection, Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, George Mason University
-
Fair Fax
-
S. Mukkamala, and A. H. Sung, Soft Computing Techniques for Intrusion Detection, Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, George Mason University, ONR and AFSOR Sponsored Workshop on Intrusion Detection, Fair Fax, 2003.
-
(2003)
ONR and AFSOR Sponsored Workshop on Intrusion Detection
-
-
Mukkamala, S.1
Sung, A.H.2
-
23
-
-
33750512162
-
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
-
Jan.
-
T. Ozyer, R. Alhajj, and K. Barker, "Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening," Journal of Network and Computer Applications, vol. 30, no. 1, pp. 99-113, Jan. 2007.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 99-113
-
-
Ozyer, T.1
Alhajj, R.2
Barker, K.3
-
24
-
-
33745794758
-
An approach to implement network Intrusion detection using Genetic algorithm
-
Stellenbosch, SA, Unisa Press, 1- 58113-982-9, Oct.
-
M. M. Pillai, J. H. P. Eloff, and H. S. Venter, "An approach to implement network Intrusion detection using Genetic algorithm," Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAIC- SIT), pp. 221-228, Stellenbosch, SA, Unisa Press, 1- 58113-982-9, Oct. 2004.
-
(2004)
Proceedings of the annual South African Institute of Computer Scientists and Information Technologists conference (SAIC- SIT)
, pp. 221-228
-
-
Pillai, M.M.1
Eloff, J.H.P.2
Venter, H.S.3
-
25
-
-
84898944587
-
Intrusion detection with neural networks
-
The MIT Press, Denver, CO
-
J. Ryan, M. J. Lin, and R. Miikkulainen, "Intrusion detection with neural networks," Advances in Neural Information Processing Systems, vol. 10, pp. 943-949, The MIT Press, Denver, CO, 1998.
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
, pp. 943-949
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
26
-
-
17444432965
-
Hierarchical kohonenen net for anomaly detection in network security
-
S. T. Sarasamma, Q. A. Zhu, and J Huff, "Hierarchical kohonenen net for anomaly detection in network security," IEEE Transactions on Systems, Man and Cybernetics, Part B, vol. 35, no. 2, pp. 302-312, Apr. 2005.
-
(2005)
IEEE Transactions on Systems, Man and Cybernetics, Part B
, vol.35
, Issue.2
, pp. 302-312
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
27
-
-
77951177200
-
Anomaly detection in a distributed environment using neural networks on a cluster
-
Phoenix, USA, Nov
-
N. Srinivasan, and V. Vaidehi, "Anomaly detection in a distributed environment using neural networks on a cluster," IASTED International Conference on Communication, Network, and Information Security (CNIS 2005), Phoenix, USA, Nov. 2005.
-
(2005)
IASTED International Conference on Communication, Network, and Information Security (CNIS 2005)
-
-
Srinivasan, N.1
Vaidehi, V.2
-
28
-
-
34247636165
-
Genetic- fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
C. H. Tsang, S. Kwong, and H. Wang, "Genetic- fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection," Pattern Recognition, vol. 40, no. 9, pp. 2373- 2391, Sep. 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.9
, pp. 2373-2391
-
-
Tsang, C.H.1
Kwong, S.2
Wang, H.3
-
29
-
-
1642404668
-
Genetic algorithm optimization of membership functions for mining fuzzy association rules
-
Atlantic City, NJ, Feb. 27-Mar. 3
-
W.Wang, and S. M. Bridges, "Genetic algorithm optimization of membership functions for mining fuzzy association rules," Proceedings of the 7th International Conference on Fuzzy Theory & Technology, pp.131-134, Atlantic City, NJ, Feb. 27-Mar. 3, 2000.
-
(2000)
Proceedings of the 7th International Conference on Fuzzy Theory & Technology
, pp. 131-134
-
-
Wang, W.1
Bridges, S.M.2
-
30
-
-
33845397865
-
Native API based windows anomaly intrusion detection method using SVM
-
Xi'an Jiaotong University, China, June 05-07
-
M. Wang, C. Zhang, and J. Yu, "Native API based windows anomaly intrusion detection method using SVM," Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, pp. 514- 5191, Xi'an Jiaotong University, China, June 05-07, 2006.
-
(2006)
Proceedings of IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing
, vol.1
, pp. 514-5191
-
-
Wang, M.1
Zhang, C.2
Yu, J.3
-
31
-
-
0015558134
-
Outline of a new approach to the analysis of complex systems and decision processes
-
L. A. Zadeh, "Outline of a new approach to the analysis of complex systems and decision processes," IEEE Transactions on Systems, Man, and Cybernetics, vol. 3, pp. 28-44, 1973.
-
(1973)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.3
, pp. 28-44
-
-
Zadeh, L.A.1
|