-
1
-
-
79956097533
-
Mutual information-based feature se-lection for intrusion detection systems
-
F Amiri, M M R Yousefi, C Lucas, A Shakery, and N Yazdani, "Mutual information-based feature se-lection for intrusion detection systems," Journal of Network and Computer Applications, vol. 34, no. 4, pp. 1184-1199, 2011.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1184-1199
-
-
Amiri, F.1
Yousefi, M.M.R.2
Lucas, C.3
Shakery, A.4
Yazdani, N.5
-
2
-
-
0021583718
-
FCM: The fuzzy c-means clustering algorithm
-
James C Bezdek, Robert Ehrlich, and William Full, "FCM: The fuzzy c-means clustering algorithm," Computers & Geosciences, vol. 10, no. 2-3, pp. 191-203, 1984.
-
(1984)
Computers & Geosciences
, vol.10
, Issue.2-3
, pp. 191-203
-
-
Bezdek, J.C.1
Ehrlich, R.2
Full, W.3
-
3
-
-
79952932462
-
NADO: Network anomaly detection using outlier approach
-
ACM, February
-
M H Bhuyan, D K Bhattacharyya, and J K Kalita, "NADO: Network anomaly detection using outlier approach," in Proceedings of the International Con-ference on Communication, Computing and Security, pp. 531-536. ACM, February 2011.
-
(2011)
Proceedings of the International Con-ference on Communication, Computing and Security
, pp. 531-536
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
4
-
-
80053510589
-
Surveying port scans and their detection method-ologies
-
M H Bhuyan, D K Bhattacharyya, and J K Kalita, "Surveying port scans and their detection method-ologies," The Computer Journal, vol. 54, no. 10, pp. 1565-1581, 2011.
-
(2011)
The Computer Journal
, vol.54
, Issue.10
, pp. 1565-1581
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
6
-
-
0000949239
-
Grids: a graph based intrusion detection system for large networks
-
USA, October
-
S Staniford Chen, S Cheung, R Crawford, M Dilger, J Frank, J Hoagland, K Levitt, C Wee, R Yip, and D Zerkle, "Grids: a graph based intrusion detection system for large networks," in Proceedings of the 19th National Information Systems Security Conference, pp. 361-370, USA, October 1996.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
, pp. 361-370
-
-
Staniford Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
7
-
-
80955142795
-
The cyber threat land-scape: Challenges and future research directions
-
Kim Kwang Raymond Choo, "The cyber threat land-scape: Challenges and future research directions," Computers & Security, vol. 30, no. 8, pp. 719-731, 2011.
-
(2011)
Computers & Security
, vol.30
, Issue.8
, pp. 719-731
-
-
Choo, K.K.R.1
-
8
-
-
20444438039
-
Passive visual fingerprinting of network attack tools
-
Washington, USA, October
-
Gregory Conti and Kulsoom Abdullah, "Passive vi-sual fingerprinting of network attack tools," in Pro-ceedings of the CCS Workshop on Visualization and Data Mining for Computer Security, pp. 45-54, Washington, USA, October 2004.
-
(2004)
Pro-ceedings of the CCS Workshop on Visualization and Data Mining for Computer Security
, pp. 45-54
-
-
Conti, G.1
Abdullah, K.2
-
9
-
-
0004568554
-
A review of port scanning tech-niques
-
Marco De-Vivo, Eddy Carrasco, Germinal Isern, and Gabriela O de Vivo, "A review of port scanning tech-niques," SIGCOMM Computer Communication Re-view, vol. 29, no. 2, pp. 41-48, 1999.
-
(1999)
SIGCOMM Computer Communication Review
, vol.29
, Issue.2
, pp. 41-48
-
-
De-Vivo, M.1
Carrasco, E.2
Isern, G.3
Gabriela, O.V.4
-
10
-
-
84906789612
-
Idle port scanning and non-interference analysis of network protocol stacks using model checking
-
Berkeley, USA
-
Roya Ensafi, Jong Chun Park, Deepak Kapur, and Jedidiah R. Crandall, "Idle port scanning and non-interference analysis of network protocol stacks using model checking," in Proceedings of the 19th USENIX conference on Security, pp. 1-17, Berkeley, USA, 2010.
-
(2010)
Proceedings of the 19th USENIX conference on Security
, pp. 1-17
-
-
Ensafi, R.1
Park, J.C.2
Kapur, D.3
Crandall, J.R.4
-
11
-
-
67650339498
-
Detecting scanners: Empirical assessment on 3g network
-
September
-
Vincenzo Falletta and Fabio Ricciato, "Detecting scanners: Empirical assessment on 3g network," International Journal of Network Security, vol. 9, pp. 143-155, September 2009.
-
(2009)
International Journal of Network Security
, vol.9
, pp. 143-155
-
-
Falletta, V.1
Ricciato, F.2
-
12
-
-
69349097375
-
-
PhD thesis, Dalhousie University, Halifax, Nova Scotia, February
-
Carrie Gates. Co-ordinated Port Scans: A Model, A Detector and An Evaluation Methodology. PhD thesis, Dalhousie University, Halifax, Nova Scotia, February 2006.
-
(2006)
Co-ordinated Port Scans: A Model, A Detector and An Evaluation Methodology
-
-
Gates, C.1
-
13
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
January
-
Shi Jinn Horng, Ming Yang Su, Yuan Hsin Chen, Tzong Wann Kao, Rong Jian Chen, Jui Lin Lai, and Citra Dwi Perkasa, "A novel intrusion detection system based on hierarchical clustering and support vector machines," Expert Systems with Applications, vol. 38, pp. 306-313, January 2011.
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 306-313
-
-
Horng, S.J.1
Su, M.Y.2
Chen, Y.H.3
Kao, T.W.4
Chen, R.J.5
Lai, J.L.6
Perkasa, C.D.7
-
14
-
-
84872777701
-
Distributed information gathering
-
hybrid@hotmail.com Article 9
-
hybrid@hotmail.com, "Distributed information gathering," Phrack Magazine, Article 9, vol. 9, no. 55, 1999.
-
(1999)
Phrack Magazine
, vol.9
, Issue.55
-
-
-
15
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, May
-
Jaeyeon Jung, Vern Paxson, Arthur W Berger, and Hari Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 2004
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
16
-
-
84872800853
-
-
KDDCUP99. Winning strategy in kdd99 October 28
-
KDDCUP99. "Winning strategy in kdd99,". http://kdd.ics.uci.edu/databases/kddcup99/ kdd-cup99.html, October 28 1999.
-
(1999)
-
-
-
17
-
-
84872776077
-
A method for locating digital evidences with outlier de-tection using support vector machine
-
May
-
Zaiqiang Liu, Dongdai Lin, and Fengdeng Guo, "A method for locating digital evidences with outlier de-tection using support vector machine," International Journal of Network Security, vol. 6, pp. 301-308, May 2008.
-
(2008)
International Journal of Network Security
, vol.6
, pp. 301-308
-
-
Liu, Z.1
Lin, D.2
Guo, F.3
-
18
-
-
84872805805
-
-
Internet security. Wright State University
-
Prabhaker Mateti. "Internet security,". http://www.cs.wright.edu/pmateti/Internet-Security/Lectures/Probing/inde x.html. Wright State University.
-
-
-
Mateti, P.1
-
19
-
-
84858179622
-
Differential epidemic model of virus and worms in computer network
-
May
-
Bimal Kumar Mishra and Gholam Mursalin Ansari, "Differential epidemic model of virus and worms in computer network," International Journal of Net-work Security, vol. 14, pp. 149-155, May 2012.
-
(2012)
International Journal of Net-work Security
, vol.14
, pp. 149-155
-
-
Mishra, B.K.1
Ansari, G.M.2
-
20
-
-
84878080825
-
An efficient reference-based approach to outlier detection in large datasets
-
Washington, USA, IEEE CS
-
Yaling Pei, Osmar R Zaiane, and Yong Gao, "An efficient reference-based approach to outlier detection in large datasets," in Proceedings of the Sixth Inter-national Conference on Data Mining, pp. 478-487, Washington, USA, 2006. IEEE CS.
-
(2006)
Proceedings of the Sixth Inter-national Conference on Data Mining
, pp. 478-487
-
-
Pei, Y.1
Zaiane, O.R.2
Gao, Y.3
-
21
-
-
51349120553
-
A novel out-lier detection scheme for network intrusion detec-tion systems
-
Washington, USA, IEEE CS
-
Komsit Prakobphol and Justin Zhan, "A novel out-lier detection scheme for network intrusion detec-tion systems," in Proceedings of the International Conference on Information Security and Assurance, pp. 555-560, Washington, USA, 2008. IEEE CS.
-
(2008)
Proceedings of the International Conference on Information Security and Assurance
, pp. 555-560
-
-
Prakobphol, K.1
Zhan, J.2
-
22
-
-
84942250809
-
Surveillance detection in high band-width environments
-
April
-
Seth Robertson, Eric V Siegel, Matt Miller, and Sal-vatore J Stolfo, "Surveillance detection in high band-width environments," in Proceedings of the DARPA DISCEX III Conference, pp. 130-139, Washington, April 2003.
-
(2003)
Proceedings of the DARPA DISCEX III Conference Washington
, pp. 130-139
-
-
Robertson, S.1
Siegel, E.V.2
Miller, M.3
Stolfo, S.J.4
-
23
-
-
0003851399
-
-
New York, USA: John Wiley & Sons, 2nd edition
-
Bruce Schneier, Applied cryptography : protocols, al-gorithms, and source code in C. New York, USA: John Wiley & Sons, 2nd edition, 1995.
-
(1995)
Applied cryptography : protocols, al-gorithms, and source code in C
-
-
Schneier, B.1
-
24
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
conjunction with ICDM'03
-
M L Shyu, S C Chen, K Sarinnapakorn, and L Chang, "A novel anomaly detection scheme based on principal component classifier," in Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with ICDM'03, pp. 171-179, 2003.
-
(2003)
Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop
, pp. 171-179
-
-
Shyu, M.L.1
Chen, S.C.2
Sarinnapakorn, K.3
Chang, L.4
-
27
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
California, USA, June
-
Vinod Yegneswaran, Paul Barford, and Johannes Ullrich, "Internet intrusions: Global characteristics and prevalence," in Proceedings of the ACM Joint International Conference on Measurement and Mod-eling of Computer Systems, pp. 138-147, California, USA, June 2003.
-
(2003)
Proceedings of the ACM Joint International Conference on Measurement and Mod-eling of Computer Systems
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, J.3
-
30
-
-
78049530653
-
An observation-centric analysis on the modeling of anomaly-based intrusion detection
-
May
-
Zonghua Zhang, Hong Shen, and Yingpeng Sang, "An observation-centric analysis on the modeling of anomaly-based intrusion detection," International Journal of Network Security, vol. 4, pp. 292-305, May 2007.
-
(2007)
International Journal of Network Security
, vol.4
, pp. 292-305
-
-
Zhang, Z.1
Shen, H.2
Sang, Y.3
|