-
5
-
-
0035478854
-
Random forests
-
L. Breiman Random forests Machine Learning 45 1 2001 5 32
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
6
-
-
84866485165
-
Policy-enhanced ANFIS model to counter SOAP-related attacks
-
Chan GY, Lee CS, Heng SH. Policy-enhanced ANFIS model to counter SOAP-related attacks. knowledge-based systems 2012;35:64-76
-
(2012)
Knowledge-based Systems
, vol.35
, pp. 64-76
-
-
Chan, G.Y.1
Lee, C.S.2
Heng, S.H.3
-
7
-
-
0037395289
-
Fuzzy association rules: General model and applications
-
M. Delgado, N. Marin, D. Sanchez, and M.A. Vila Fuzzy association rules: general model and applications IEEE Transactions on Fuzzy Systems 11 2 2003 214 225
-
(2003)
IEEE Transactions on Fuzzy Systems
, vol.11
, Issue.2
, pp. 214-225
-
-
Delgado, M.1
Marin, N.2
Sanchez, D.3
Vila, M.A.4
-
12
-
-
84964411176
-
Real time data mining-based intrusion detection
-
Lee W, Stolfo SJ, Philip K, Chan PK, Eskin E, Fan W, et al. Real time data mining-based intrusion detection. In: Proceedings of the DARPA information survivability conference and exposition II (DISCEX); 2001. p. 89-100.
-
(2001)
Proceedings of the DARPA Information Survivability Conference and Exposition II (DISCEX)
, pp. 89-100
-
-
Lee, W.1
Stolfo, S.J.2
Philip, K.3
Chan, P.K.4
Eskin, E.5
Fan, W.6
-
13
-
-
78249253017
-
On challenges in evaluating malware clustering
-
LNCS 6307
-
Li P, Liu L, Gao D, Reiter MK. On challenges in evaluating malware clustering. In: 13th international symposium on recent advances in intrusion detection, (RAID), LNCS 6307; 2010. p. 238-55.
-
(2010)
13th International Symposium on Recent Advances in Intrusion Detection, (RAID)
, pp. 238-255
-
-
Li, P.1
Liu, L.2
Gao, D.3
Reiter, M.K.4
-
14
-
-
33845548325
-
Attacking and defending web services
-
Lindstrom P. Attacking and defending web services. A spire research report. Available from: 〈http://www.forumsys.com/resources/resources/ whitepapers/Attacking-and-Defending-WS.pdf〉; 2004.
-
(2004)
A Spire Research Report
-
-
Lindstrom, P.1
-
16
-
-
84900537680
-
An intrusion-detection model based on fuzzy class- association-rule mining using genetic network programming
-
S. Mabu, C. Chen, N. Lu, and K. Shimada An intrusion-detection model based on fuzzy class- association-rule mining using genetic network programming IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews 41 1 2011 130 139
-
(2011)
IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews
, vol.41
, Issue.1
, pp. 130-139
-
-
Mabu, S.1
Chen, C.2
Lu, N.3
Shimada, K.4
-
17
-
-
33750512162
-
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
-
T. Ozyer, R. Alhajj, and K. Barker Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening Journal of Network and Computer Applications 30 1 2007 99 113
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 99-113
-
-
Ozyer, T.1
Alhajj, R.2
Barker, K.3
-
18
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
S. Peddabachigari, A. Abraham, C. Grosan, and J. Thomas Modeling intrusion detection system using hybrid intelligent systems Journal of Network and Computer Applications 30 1 2007 114 132
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
19
-
-
79151480916
-
S-MAS: An adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within web services environments
-
C.I. Pinzón, J. Bajo, J.F. De Paz, and J.M. Corchado S-MAS: an adaptive hierarchical distributed multi-agent architecture for blocking malicious SOAP messages within web services environments Expert Systems with Applications 38 2011 5486 5499
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 5486-5499
-
-
Pinzón, C.I.1
Bajo, J.2
De Paz, J.F.3
Corchado, J.M.4
-
20
-
-
79952059044
-
Misuse detection using hybrid of association rule mining and connectionist modeling
-
[special Issue of Computer and IT]
-
M. Sheikhan, and Z. Jadidi Misuse detection using hybrid of association rule mining and connectionist modeling World Applied Sciences Journal 7 2009 31 37 [special Issue of Computer and IT]
-
(2009)
World Applied Sciences Journal
, vol.7
, pp. 31-37
-
-
Sheikhan, M.1
Jadidi, Z.2
-
21
-
-
84861522257
-
Misuse detection based on feature selection by fuzzy association rule mining
-
[special Issue of Computer and Electrical Engineering]
-
M. Sheikhan, and M.S. Rad Misuse detection based on feature selection by fuzzy association rule mining World Applied Sciences Journal 10 2010 32 40 [special Issue of Computer and Electrical Engineering]
-
(2010)
World Applied Sciences Journal
, vol.10
, pp. 32-40
-
-
Sheikhan, M.1
Rad, M.S.2
-
22
-
-
79251595062
-
Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification
-
M.Y. Su Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification Journal of Network and Computer Applications 34 2 2011 722 730
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.2
, pp. 722-730
-
-
Su, M.Y.1
-
28
-
-
84874705082
-
-
Downloaded in December
-
WEKA software weka-3-6-4jre.exe. 〈http://www.cs.waikato.ac.nz/ml/ weka/〉. Downloaded in December 2010.
-
(2010)
WEKA Software weka-3-6-4jre.exe
-
-
-
30
-
-
77954348690
-
Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list
-
Y. Ye, T. Li, K. Huang, Q. Jiang, and Y. Chen Hierarchical associative classifier (HAC) for malware detection from the large and imbalanced gray list Journal of Intelligent Information Systems 35 1 2010 1 20
-
(2010)
Journal of Intelligent Information Systems
, vol.35
, Issue.1
, pp. 1-20
-
-
Ye, Y.1
Li, T.2
Huang, K.3
Jiang, Q.4
Chen, Y.5
-
32
-
-
50649094035
-
Random-forests-based network intrusion detection systems
-
J. Zhang, M. Zulkernine, and A. Haque Random-forests-based network intrusion detection systems IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews 38 5 2008 649 659
-
(2008)
IEEE Transactions on Systems, Man and Cybernetics Part C: Applications and Reviews
, vol.38
, Issue.5
, pp. 649-659
-
-
Zhang, J.1
Zulkernine, M.2
Haque, A.3
-
34
-
-
84874701763
-
-
wsKnight. Downloaded in July 2008
-
wsKnight. 〈http://net-square.com/wschess/index.html〉. Downloaded in July 2008.
-
-
-
|