-
1
-
-
33750520151
-
D-SCIDS: Distributed soft computing intrusion detection system
-
A. Abraham, R. Jain, J. Thomas, S.Y. Han, D-SCIDS: distributed soft computing intrusion detection system, Journal of Network and Computer Applications (2007) 81-98.
-
(2007)
Journal of Network and Computer Applications
, pp. 81-98
-
-
Abraham, A.1
Jain, R.2
Thomas, J.3
Han, S.Y.4
-
2
-
-
85149612939
-
Fast effective rule induction
-
Morgan Kaufmann, San Mateo, CA
-
W.W. Cohen, Fast effective rule induction, in: Proceedings of 12th International Conference on Machine Learning (Lake Tahoe, CA), Morgan Kaufmann, San Mateo, CA, 1995.
-
(1995)
Proceedings of 12th International Conference on Machine Learning (Lake Tahoe, CA)
-
-
Cohen, W.W.1
-
3
-
-
84941079784
-
A new approach to intrusion detection using artificial neural networks and fuzzy clustering
-
G. Wang, J. Hao, J. Ma, L. Huang, A new approach to intrusion detection using artificial neural networks and fuzzy clustering, Expert Systems with Applications 37 (9) (2010)6225-6232.
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.9
, pp. 6225-6232
-
-
Wang, G.1
Hao, J.2
Ma, J.3
Huang, L.4
-
4
-
-
80052472204
-
Efficient context-free grammar intrusion detection system, international journal of innovative computing
-
August
-
G. Gowrison, K. Ramar, K. Muneeswaran, T. Revathi, Efficient context-free grammar intrusion detection system, international journal of innovative computing, Information and Control 7 (August (8)) (2011) 4779-4788.
-
(2011)
Information and Control
, vol.7
, Issue.8
, pp. 4779-4788
-
-
Gowrison, G.1
Ramar, K.2
Muneeswaran, K.3
Revathi, T.4
-
5
-
-
84863152041
-
Adaptive distributed intrusion detection using parametric model
-
J. Gao, W. Hu, X. Zhang, X. Li, Adaptive distributed intrusion detection using parametric model, in: Proc. ofIEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2009, pp. 675-678.
-
(2009)
Proc. OfIEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, pp. 675-678
-
-
Gao, J.1
Hu, W.2
Zhang, X.3
Li, X.4
-
6
-
-
76949091527
-
Layered approach using conditional random fields for intrusion detection
-
K.K. Gupta, B. Nath, R. Kotagiri, Layered approach using conditional random fields for intrusion detection, IEEE Transactions on Dependable and Secure Computing 7 (1) (2010)35-49.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.1
, pp. 35-49
-
-
Gupta, K.K.1
Nath, B.2
Kotagiri, R.3
-
8
-
-
77955847605
-
Toward credible evaluation of anomaly-based intrusion-detection methods
-
M. Tavallaee, N. Stakhanova, A.A. Ghorbani, Toward credible evaluation of anomaly-based intrusion-detection methods, IEEE Transactions on Systems Man, and Cybernetics-Part C: Applications and Reviews 40 (5) (2010) 516-524.
-
(2010)
IEEE Transactions on Systems Man, and Cybernetics-Part C: Applications and Reviews
, vol.40
, Issue.5
, pp. 516-524
-
-
Tavallaee, M.1
Stakhanova, N.2
Ghorbani, A.A.3
-
9
-
-
1642418529
-
KDD feature set complaint heuristic rules for R2Lattack detection
-
M. Sabhnani, G. Serpen, KDD feature set complaint heuristic rules for R2Lattack detection, in: Proc. of the International Conference on Security and Management (SAM'03), vol. 1, 2003, pp. 310-316.
-
(2003)
Proc. Of The International Conference on Security and Management (SAM'03)
, vol.1
, pp. 310-316
-
-
Sabhnani, M.1
Serpen, G.2
-
10
-
-
70449353683
-
Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree
-
N.B. Anuar, H. Sallehudin, A. Gani, O. Zakari, Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree, Malaysian Journal of Computer Science 21 (2) (2008) 101-105.
-
(2008)
Malaysian Journal of Computer Science
, vol.21
, Issue.2
, pp. 101-105
-
-
Anuar, N.B.1
Sallehudin, H.2
Gani, A.3
Zakari, O.4
-
11
-
-
77952536808
-
-
University Press, USA
-
R. Kohavi, R. Quinlan, Decision Tree Discovery, Handbook of Data Mining and Knowledge Discovery, University Press, USA, 1999, pp. 267-276.
-
(1999)
Decision Tree Discovery, Handbook of Data Mining and Knowledge Discovery
, pp. 267-276
-
-
Kohavi, R.1
Quinlan, R.2
-
12
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
S-.J. Horng, M-.Y. Su, Y-.H. Chen, T-.W. Kao, R-.J. Chen, J-.L. Lai, CD. Perkasa, A novel intrusion detection system based on hierarchical clustering and support vector machines, Expert Systems with Applications 38 (1) (2010) 175-183.
-
(2010)
Expert Systems with Applications
, vol.38
, Issue.1
, pp. 175-183
-
-
Horng, S.J.1
Su, M.2
Chen, Y.H.3
Kao, T.W.4
Chen, R.J.5
Lai, J.L.6
Perkasa, C.D.7
-
13
-
-
84900537680
-
An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming
-
S. Mabu, et al., An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming, IEEE Transactions on Systems, Man, and Cybernetics-Part C41 (1) (2011) 130-139.
-
(2011)
IEEE Transactions on Systems, Man, and Cybernetics-Part C
, vol.41
, Issue.1
, pp. 130-139
-
-
Mabu, S.1
-
14
-
-
34548260327
-
A three-tier IDS via data mining approach
-
T.S. Hwang, T.-J. Lee, Y.-J. Lee, A three-tier IDS via data mining approach, in: Proceeding of ACM Conference MineNet'07, 2007, pp. 1-6.
-
(2007)
Proceeding of ACM Conference MineNet'07
, pp. 1-6
-
-
Hwang, T.S.1
Lee, T.-J.2
Lee, Y.-J.3
-
16
-
-
41749107387
-
AdaBoost-based algorithm for network intrusion detection
-
W. Hu, W. Hu, S. Maybank, AdaBoost-based algorithm for network intrusion detection, IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics 38 (2)(2008)577-583.
-
(2008)
IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics
, vol.38
, Issue.2
, pp. 577-583
-
-
Hu, W.1
Hu, W.2
Maybank, S.3
-
17
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee, L.J. Stolfo, A framework for constructing features and models for intrusion detection systems, ACM Transactions on Information and System Security 3 (4) (2000) 227-261.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, L.J.2
-
18
-
-
84940104123
-
Data mining framework for building intrusion detection models
-
W. Lee, J.S. Stolfo, K.W. Mok, Data mining framework for building intrusion detection models, in: Proc. of IEEE Symposium on Security and Privacy, 1999, pp. 220-225.
-
(1999)
Proc. Of IEEE Symposium on Security and Privacy
, pp. 220-225
-
-
Lee, W.1
Stolfo, J.S.2
Mok, K.W.3
-
19
-
-
33745937896
-
A study of AdaBoost with SVM based weak learners
-
Montreal, Canada, July 31-August 4
-
X. Li, L. Wang, E. Sung, A study of AdaBoost with SVM based weak learners, in: Proceedings of International Joint Conference on Neural Networks, Montreal, Canada, July 31-August 4, 2005, pp. 196-201.
-
(2005)
Proceedings of International Joint Conference on Neural Networks
, pp. 196-201
-
-
Li, X.1
Wang, L.2
Sung, E.3
-
20
-
-
60649089977
-
Attack grammar: A new approach to modeling and analyzing network attack sequences
-
Y. Zhang, X. Fan, Y. Wang, Z. Xue, Attack grammar: a new approach to modeling and analyzing network attack sequences, in: Annual Computer Security Applications Conference (ACSAC08), 2008, pp. 215-224.
-
(2008)
Annual Computer Security Applications Conference (ACSAC08)
, pp. 215-224
-
-
Zhang, Y.1
Fan, X.2
Wang, Y.3
Xue, Z.4
-
21
-
-
82155167665
-
Distributed intrusion detection system in a multi-layer network architecture of smart grids
-
Y. Zhang, et al., Distributed intrusion detection system in a multi-layer network architecture of smart grids, IEEE Transactions on Smart Grid 2 (4) (2011) 796-808.
-
(2011)
IEEE Transactions on Smart Grid
, vol.2
, Issue.4
, pp. 796-808
-
-
Zhang, Y.1
|