-
1
-
-
84879874093
-
-
SANS InstituteInfoSec Reading Room
-
SANS InstituteInfoSec Reading Room. http://www.sans.org/readingroom/ whitepapers/detection/understanding-intrusion-detection-systems337.
-
-
-
-
2
-
-
0026850007
-
A neural network component for an intrusion detection system
-
Herv'e Debar, Monique Becke, Didier Siboni, "A Neural Network Component for an Intrusion detection system," Proceedings of the IEEE Symposium on Research in Security and Privacy, pp. 240-250,1992.
-
(1992)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 240-250
-
-
Debar, H.1
Becke, M.2
Siboni, D.3
-
3
-
-
17444432965
-
Hierarchical kohonenen net for anomaly detection in network security
-
Suseela T. Sarasamma, Qiuming A. Zhu, Julie Huff, "Hierarchical Kohonenen Net for Anomaly Detection in Network Security," IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics, vol. 35(2), 2005.
-
(2005)
IEEE Transactions on Systems, Man and Cybernetics-Part B: Cybernetics
, vol.35
, Issue.2
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
4
-
-
84898944587
-
Intrusion detection with neural networks
-
MIT Press
-
J. Ryan, M. Lin, R. Mikkulainen, "Intrusion Detection with Neural Networks," Advances in Neural Information Processing Systems, vol. 10, 1998, MIT Press.
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
-
-
Ryan, J.1
Lin, M.2
Mikkulainen, R.3
-
5
-
-
0013404957
-
Improving intrusion detection performance using keyword selection and neural networks
-
West Lafayette, Indiana, Sept
-
R. Lippmann, R. Cunningham, "Improving Intrusion Detection Performance using Keyword Selection and Neural Networks," RAID Proceedings, West Lafayette, Indiana, Sept 1999.
-
(1999)
RAID Proceedings
-
-
Lippmann, R.1
Cunningham, R.2
-
7
-
-
49849084469
-
Feasible intrusion detector for recognizing iis attacks based on neural networks
-
Shi-Jinn Horng, Pingzhi Fan, Yao-Ping Chou, Yen-Cheng Chang and Yi Pan, "Feasible Intrusion Detector for Recognizing IIS Attacks Based on Neural Networks," Computer & Security, vol.27, pp. 84-100, 2008.
-
(2008)
Computer & Security
, vol.27
, pp. 84-100
-
-
Horng, S.-J.1
Fan, P.2
Chou, Y.-P.3
Chang, Y.-C.4
Pan, Y.5
-
8
-
-
76349121064
-
Application of artificial neural network in detection of probing attacks
-
Iftikhar Ahmad, Azween B Abdullah,Abdullah S Alghamdi, "Application of Artificial Neural Network in Detection of Probing Attacks," IEEE Symposium on Industrial Electronics and Applications, pp. 557-562, 2009.
-
(2009)
IEEE Symposium on Industrial Electronics and Applications
, pp. 557-562
-
-
Ahmad, I.1
Abdullah, A.B.2
Alghamdi, A.S.3
-
9
-
-
84857495697
-
Back propagation neuralnetwork approach to intrusion detection system
-
I Mukhopadhyay, M Chakraborty, S Chakrabarti, T Chatterjee,"Back Propagation NeuralNetwork Approach to Intrusion Detection System," International Conference on Recent Trends in Information Systems, 2011.
-
(2011)
International Conference on Recent Trends in Information Systems
-
-
Mukhopadhyay, I.1
Chakraborty, M.2
Chakrabarti, S.3
Chatterjee, T.4
-
10
-
-
12144288329
-
Is combining classifiers better than selecting the best one
-
Saso Dzeroski, Bernard Zenko, "Is Combining Classifiers Better than Selecting the Best One," Machine Learning vol. 54(3), pp. 255-273, 2004.
-
(2004)
Machine Learning
, vol.54
, Issue.3
, pp. 255-273
-
-
Dzeroski, S.1
Zenko, B.2
-
11
-
-
0030736561
-
Combinations of weak classifiers
-
Chuanyi Ji, Sheng Ma, "Combinations of Weak Classifiers," IEEE Transactions on Neural Networks, vol.8(1), pp. 32-42,1997.
-
(1997)
IEEE Transactions on Neural Networks
, vol.8
, Issue.1
, pp. 32-42
-
-
Ji, C.1
Ma, S.2
-
12
-
-
2942640996
-
Data mining for network intrusion detection
-
Paul Dokas, Levent Ertoz, Vipin Kumar, Aleksandar Lazarevic, Jaideep Srivastava, Pang-Ning Tan, "Data Mining for Network Intrusion Detection," Proceedings of the NSF Workshop on Next Generation Data Mining, pp. 21-30, 2002.
-
(2002)
Proceedings of the NSF Workshop on Next Generation Data Mining
, pp. 21-30
-
-
Dokas, P.1
Ertoz, L.2
Kumar, V.3
Lazarevic, A.4
Srivastava, J.5
Tan, P.6
-
13
-
-
0032676506
-
A data mining framework for building intrusion detection model
-
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok, "A Data Mining Framework for Building Intrusion Detection Model," Proceedings of the IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
14
-
-
34848834802
-
Distributed intrusion detection framework based on mobile agents
-
Dalila Boughaci, Habiba Drias, Ahmed Bendib, Youcef Bouznit, Belaid Benhamou, "Distributed Intrusion Detection Framework Based on Mobile Agents," Proceedings of IEEE International Conference on Dependability of Computer Systems, pp. 248-255, 2006.
-
(2006)
Proceedings of IEEE International Conference on Dependability of Computer Systems
, pp. 248-255
-
-
Boughaci, D.1
Drias, H.2
Bendib, A.3
Bouznit, Y.4
Benhamou, B.5
-
15
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
Jai Sundar Balasubramaniyan, Jose Omar Garcia-Fernandez, David Isacoff, Eugene H. Spafford,Diego Zamboni, "An Architecture for Intrusion Detection Using Autonomous Agents," Proceeding of IEEE 14th Annual Computer Security Applications Conference, pp. 13-24, 1998.
-
(1998)
Proceeding of IEEE 14th Annual Computer Security Applications Conference
, pp. 13-24
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.H.4
Zamboni, D.5
-
16
-
-
76949091527
-
Layered approach using conditional random field for intrusion detection
-
March
-
Kapil Kumar Gupta, Baikunth Nath, Ramamohanarao Kotagiri, "Layered Approach Using Conditional Random Field for Intrusion Detection," IEEE Transactions on Dependable and Secure Computing, vol. 7(1), pp. 35-49, March,2010.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.1
, pp. 35-49
-
-
Gupta, K.K.1
Nath, B.2
Kotagiri, R.3
-
17
-
-
15944386957
-
Dimension reduction using feature extraction methods for real-time misuse detection systems
-
June
-
Gopi K. Kuchimanchi, Vir V. Phoha, Kiran S. Balagani, Shekhar R. Gaddam,"Dimension Reduction Using Feature Extraction Methods for Real-time Misuse Detection Systems," Proceedings of the 2004 IEEE Workshop on Information Assurance and Security, June 2004.
-
(2004)
Proceedings of the 2004 IEEE Workshop on Information Assurance and Security
-
-
Kuchimanchi, G.K.1
Phoha, V.V.2
Balagani, K.S.3
Gaddam, S.R.4
-
18
-
-
84879870913
-
-
KDD Cup 1999 Intrusion Detection Data. (accessed on 20-01-2011)
-
KDD Cup 1999 Intrusion Detection Data. http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html(accessed on 20-01-2011).
-
-
-
|