-
1
-
-
19544387383
-
A target centric ontology for intrusion detection: Using DAML+OIL to classify intrusive behaviors
-
Cambridge University Press, Cambridge
-
Undercoffer, J., Finin, T., Joshi, A., Pinkston, J.: A target centric ontology for intrusion detection: using DAML+OIL to classify intrusive behaviors. In: Knowledge Engineering Review - Special Issue on Ontologies for Distributed Systems, pp. 2-22. Cambridge University Press, Cambridge (2005)
-
(2005)
Knowledge Engineering Review - Special issue on Ontologies for Distributed Systems
, pp. 2-22
-
-
Undercoffer, J.1
Finin, T.2
Joshi, A.3
Pinkston, J.4
-
2
-
-
33746519172
-
An ontology-based multiagent approach to outbound intrusion detection
-
Mandujano, S., Galvan, A., Nolazco, J.: An ontology-based multiagent approach to outbound intrusion detection. In: The 3rd ACS/IEEE International Conference on Computer Systems and Applications, p. 94 (2005)
-
(2005)
The 3rd ACS/IEEE International Conference on Computer Systems and Applications
, pp. 94
-
-
Mandujano, S.1
Galvan, A.2
Nolazco, J.3
-
3
-
-
0242371001
-
Security for DAML web services: Annotation and matchmaking
-
Fensel, D., Sycara, K., Mylopoulos, J. (eds.) LNCS Springer, Heidelberg
-
Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.: Security for DAML web services: Annotation and matchmaking. In: Fensel, D., Sycara, K., Mylopoulos, J. (eds.) ISWC 2003. LNCS, Vol. 2870, pp. 335-350. Springer, Heidelberg (2003)
-
(2003)
ISWC 2003
, vol.2870
, pp. 335-350
-
-
Denker, G.1
Kagal, L.2
Finin, T.W.3
Paolucci, M.4
Sycara, K.5
-
4
-
-
24344493979
-
CIDS: An agent-based intrusion detection system
-
Dasgupta, D., Gonzalez, F., Yallapu, K., Gomez, J., et al.: CIDS: An agent-based intrusion detection system. Computer and Security: Science Direct 24(5), 387-398 (2005)
-
(2005)
Computer and Security: Science Direct
, vol.24
, Issue.5
, pp. 387-398
-
-
Dasgupta, D.1
Gonzalez, F.2
Yallapu, K.3
Gomez, J.4
-
5
-
-
79960683222
-
-
Springer, Heidelberg
-
Herrero, A., Corchado, E., Pellicer, M., Abraham, A.: Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization in Innovations in Hybrid Intelligent Systems, pp. 320-328. Springer, Heidelberg (2008)
-
(2008)
Hybrid Multi Agent-Neural Network Intrusion Detection with Mobile Visualization in Innovations in Hybrid Intelligent Systems
, pp. 320-328
-
-
Herrero, A.1
Corchado, E.2
Pellicer, M.3
Abraham, A.4
-
6
-
-
50149093146
-
Neural network ensembles for intrusion detection
-
IDAACS 2007
-
Golovko, V., Kachurka, P., Vaitsekhovich, L.: Neural Network Ensembles for Intrusion Detection. In: 4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications. IDAACS 2007, pp. 578-583 (2007)
-
(2007)
4th IEEE Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
, pp. 578-583
-
-
Golovko, V.1
Kachurka, P.2
Vaitsekhovich, L.3
-
7
-
-
33745163595
-
Learning intrusion detection: Supervised or unsupervised?
-
Cagliari, Italy
-
Laskov, P., Dussel, P., Schafer, C., Rieck, K.: Learning intrusion detection: Supervised or unsupervised? In: 13th International Conference on Image Analysis and Processing-ICIAP, Cagliari, Italy, pp. . 50-57 (2005)
-
(2005)
13th International Conference on Image Analysis and Processing-ICIAP
, pp. 50-57
-
-
Laskov, P.1
Dussel, P.2
Schafer, C.3
Rieck, K.4
-
8
-
-
84893946320
-
Unsupervised SVM based on p-kernels for anomaly detection
-
IEEE Computer Society, Los Alamitos
-
Li, K., Teng, G.: Unsupervised SVM Based on p-kernels for Anomaly Detection. In: Proceedings of the First International Conference on Innovative Computing, Information and Control, Vol. 2. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
Proceedings of the First International Conference on Innovative Computing, Information and Control
, vol.2
-
-
Li, K.1
Teng, G.2
-
9
-
-
67649764420
-
Combined data mining approach for intrusion detection
-
Barcelona, Spain
-
Zurutuza, U., Uribeetxeberria, R., Azketa, E., Gil, G., et al.: Combined Data Mining Approach for Intrusion Detection. In: International Conference on Security and Criptography, Barcelona, Spain (2008)
-
(2008)
International Conference on Security and Criptography
-
-
Zurutuza, U.1
Uribeetxeberria, R.2
Azketa, E.3
Gil, G.4
-
11
-
-
33644860127
-
-
Elsevier Science Inc., Amsterdam
-
Jiang, S., Song, X., Wang, H., Han, J., et al.: A clustering-based method for unsupervised intrusion detections, pp. 802-810. Elsevier Science Inc., Amsterdam (2006)
-
(2006)
A Clustering-based Method for Unsupervised Intrusion Detections
, pp. 802-810
-
-
Jiang, S.1
Song, X.2
Wang, H.3
Han, J.4
-
13
-
-
77951118139
-
OWL: A description logic based ontology language for the semantic web
-
Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.) 2nd edn. Cambridge University Press, Cambridge
-
Horrocks, I., Patel-Schneider, P., McGuinness, D.: OWL: a Description Logic Based Ontology Language for the Semantic Web. In: Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.) The Description Logic Handbook: Theory, Implementation and Applications, 2nd edn., pp. 458-486. Cambridge University Press, Cambridge (2007)
-
(2007)
The Description Logic Handbook: Theory, Implementation and Applications
, pp. 458-486
-
-
Horrocks, I.1
Patel-Schneider, P.2
McGuinness, D.3
-
14
-
-
77649256473
-
Building legal ontologies with METHONTOLOGY and webODE
-
Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A. (eds.) LNCS (LNAI) Springer, Heidelberg
-
Corcho, Ó., Fernández-López, M., Gómez-Pérez, A., López-Cima, A.: Building legal ontologies with METHONTOLOGY and webODE. In: Benjamins, V.R., Casanovas, P., Breuker, J., Gangemi, A. (eds.) Law and the Semantic Web. LNCS (LNAI), Vol. 3369, pp. 142-157. Springer, Heidelberg (2005)
-
(2005)
Law and the Semantic Web
, vol.3369
, pp. 142-157
-
-
Corcho, O.1
Fernández-López, M.2
Gómez-Pérez, A.3
López-Cima, A.4
-
15
-
-
84885971220
-
DARPA intrusion detection evaluation
-
DARPA LINCOLN LABORATORY Massachusetts Institute of Technology. Consulted
-
DARPA. DARPA Intrusion Detection Evaluation, The, DARPA off-line intrusion detection evaluation. LINCOLN LABORATORY Massachusetts Institute of Technology. Consulted (2008), http://www.ll.mit.edu/IST/ideval/data/1999/1999- data-index.html (1999)
-
(1999)
The, DARPA Off-line Intrusion Detection Evaluation
-
-
-
16
-
-
85006340454
-
An intrusion detection and prevention model based on intelligent multi-agent systems, signatures and reaction rules ontologies in advances in intelligence and soft computing
-
Demazeau, Y., et al. (eds.) Springer, Heidelberg
-
Isaza, G., Castillo, A., Duque, N.: An Intrusion Detection and Prevention Model Based on Intelligent Multi-Agent Systems, Signatures and Reaction Rules Ontologies in Advances in Intelligence and Soft Computing. In: Demazeau, Y., et al. (eds.) PAAMS 2009, pp. 237-245. Springer, Heidelberg (2009)
-
(2009)
PAAMS 2009
, pp. 237-245
-
-
Isaza, G.1
Castillo, A.2
Duque, N.3
|