-
2
-
-
84883107604
-
-
Rapid 7 Inc, accessed 24 Apr 12
-
Rapid 7 Inc, Metasploit penetration testing software, Available www. metasploit. com, accessed 24 Apr 12 (2012), URL www. metasploit. com
-
(2012)
Metasploit Penetration Testing Software
-
-
-
3
-
-
33847743856
-
-
ISSN 1545-5971
-
K. Hwang, M. Cai, Y. Chen, and M. Qin, Dependable and Secure Computing, IEEE Transactions on 4, 41-55 (2007), ISSN 1545-5971
-
(2007)
Dependable and Secure Computing, IEEE Transactions on
, vol.4
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
4
-
-
69349096427
-
Virtual inline: A technique of combining ids and ips together in response intrusion
-
Z. Wu, D. Xiao, H. Xu, X. Peng, and X. Zhuang, "Virtual Inline: A Technique of Combining IDS and IPS Together in Response Intrusion," in Education Technology and Computer Science, 2009. ETCS '09. First International Workshop on, 2009, vol. 1, pp. 1118-1121
-
(2009)
Education Technology and Computer Science 2009. ETCS '09. First International Workshop on
, vol.1
, pp. 1118-1121
-
-
Wu, Z.1
Xiao, D.2
Xu, H.3
Peng, X.4
Zhuang, X.5
-
5
-
-
70350724834
-
Research and implementation on snort-based hybrid intrusion detection system
-
Y.-X. Ding, M. Xiao, and A.-W. Liu, "Research and implementation on snort-based hybrid intrusion detection system," in Machine Learning and Cybernetics, 2009 International Conference on, 2009, vol. 3, pp. 1414-1418
-
(2009)
Machine Learning and Cybernetics, 2009 International Conference on
, vol.3
, pp. 1414-1418
-
-
Ding, Y.-X.1
Xiao, M.2
Liu, A.-W.3
-
6
-
-
80053024762
-
Improving performance of anomaly-based ids by combining multiple classifiers
-
K. Kishimoto, H. Yamaki, and H. Takakura, "Improving Performance of Anomaly-Based IDS by Combining Multiple Classifiers," in Applications and the Internet (SAINT), 2011 IEEE/IPSJ 11th International Symposium on, 2011, pp. 366-371
-
(2011)
Applications and the Internet (SAINT), 2011 IEEE/IPSJ 11th International Symposium on
, pp. 366-371
-
-
Kishimoto, K.1
Yamaki, H.2
Takakura, H.3
-
9
-
-
78650313678
-
A flexible and efficient alert correlation platform for distributed ids
-
S. Roschke, F. Cheng, and C. Meinel, "A Flexible and Efficient Alert Correlation Platform for Distributed IDS," in Network and System Security (NSS), 2010 4th International Conference on, 2010, pp. 24-31
-
(2010)
Network and System Security (NSS), 2010 4th International Conference on
, pp. 24-31
-
-
Roschke, S.1
Cheng, F.2
Meinel, C.3
-
10
-
-
84857188443
-
Exploit detection techniques for STP using distributed IDS
-
A. Rai, F. Barbhuiya, A. Sur, S. Biswas, S. Chakraborty, and S. Nandi, "Exploit detection techniques for STP using distributed IDS," in Information and Communication Technologies (WICT), 2011 World Congress on, 2011, pp. 939-944
-
(2011)
Information and Communication Technologies (WICT), 2011 World Congress on
, pp. 939-944
-
-
Rai, A.1
Barbhuiya, F.2
Sur, A.3
Biswas, S.4
Chakraborty, S.5
Nandi, S.6
-
11
-
-
83755229749
-
-
ISBN 978-3-642-04116-7 (Print) 978-3-642-04117-4 (Online
-
J. Hu, Host-Based Anomaly IDS, 2010, ISBN 978-3-642-04116-7 (Print) 978-3-642-04117-4 (Online)
-
(2010)
Host-Based Anomaly IDS
-
-
Hu, J.1
-
12
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection using program sequences of system calls
-
ISSN 1531-2216
-
X. D. Hoang, J. Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection using program sequences of system calls," in Networks, 2003. ICON2003. The 11th IEEE International Conference on, 2003, pp. 531-536, ISSN 1531-2216
-
(2003)
Networks 2003. ICON2003. The 11th IEEE International Conference on
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
13
-
-
65249107163
-
-
ISSN 0890-8044
-
J. Hu, X. Yu, D. Qiu, and H.-H. Chen, Network, IEEE 23, 42-47 (2009), ISSN 0890-8044
-
(2009)
Network, IEEE
, vol.23
, pp. 42-47
-
-
Hu, J.1
Yu, X.2
Qiu, D.3
Chen, H.-H.4
-
14
-
-
21644438395
-
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
-
vol. 2, ISSN 1531-2216
-
X. Hoang, and J. Hu, "An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls," in Networks, 2004. (ICON 2004). Proceedings. 12th IEEE International Conference on, 2004, vol. 2, pp. 470-474 vol. 2, ISSN 1531-2216
-
(2004)
Networks 2004. (ICon 2004). Proceedings. 12th IEEE International Conference on
, vol.2
, pp. 470-474
-
-
Hoang, X.1
Hu, J.2
-
15
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection using program sequences of system calls
-
ISSN 1531-2216
-
X. D. Hoang, J. Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection using program sequences of system calls," in Networks, 2003. ICON2003. The 11th IEEE International Conference on, 2003, pp. 531-536, ISSN 1531-2216
-
(2003)
Networks 2003. ICON2003. The 11th IEEE International Conference on
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
16
-
-
33750142740
-
A comparative study of the IDS method and feedforward neural networks
-
M. Murakami, and N. Honda, "A comparative study of the IDS method and feedforward neural networks," in Neural Networks, 2005. IJCNN '05. Proceedings. 2005 IEEE International Joint Conference on, 2005, vol. 3, pp. 1776-1781 vol. 3
-
(2005)
Neural Networks 2005. IJCNN '05. Proceedings. 2005 IEEE International Joint Conference on
, vol.3
, pp. 1776-1781
-
-
Murakami, M.1
Honda, N.2
-
17
-
-
63649099878
-
Training MLP neural network to reduce false alerts in IDS
-
P. Barapatre, N. Tarapore, S. Pukale, and M. Dhore, "Training MLP neural network to reduce false alerts in IDS," in Computing, Communication and Networking, 2008. ICCCn 2008. International Conference on, 2008, pp. 1-7
-
(2008)
Computing, Communication and Networking 2008. ICCCn 2008. International Conference on
, pp. 1-7
-
-
Barapatre, P.1
Tarapore, N.2
Pukale, S.3
Dhore, M.4
-
18
-
-
78651340096
-
An IDS detection algorithm based IBP neural network
-
H. Zhong-Xiang, W. Xiao-Dong, H. Xi-Ming, and D. Tao, "An IDS detection algorithm based IBP neural network," in Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on, 2010, vol. 2, pp. 698-701
-
(2010)
Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on
, vol.2
, pp. 698-701
-
-
Zhong-Xiang, H.1
Xiao-Dong, W.2
Xi-Ming, H.3
Tao, D.4
-
20
-
-
77952766629
-
Comparing single and multiple bayesian classifiers approaches for network intrusion detection
-
K. C. Khor, C. Y. Ting, and S.-P. Amnuaisuk, "Comparing Single and Multiple Bayesian Classifiers Approaches for Network Intrusion Detection," in Computer Engineering and Applications (ICCEA), 2010 Second International Conference on, 2010, vol. 2, pp. 325-329
-
(2010)
Computer Engineering and Applications (ICCEA), 2010 Second International Conference on
, vol.2
, pp. 325-329
-
-
Khor, K.C.1
Ting, C.Y.2
Amnuaisuk, S.-P.3
-
21
-
-
78650105638
-
A hybrid approach for IEEE 802. 11 intrusion detection based on AIS, MAS and naïve Bayes
-
M. Danziger, and F. de Lima Neto, "A hybrid approach for IEEE 802. 11 intrusion detection based on AIS, MAS and naïve Bayes," in Hybrid Intelligent Systems (HIS), 2010 10th International Conference on, 2010, pp. 201-204
-
(2010)
Hybrid Intelligent Systems (HIS), 2010 10th International Conference on
, pp. 201-204
-
-
Danziger, M.1
De Neto Lima, F.2
-
22
-
-
80052996993
-
Intrusion detection based on K-Means clustering and Naive Bayes classification
-
Z. Muda, W. Yassin, M. Sulaiman, and N. Udzir, "Intrusion detection based on K-Means clustering and Naive Bayes classification," in Information Technology in Asia (CITA 11), 2011 7th International Conference on, 2011, pp. 1-6
-
(2011)
Information Technology in Asia (CITA 11 2011 7th International Conference on
, pp. 1-6
-
-
Muda, Z.1
Yassin, W.2
Sulaiman, M.3
Udzir, N.4
-
24
-
-
84880858558
-
Optimized feature selection with k-means clustered triangle SVM for Intrusion Detection
-
R. Ashok, A. Lakshmi, G. Rani, and M. Kumar, "Optimized feature selection with k-means clustered triangle SVM for Intrusion Detection," in Advanced Computing (ICoAC), 2011 Third International Conference on, 2011, pp. 23-27
-
(2011)
Advanced Computing (ICoAC), 2011 Third International Conference on
, pp. 23-27
-
-
Ashok, R.1
Lakshmi, A.2
Rani, G.3
Kumar, M.4
-
25
-
-
10944272650
-
Extreme learning machine: A new learning scheme of feedforward neural networks
-
Vol. 2, ISSN 1098-7576
-
G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, "Extreme learning machine: a new learning scheme of feedforward neural networks," in Neural Networks, 2004. Proceedings. 2004 IEEE International Joint Conference on, 2004, vol. 2, pp. 985-990 Vol. 2, ISSN 1098-7576
-
(2004)
Neural Networks 2004. Proceedings. 2004 IEEE International Joint Conference on
, vol.2
, pp. 985-990
-
-
Huang, G.-B.1
Zhu, Q.-Y.2
Siew, C.-K.3
-
27
-
-
77954556689
-
Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach
-
N. Araujo, R. de Oliveira, E.-W. Ferreira, A. Shinoda, and B. Bhargava, "Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach," in Telecommunications (ICT), 2010 IEEE 17th International Conference on, 2010, pp. 552-558
-
(2010)
Telecommunications (ICT), 2010 IEEE 17th International Conference on
, pp. 552-558
-
-
Araujo, N.1
De Oliveira, R.2
Ferreira, E.-W.3
Shinoda, A.4
Bhargava, B.5
-
28
-
-
33751281398
-
On-line sequential extreme learning machine
-
G.-B. Huang, N.-Y. Liang, H.-J. Rong, P. Saratchandran, and N. Sundararajan, "On-Line Sequential Extreme Learning Machine," in Computational Intelligence (CI 2005), The IASTED International Conference on, 2005
-
(2005)
Computational Intelligence (CI 2005), the IASTED International Conference on
-
-
Huang, G.-B.1
Liang, N.-Y.2
Rong, H.-J.3
Saratchandran, P.4
Sundararajan, N.5
-
29
-
-
84883110694
-
-
S. Yu, W. Zhou, W. Jia, and J. Hu, The Computer Journal (2011), URL http://comjnl. oxfordjournals. org/ content/early/2011/07/18/comjnl. bxr065. abstract, http://comjnl. oxfordjournals. org/ content/early/2011/07/18/comjnl. bxr065. full. pdf+html
-
(2011)
The Computer Journal
-
-
Yu, S.1
Zhou, W.2
Jia, W.3
Hu, J.4
-
30
-
-
84883072463
-
-
ISBN 978-3-642-04116-7 (Print) 978-3-642-04117-4 (Online
-
A. N. Mahmood, C. Leckie, J. Hu, Z. Tari, and M. Atiq, Network Traffic Monitoring: Application to SCADA Security, 2010, ISBN 978-3-642-04116-7 (Print) 978-3-642-04117-4 (Online)
-
(2010)
Network Traffic Monitoring: Application to SCADA Security
-
-
Mahmood, A.N.1
Leckie, C.2
Hu, J.3
Tari, Z.4
Atiq, M.5
-
31
-
-
79955011596
-
-
ISSN 1084-8045, URL
-
A. N. Mahmood, J. Hu, Z. Tari, and C. Leckie, Journal of Network and Computer Applications 33, 491-502 (2010), ISSN 1084-8045, URL http://www. sciencedirect. com/science/article/pii/S1084804510000196.
-
(2010)
Journal of Network and Computer Applications
, vol.33
, pp. 491-502
-
-
Mahmood, A.N.1
Hu, J.2
Tari, Z.3
Leckie, C.4
|