-
2
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
Yihua Liao, V.Rao Vemuri, Use of K-nearest Neighbor Classifier for Intrusion Detection, Computers & Security. 21(5): 439-448, 2002
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
3
-
-
84885586087
-
Algorithms based on artificial neural networks for intrusion detection in heavy traffic computer networks
-
S. Saravanakumar, Amruth Kumar.A, Anandaraj.s, s.Gowtham, Algorithms Based on Artificial Neural Networks for Intrusion Detection in Heavy Traffic Computer Networks, Proc. of Intl Conf. on Advancements in Information Technology, pp.6-23, 2011
-
(2011)
Proc. of Intl Conf. on Advancements in Information Technology
, pp. 6-23
-
-
Saravanakumar, S.1
Kumar, A.2
Anandaraj, A.3
Gowtham, S.S.4
-
5
-
-
0141776045
-
A markov chain model of temporal behavior for anomaly detection
-
West Point, NY June
-
Nong Ye, A Markov Chain Model of Temporal Behavior for Anomaly Detection, Workshop on Information Assurance and Security. West Point, NY, June 2000.
-
(2000)
Workshop on Information Assurance and Security
-
-
Ye, N.1
-
6
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
Man, and Cybernetics ?Part A: Systems and Humans, July
-
Nong Ye, Xiangyang Li, Qiang Chen, Syed Masum Emran, Mingming Xu, Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data, IEEE Transactions on Systems, Man, and Cybernetics ?Part A: Systems and Humans. 31(4):266-274, July 2001
-
(2001)
IEEE Transactions on Systems
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Masum Emran, S.4
Xu, M.5
-
7
-
-
1942436335
-
Robustness of the markov-chain model for cyber-Attack detection
-
March
-
Nong Ye, Yebin Zhang, Connie M. Borror, Robustness of the Markov-Chain Model for Cyber-Attack Detection, IEEE Transactions on Realiability. 53(1):116-123, March 2004
-
(2004)
IEEE Transactions on Realiability
, vol.53
, Issue.1
, pp. 116-123
-
-
Ye, N.1
Zhang, Y.2
Borror, C.M.3
-
9
-
-
0035616570
-
A hybrid high-order markov chain model for computer intrusion detection
-
Wen-Hua Ju, Yehuda Vardi, A Hybrid High-Order Markov Chain Model for Computer Intrusion Detection, Journal of Computational and Graphical Statistics. 10(2): 277-295, 2001
-
(2001)
Journal of Computational and Graphical Statistics
, vol.10
, Issue.2
, pp. 277-295
-
-
Ju, W.1
Vardi, Y.2
-
10
-
-
56549097799
-
High-order markov kernels for intrusion detection
-
Chuanhuan Yin, Shengfeng Tian, Shaomin Mua, High-order Markov kernels for intrusion detection, Neurocomputing. 71(16-18):3247-3252, 2008
-
(2008)
Neurocomputing
, vol.71
, Issue.16-18
, pp. 3247-3252
-
-
Yin, C.1
Tian, S.2
Mua, S.3
-
11
-
-
85015374090
-
Modelling rain risk: A multi-order markov chain model approach
-
Markus Stowasser, Modelling Rain Risk: A Multi-order Markov Chain Model Approach, The Journal of Risk Finance, 13(1):45-60, 2011
-
(2011)
The Journal of Risk Finance
, vol.13
, Issue.1
, pp. 45-60
-
-
Stowasser, M.1
-
12
-
-
0029716418
-
A sense of self for unix processes
-
Stephanie Forrest, Steven A, Hofmeyr, Anil Somayaji, Thomas A, Longstaff, A Sense of Self for Unix Processes, Proceedings of IEEE Symposium on Security and Privacy, pp. 120-128, 1996
-
(1996)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Steven, A.2
Somayaji, H.A.3
Longstaff, T.A.4
-
14
-
-
33750333036
-
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
-
Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang, Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data, Computers & Security. 25(7): 539-550, 2006
-
(2006)
Computers & Security
, vol.25
, Issue.7
, pp. 539-550
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
Yang, L.4
-
15
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Richard P, Lippmann, David J, Fried, Isaac Graf, et al, Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation, Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), Vol. 2, pp. 12-26, 2000
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX
, vol.2
, pp. 12-26
-
-
Richard, P.1
Lippmann David, J.2
Isaac Graf, F.3
|