-
3
-
-
84885810499
-
Testing Firewalls and IDS with FTester
-
Barisani A (2003) Testing firewalls and IDS with FTester. TISC Insight Newslett 5(6): 2-4.
-
(2003)
TISC Insight Newslett
, vol.5
, Issue.6
, pp. 2-4
-
-
Barisani, A.1
-
4
-
-
0043284115
-
Accuracy-Based Learning Classifier Systems: Models, Analysis and Applications to Classification Tasks
-
Bernadó-Mansilla E, Garrell JM (2003) Accuracy-based learning classifier systems: models, analysis and applications to classification tasks. Evol Comput 11(3): 209-238.
-
(2003)
Evol Comput
, vol.11
, Issue.3
, pp. 209-238
-
-
Ester, B.M.1
Josep, M.G.2
-
5
-
-
7044239082
-
A ruleset reduction algorithm for the XCS learning classifier system
-
Revised Papers. Springer, Berlin
-
Dixon PW, Corne DW, Oates MJ (2003) A ruleset reduction algorithm for the XCS learning classifier system. In: Proceedings of the 5th international workshop on learning classifier systems, Revised Papers. Springer, Berlin, pp 20-29.
-
(2003)
Proceedings of the 5th international workshop on learning classifier systems
, pp. 20-29
-
-
Dixon, P.W.1
Corne, D.W.2
Oates, M.J.3
-
6
-
-
34548025132
-
A survey of kernel and spectral methods for clustering
-
Filippone M, Camastra F, Masulli F, Rovetta S (2008) A survey of kernel and spectral methods for clustering. Pattern Recogn 41(1): 176-190.
-
(2008)
Pattern Recogn
, vol.41
, Issue.1
, pp. 176-190
-
-
Filippone, M.1
Camastra, F.2
Masulli, F.3
Rovetta, S.4
-
11
-
-
0008091191
-
What is a learning classifier system
-
Holland JH, Booker LB, Colombetti M, Dorigo M, Goldberg DE, Forrest S, Riolo RL, Smith RE, Lanzi PL, Stolzmann W et al (2000) What is a learning classifier system. Learn Classif Syst Found Appl 1813: 3-32.
-
(2000)
Learn Classif Syst Found Appl
, vol.1813
, pp. 3-32
-
-
Holland, J.H.1
Booker, L.B.2
Colombetti, M.3
Dorigo, M.4
Goldberg, D.E.5
Forrest, S.6
Riolo, R.L.7
Smith, R.E.8
Lanzi, P.L.9
Stolzmann, W.10
-
12
-
-
33847743856
-
Hybrid Intrusion Detection with Weighted Signature Generation over Anomalous Internet Episodes
-
Hwang K, Cai M, Chen Y, Qin M (2007) Hybrid intrusion detection with weighted signature generation over anomalous internet episodes. IEEE Trans Dependable Secure Comput 4(1): 41-55.
-
(2007)
IEEE Trans Dependable Secure Comput
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
13
-
-
34147111253
-
Network intrusion detection in covariance feature space
-
Jin S, Yeung DS, Wang X (2007) Network intrusion detection in covariance feature space. Pattern Recogn 40(8): 2185-2197.
-
(2007)
Pattern Recogn
, vol.40
, Issue.8
, pp. 2185-2197
-
-
Jin, S.1
Yeung, D.S.2
Wang, X.3
-
17
-
-
1842712339
-
A genetic clustering method for intrusion detection
-
Liu Y, Chen K, Liao X, Zhang W (2004) A genetic clustering method for intrusion detection. Pattern Recogn 37(5): 927-942.
-
(2004)
Pattern Recogn
, vol.37
, Issue.5
, pp. 927-942
-
-
Liu, Y.1
Chen, K.2
Liao, X.3
Zhang, W.4
-
18
-
-
2442421953
-
Generating realistic network traffic for security experiments
-
Luo S, Marin GA (2004) Generating realistic network traffic for security experiments. In: Proceedings of the IEEE SoutheastCon, pp 200-207.
-
(2004)
Proceedings of the IEEE SoutheastCon
, pp. 200-207
-
-
Luo, S.1
Marin, G.A.2
-
21
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection
-
Springer, Berlin
-
Mahoney MV, Chan PK (2003) An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Proceedings of recent advances in intrusion detection (RAID) 2003. Springer, Berlin, pp 220-237.
-
(2003)
Proceedings of recent advances in intrusion detection (RAID) 2003
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
22
-
-
34748914659
-
Automatic evaluation of intrusion detection systems
-
Massicotte F, Gagnon F, Labiche Y, Briand L, Couture M (2006) Automatic evaluation of intrusion detection systems. In: 22nd annual computer security applications conference, 2006, pp 361-370.
-
(2006)
In: 22nd annual computer security applications conference, 2006
, pp. 361-370
-
-
Massicotte, F.1
Gagnon, F.2
Labiche, Y.3
Briand, L.4
Couture, M.5
-
23
-
-
85019691440
-
Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh J (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans Inf Syst Secur 3(4): 262-294.
-
(2000)
ACM Trans Inf Syst Secur
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
25
-
-
84885783446
-
PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection)
-
Chicago, IL, USA, 5-7 April, 2001
-
Ramesh A, Mahesh JV (2001) PNrule: a new framework for learning classifier models in data mining (a case-study in network intrusion detection). In: Proceedings of the first SIAM international conference on data mining, Chicago, IL, USA, 5-7 April, 2001.
-
(2001)
Proceedings of the first SIAM international conference on data mining
-
-
Ramesh, A.1
Mahesh, J.V.2
-
26
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
Roesch M (1999) Snort-lightweight intrusion detection for networks. In: Proceedings of USENIX LISA, pp 229-238. http://www. snort. org/.
-
(1999)
Proceedings of USENIX LISA
, pp. 229-238
-
-
Roesch, M.1
-
28
-
-
49649112245
-
Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set
-
Sabhnani M, Serpen G (2004) Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set. Intell Data Anal 8(4): 403-415.
-
(2004)
Intell Data Anal
, vol.8
, Issue.4
, pp. 403-415
-
-
Sabhnani, M.1
Serpen, G.2
-
30
-
-
69249216488
-
An adaptive genetic-based signature learning system for intrusion detection
-
Shafi K, Abbass HA (2009) An adaptive genetic-based signature learning system for intrusion detection. Expert Syst Appl 36(10): 12036-12043.
-
(2009)
Expert Syst Appl
, vol.36
, Issue.10
, pp. 12036-12043
-
-
Shafi, K.1
Abbass, H.A.2
-
31
-
-
40649083578
-
Real time signature extraction from a supervised classifier system
-
CEC 2007, 25-28 September, 2007
-
Shafi K, Abbass HA, Zhu W (2007) Real time signature extraction from a supervised classifier system. In: Proceeding of the IEEE congress on evolutionary computation, CEC 2007, 25-28 September, 2007, pp 2509-2516.
-
(2007)
Proceeding of the IEEE congress on evolutionary computation
, pp. 2509-2516
-
-
Shafi, K.1
Abbass, H.A.2
Zhu, W.3
-
34
-
-
84962238645
-
Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection: results from the JAM Project
-
Stolfo SJ, Fan W, Lee W, Prodromidis A, Chan PK (2000) Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection: results from the JAM Project. In: Proceedings of DARPA information survivability conference, pp 130-144.
-
(2000)
Proceedings of DARPA information survivability conference
, pp. 130-144
-
-
Stolfo, S.J.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
38
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. Proc Recent Adv Intrusion Detect 7: 201-222.
-
(2004)
Proc Recent Adv Intrusion Detect
, vol.7
, pp. 201-222
-
-
Wang, K.1
Stolfo, S.J.2
-
39
-
-
0001387704
-
Classifier fitness based on accuracy
-
Wilson SW (1995) Classifier fitness based on accuracy. Evol Comput 3(2): 149-175.
-
(1995)
Evol Comput
, vol.3
, Issue.2
, pp. 149-175
-
-
Wilson, S.W.1
|