-
1
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Chebrolu, S., A. Abraham, J. Thomas, 2005, Feature deduction and ensemble design of intrusion detection systems, Computers &Security, 24, 295-307
-
(2005)
Computers &Security
, vol.24
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.3
-
3
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
Giacinto, G., F. Roli, L. Didaci, 2003, Fusion of multiple classifiers for intrusion detection in computer networks, Pattern Recognition Letters, 24, 1795-1803.
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
4
-
-
0242637092
-
Detecting intrusion with rule-based integration of multiple models
-
Han, S. J., S-B., Cho, 2003, Detecting intrusion with rule-based integration of multiple models, Computers &Security, 22, 613-623.
-
(2003)
Computers &Security
, vol.22
, pp. 613-623
-
-
Han, S.J.1
Cho, S.-B.2
-
5
-
-
15744370034
-
A Taxonomy of network and computer attacks
-
Hansman, S. Hunt, R., 2005, A Taxonomy of network and computer attacks, Computers &Security, 24, 31-43.
-
(2005)
Computers &Security
, vol.24
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
6
-
-
0034171891
-
Identifying the impact of decision variables for nonlinear classification
-
Kim, S. H., Shin, S. W., 2000, Identifying the impact of decision variables for nonlinear classification, Expert Systems With Applications, 18, 201-214.
-
(2000)
Expert Systems with Applications
, vol.18
, pp. 201-214
-
-
Kim, S.H.1
Shin, S.W.2
-
8
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
Mahoney, M. V., P. K. Chan, 2003, An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. Proc. 6th Intl. Symposium on Recent Advances in Intrusion Detection (RAID 2003) 53, LNCS 2820, 220-237
-
(2003)
Proc. 6th Intl. Symposium on Recent Advances in Intrusion Detection (RAID 2003) 53LNCS
, vol.2820
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
9
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh, J. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Information System Security 3 (4), 262-294.
-
(2000)
ACM Trans. Information System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
10
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
Mukkamala, S., Andrew H. Sunga, A. Abraham, 2005, Intrusion detection using an ensemble of intelligent paradigms, Journal of Network and Computer Applications, 28, 167-182.
-
(2005)
Journal of Network and Computer Applications
, vol.28
, pp. 167-182
-
-
Mukkamala, S.1
Sunga, A.H.2
Abraham, A.3
-
11
-
-
0003065528
-
Further research on feature selection and classification using genetic algorithms
-
Punch, W. F., Goodman, E. D., et al., 1993, Further research on feature selection and classification using genetic algorithms, Int. Conf. on Genetic Algorithms, 557-564.
-
(1993)
Int. Conf. on Genetic Algorithms
, pp. 557-564
-
-
Punch, W.F.1
Goodman, E.D.2
-
12
-
-
84962238645
-
Cost-based modeling for fraud and intrusion dectection: Results from the jam project
-
Stolfo, S., W. Fan, W. Lee, A. Prodromidis, P. K. Chan. 2000, Cost-based Modeling for Fraud and Intrusion Dectection: Results from the JAM Project, DARPA Information Survivability Conference.
-
(2000)
DARPA Information Survivability Conference
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
13
-
-
85012240666
-
Data mining-based intrusion detectors: An overview of the columbia ids project
-
Stolfo, S., W. Lee, P. K. Chan, W. Fan, and E. Eskin. 2001, Data mining-based intrusion detectors: An overview of the Columbia IDS project, ACM SIGMOD Record, 30 (4), 5-14.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 5-14
-
-
Stolfo, S.1
Lee, W.2
Chan, P.K.3
Fan, W.4
Eskin, E.5
-
14
-
-
15944375471
-
A Intrusion detection using hierarchical neural networks
-
Zhang, C., J. Jiang, M. Kamel, 2005, A Intrusion detection using hierarchical neural networks, Pattern Recognition Letters, 779-791.
-
(2005)
Pattern Recognition Letters
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
|