-
4
-
-
0034226287
-
A Revised Taxonomy for Intrusion Detection Systems
-
H. Debar, M. Dacier and A. Wespi, "A Revised Taxonomy for Intrusion Detection Systems", Annals of Telecommunications, vol. 55, no. 7-8, (2000), pp. 361-378.
-
(2000)
Annals of Telecommunications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
5
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S. Wu. Xiaonan and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review", Applied Soft Computing, vol. 10, no. 1, (2010), pp. 1-35.
-
(2010)
Applied Soft Computing
, vol.10
, Issue.1
, pp. 1-35
-
-
Xiaonan, S.W.1
Banzhaf, W.2
-
6
-
-
34247263845
-
Anomaly-based intrusion detection using fuzzy rough clustering
-
IEEE Computer Society Washington
-
W. Chimphlee, A. H. Addullah, M. N. M. Sap, S. Srinoy and S. Chimphlee, "Anomaly-based intrusion detection using fuzzy rough clustering", Proceedings of the 2006 International Conference on Hybrid Information Technology, IEEE Computer Society Washington, vol. 01, (2006), pp. 329-334.
-
(2006)
Proceedings of the 2006 International Conference on Hybrid Information Technology
, vol.1
, pp. 329-334
-
-
Chimphlee, W.1
Addullah, A.H.2
Sap, M.N.M.3
Srinoy, S.4
Chimphlee, S.5
-
7
-
-
0442296744
-
A Bayesian paradigm for designing intrusion detection systems
-
L. S. Scott, "A Bayesian paradigm for designing intrusion detection systems", Computational Statistics and Data Analysis, vol. 45, no. 1, (2004), pp. 69-83.
-
(2004)
Computational Statistics and Data Analysis
, vol.45
, Issue.1
, pp. 69-83
-
-
Scott, L.S.1
-
8
-
-
77954790951
-
Using artificial anomalies to detect unknown and known network intrusions
-
W. Fan, M. Miller, S. Stolfo, W. Lee and P. Chan, "Using artificial anomalies to detect unknown and known network intrusions", Knowledge and Information Systems, vol. 6, no. 5, (2004), pp. 507-527.
-
(2004)
Knowledge and Information Systems
, vol.6
, Issue.5
, pp. 507-527
-
-
Fan, W.1
Miller, M.2
Stolfo, S.3
Lee, W.4
Chan, P.5
-
9
-
-
84886493198
-
-
Proceedings of the 7th International Workshop, WISA 2006, Jeju Island, Korea, Springer Berlin Heidelberg, August 28-30
-
S. Paek, Y. Oh and D. Lee, "sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm", Proceedings of the 7th International Workshop, WISA 2006, Jeju Island, Korea, Springer Berlin Heidelberg, (2006) August 28-30, pp. 83-99.
-
(2006)
sIDMG: Small-Size Intrusion Detection Model Generation of Complimenting Decision Tree Classification Algorithm
, pp. 83-99
-
-
Paek, S.1
Oh, Y.2
Lee, D.3
-
10
-
-
21844433474
-
Application of online-training SVMs for real-time intrusion detection with different considerations
-
Z. Zhang and H. Shen, "Application of online-training SVMs for real-time intrusion detection with different considerations", Computer Communications, vol. 28, no. 12, (2005), pp. 1428-1442.
-
(2005)
Computer Communications
, vol.28
, Issue.12
, pp. 1428-1442
-
-
Zhang, Z.1
Shen, H.2
-
11
-
-
0000231655
-
-
in Proceedings of the 21st National Information Systems Security Conference, Arlington, VA, USA
-
J. Cannady, "Artificial neural networks for misuse detection", in Proceedings of the 21st National Information Systems Security Conference, Arlington, VA, USA, (1998), pp. 368-381.
-
(1998)
Artificial neural networks for misuse detection
, pp. 368-381
-
-
Cannady, J.1
-
12
-
-
15944375471
-
Intrusion detection using hierarchical neural networks
-
C. Zhang, J. Jiang and M. Kamel, "Intrusion detection using hierarchical neural networks", Pattern Recognition Letters, vol. 26, no. 6, (2005), pp. 779-791.
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.6
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
13
-
-
33847406678
-
A hierarchical intrusion detection model based on the PCA neural network
-
G. Liu, Z. Yi and S. Yang, "A hierarchical intrusion detection model based on the PCA neural network", Neurocomputing, vol. 70, no. 7-9, (2007), pp. 1561-1568.
-
(2007)
Neurocomputing
, vol.70
, Issue.7-9
, pp. 1561-1568
-
-
Liu, G.1
Yi, Z.2
Yang, S.3
-
14
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
A. N. Toosi and M. Kahani, "A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers", Computer Communications, vol. 30, no. 10, (2007), pp. 2201-2212.
-
(2007)
Computer Communications
, vol.30
, Issue.10
, pp. 2201-2212
-
-
Toosi, A.N.1
Kahani, M.2
-
15
-
-
69349090629
-
A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
-
X. Tong, Z. Wang and H. Yu, "A research using hybrid RBF/Elman neural networks for intrusion detection system secure model", Computer Physics Communications, vol. 180, no. 10, (2009), pp. 1795-1801.
-
(2009)
Computer Physics Communications
, vol.180
, Issue.10
, pp. 1795-1801
-
-
Tong, X.1
Wang, Z.2
Yu, H.3
-
16
-
-
84941079784
-
A new approach to intrusion detection using artificial neural networks and fuzzy clustering
-
G. Wanga, J. Hao, J. Mab and L. Huanga, "A new approach to intrusion detection using artificial neural networks and fuzzy clustering", Expert Systems with Applications, vol. 37, no. 9, (2010), pp. 6225-6232.
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.9
, pp. 6225-6232
-
-
Wanga, G.1
Hao, J.2
Mab, J.3
Huanga, L.4
-
17
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
S. Horng, M. Su, Y. Chen, T. Kao, R. Chen, J. Lai and C. D, Perkasa, "A novel intrusion detection system based on hierarchical clustering and support vector machines", Expert Systems with Applications, vol. 38, no. 1, (2011), pp. 306-313.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.1
, pp. 306-313
-
-
Horng, S.1
Su, M.2
Chen, Y.3
Kao, T.4
Chen, R.5
Lai, J.6
Perkasa, C.D.7
-
18
-
-
84886361987
-
KDD-99
-
January 2
-
S. Chaudhuri, D. Madigan and U. Fayyad, "KDD-99", Proceedings of the fifth ACM SIGKDD international conference on knowledge discovery and data mining, ACM SIGKDD Explorations Newsletter, vol. 1, no. 2, (2000) January 2, pp. 49-51.
-
(2000)
Proceedings of the fifth ACM SIGKDD international conference on knowledge discovery and data mining, ACM SIGKDD Explorations Newsletter
, vol.1
, Issue.2
, pp. 49-51
-
-
Chaudhuri, S.1
Madigan, D.2
Fayyad, U.3
-
19
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C. Tsaia, Y. Hsub, C. Linc and W. Lin, "Intrusion detection by machine learning: A review", Expert Systems with Applications, vol. 36, no. 10, (2009), pp. 11994-12000.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsaia, C.1
Hsub, Y.2
Linc, C.3
Lin, W.4
-
21
-
-
84886522834
-
-
The DARPA Intrusion Detection Data Sets, available at, (accessed June 2012)
-
The DARPA Intrusion Detection Data Sets, available at: http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html (accessed June 2012), (1998).
-
(1998)
-
-
-
22
-
-
84886484067
-
-
The KDD CUP 1999 Data, available at, (accessed June 2012)
-
The KDD CUP 1999 Data, available at: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html (accessed June 2012), (1999).
-
(1999)
-
-
|