-
1
-
-
3242808612
-
-
Computer Security Inst., San Francisco, CA
-
CSI/FBI Computer Crime and Security Survey. Computer Security Inst., San Francisco, CA; 2004. < http://www.issa-sac.org/docs/FBI2004.pdf >.
-
(2004)
CSI/FBI Computer Crime and Security Survey
-
-
-
3
-
-
9444235573
-
Network-based intrusion detection using neural networks
-
St. Louis, MO
-
Bivens A, Embrechts M, Palagiri C, Smith R, Szymanski B. Network-based intrusion detection using neural networks. In: Proc Artif Neural Netw Eng, vol. 12, St. Louis, MO; 2002. p. 527-35.
-
(2002)
Proc Artif Neural Netw Eng
, vol.12
, pp. 527-535
-
-
Bivens, A.1
Embrechts, M.2
Palagiri, C.3
Smith, R.4
Szymanski, B.5
-
5
-
-
35248842651
-
Detecting anomalous network traffic with self-organizing maps
-
Pittsburgh, PA
-
Ramadas M, Ostermann S, Tjaden B. Detecting anomalous network traffic with self-organizing maps. In: Proc recent adv intrusion detect (RAID), lecture notes in computer science, vol. 2820, Pittsburgh, PA; 2003. p. 36-54.
-
(2003)
Proc Recent Adv Intrusion Detect (RAID), Lecture Notes in Computer Science
, vol.2820
, pp. 36-54
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
6
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
New York
-
Barbara D, Couto J, Jajodia S, Popyack L, Wu N. ADAM: detecting intrusions by data mining. In: Proc 2nd annu IEEE workshop inf assur secur, New York; 2001. p. 11-6.
-
(2001)
Proc 2nd Annu IEEE Workshop Inf Assur Secure
, pp. 11-16
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
7
-
-
50649094035
-
Random forest-based network intrusion detection systems
-
J. Zhang, M. Zulkernine, and A. Haque Random forest-based network intrusion detection systems IEEE Transactions on Systems, Man, and Cybernetics - Part C. Applications and Reviews 38 5 2008 648 658
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics - Part C. Applications and Reviews
, vol.38
, Issue.5
, pp. 648-658
-
-
Zhang, J.1
Zulkernine, M.2
Haque, A.3
-
8
-
-
84887826957
-
-
Snort Network Intrusion Detection System
-
Snort Network Intrusion Detection System; 2006. < http://www.snort.org >.
-
(2006)
-
-
-
10
-
-
84868695480
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
Newcastle, Australia
-
Leung K, Leckie C. Unsupervised anomaly detection in network intrusion detection using clusters. In: Proc 28th Australasian CS conf, vol. 38, Newcastle, Australia; 2005. p. 333-42.
-
(2005)
Proc 28th Australasian CS Conf
, vol.38
, pp. 333-342
-
-
Leung, K.1
Leckie, C.2
-
11
-
-
80055024879
-
Minkowski metric, feature weighting and anomalous cluster initializing in k-means clustering
-
R. Cordeiro de Amorim, and B. Mirkin Minkowski metric, feature weighting and anomalous cluster initializing in k-means clustering, Elsevier's J Pattern Recognit 45 2012 1061 1075
-
(2012)
Elsevier's J Pattern Recognit
, vol.45
, pp. 1061-1075
-
-
Cordeiro De Amorim, R.1
Mirkin, B.2
-
13
-
-
0037105910
-
Intrusion detection techniques and approaches
-
T. Verwoerd, and R. Hunt Intrusion detection techniques and approaches Comput Commun 25 2002 1356 1365
-
(2002)
Comput Commun
, vol.25
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
15
-
-
85130866618
-
Weighting method for feature selection in k-means
-
H. Liu, H. Motoda, Chapman & Hall/CRC
-
J.Z. Huang, J. Xu, M. Ng, and Y. Ye Weighting method for feature selection in k-means H. Liu, H. Motoda, Computational methods of feature selection 2008 Chapman & Hall/CRC 193 209
-
(2008)
Computational Methods of Feature Selection
, pp. 193-209
-
-
Huang, J.Z.1
Xu, J.2
Ng, M.3
Ye, Y.4
-
16
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez, and E. Vazquez Anomaly-based network intrusion detection: techniques, systems and challenges Elsevier's J Comput Security 28 2009 18 28
-
(2009)
Elsevier's J Comput Security
, vol.28
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
Macia-Fernandez, G.3
Vazquez, E.4
-
18
-
-
0038428854
-
Results of the KDD'99 classifier learning
-
C. Elkan Results of the KDD'99 classifier learning SIGKDD Explor 1 2 2000 63 64
-
(2000)
SIGKDD Explor
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
20
-
-
37549018049
-
-
Wu X, et al. Survey paper, Springer-Verlag London Limited 2007. Knowl Inf Syst
-
Wu X, et al. Top 10 algorithms in data mining. Survey paper, Springer-Verlag London Limited 2007. Knowl Inf Syst, vol. 14; 2008. p. 1-37.
-
(2008)
Top 10 Algorithms in Data Mining
, vol.14
, pp. 1-37
-
-
|