-
1
-
-
0003964874
-
-
SRI International, Computer Science Laboratory
-
D. Anderson, T. Frivold, and A. Valdes Next-generation intrusion detection expert system (NIDES), software users manual, beta-update release 1995 SRI International, Computer Science Laboratory
-
(1995)
Next-generation Intrusion Detection Expert System (NIDES), Software Users Manual, Beta-update Release
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
2
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
Barbara, D., Couto, J., Jajodia, S., Popyack, L., & Wu, N. (2001). ADAM: Detecting intrusions by data mining. In Proceedings of the IEEE workshop on information assurance and security (pp. 11-16).
-
(2001)
Proceedings of the IEEE Workshop on Information Assurance and Security
, pp. 11-16
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
4
-
-
79955702502
-
LIBSVM: A library for support vector machines
-
Software available at
-
C. Chang, and C. Lin LIBSVM: A library for support vector machines ACM Transactions on Intelligent Systems and Technology 2 3 2011 27:1 27:27 Software available at < http://www.csie.ntu.edu.tw/~cjlin/libsvm >
-
(2011)
ACM Transactions on Intelligent Systems and Technology
, vol.2
, Issue.3
, pp. 271-2727
-
-
Chang, C.1
Lin, C.2
-
5
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
-
O. Depren, M. Topallar, E. Anarim, and M.K. Ciliz An intelligent intrusion detection system for anomaly and misuse detection in computer networks Expert Systems with Applications 29 4 2005 713 722 (Pubitemid 41394445)
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
6
-
-
76749092270
-
The WEKA data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I.H. Witten The WEKA data mining software: An update ACM SIGKDD Explorations Newsletter 11 1 2009 10 18
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
7
-
-
33847743856
-
Hybrid intrusion detection with weighted signature generation over anomalous internet episodes
-
DOI 10.1109/TDSC.2007.9
-
K. Hwang, Y. Chen, and M. Qin Hybrid intrusion detection with weighted signature generation over anomalous Internet episodes IEEE Transactions on Dependable and Secure Computing 4 1 2007 41 55 (Pubitemid 46384620)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 41-55
-
-
Hwang, K.1
Cai, M.2
Chen, Y.3
Qin, M.4
-
9
-
-
60349101742
-
Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
-
DOI 10.1109/ICDM.2006.165, 4053075, Proceedings - Sixth International Conference on Data Mining, ICDM 2006
-
Perdisci, R., Gu, G., & Lee, W. (2006). Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems. In Proceedings of the 6th international conference on data mining (pp. 488-498). (Pubitemid 47485828)
-
(2007)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 488-498
-
-
Perdisci, R.1
Gu, O.2
Lee, W.3
-
10
-
-
0002899794
-
Learning decision tree classifier
-
J. Quinlan Learning decision tree classifier ACM Computing Surveys (CSUR) 28 1 1996 71 72
-
(1996)
ACM Computing Surveys (CSUR)
, vol.28
, Issue.1
, pp. 71-72
-
-
Quinlan, J.1
-
11
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
DOI 10.1162/089976601750264965
-
B. Schölkopf, J.C. Platt, J. Shawe-Taylor, A.J. Smola, and R.C. Williamson Estimating the support of a high-dimensional distribution Neural Computation 13 7 2001 1443 1471 (Pubitemid 33595028)
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Scholkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
12
-
-
14044252742
-
One-class support vector machines - An application in machine fault detection and classification
-
DOI 10.1016/j.cie.2005.01.009, PII S0360835205000100
-
H.J. Shin, D.H. Eom, and S.S. Kim One-class support vector machines: An application in machine fault detection and classification Computers & Industrial Engineering 48 2 2005 395 408 (Pubitemid 40274932)
-
(2005)
Computers and Industrial Engineering
, vol.48
, Issue.2
, pp. 395-408
-
-
Shin, H.J.1
Eom, D.-H.2
Kim, S.-S.3
-
13
-
-
77956590229
-
Unsupervised anomaly detection based on clustering and multiple one-class SVM
-
J. Song, H. Takakura, Y. Okabe, and Y. Kwon Unsupervised anomaly detection based on clustering and multiple one-class SVM IEICE Transactions on Communications E92-B 6 2009 1982 1990
-
(2009)
IEICE Transactions on Communications
, vol.E92-B
, Issue.6
, pp. 1982-1990
-
-
Song, J.1
Takakura, H.2
Okabe, Y.3
Kwon, Y.4
-
14
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
Tavallaee, M., Bagheri, E., Lu, W., & Ghorbani, A. (2009). A detailed analysis of the KDD CUP 99 data set. In Proceeding of the IEEE symposium on computational intelligence for security and defense applications (pp. 53-58).
-
(2009)
Proceeding of the IEEE Symposium on Computational Intelligence for Security and Defense Applications
, pp. 53-58
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.4
-
15
-
-
33750955638
-
A hybrid network intrusion detection technique using random forests
-
DOI 10.1109/ARES.2006.7, 1625319, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
-
Zhang, J., & Zulkernine, M. (2006). A hybrid network intrusion detection technique using random forests. In Proceedings of the first international conference on availability, reliability and security (pp. 262-269). (Pubitemid 44732653)
-
(2006)
Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
, vol.2006
, pp. 262-269
-
-
Zhang, J.1
Zulkernine, M.2
|