-
1
-
-
85139020324
-
The work of intrusion detection: Rethinking the role of security analysts
-
New York
-
J. R. Goodall, W. G. Lutters, and A.Komlodi, "The work of Intrusion Detection: Rethinking the Role of Security Analysts", in Proc. of the Tenth Americas Conf. on Information System, New York, 2004, pp. 1421-1427.
-
(2004)
Proc. of the Tenth Americas Conf. on Information System
, pp. 1421-1427
-
-
Goodall, J.R.1
Lutters, W.G.2
Komlodi, A.3
-
2
-
-
0012127229
-
Intrusion and intrusion detection
-
July
-
J. McHugh, "Intrusion and Intrusion Detection", International Journal of Information Security, vol 1, no.l, pp 14-35, July 2001
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 14-35
-
-
McHugh, J.1
-
5
-
-
33747184649
-
A customizable intermediate level information extraction engine
-
Apr.
-
R. K. Srihari, W. Li, C. Niu and T. Cornell, "A Customizable Intermediate Level Information Extraction Engine. Journal of Natural Language Engineering, vol 12, no. 4, pp. 1-37, Apr. 2006.
-
(2006)
Journal of Natural Language Engineering
, vol.12
, Issue.4
, pp. 1-37
-
-
Srihari, R.K.1
Li, W.2
Niu, C.3
Cornell, T.4
-
7
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
IEEE Computer Society Press
-
S. Mukkamala, G. Janoski, A. H. Sung, "Intrusion Detection Using Neural Networks and Support Vector Machines", In Proc. of IEEE International Joint Conference on Neural Networks, IEEE Computer Society Press, 2002, pp.1702-1707.
-
(2002)
Proc. of IEEE International Joint Conference on Neural Networks
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.H.3
-
10
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
L. Robert K.Cunningham. "Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks", Computer Networks, vol 34, pp. 597-603, 2000
-
(2000)
Computer Networks
, vol.34
, pp. 597-603
-
-
Robert, L.1
Cunningham, K.2
-
11
-
-
0242571915
-
An intrusion detection framework based on information fusion
-
Sep.
-
H. Li, et al. "An Intrusion Detection Framework Based on Information Fusion", Mini-Micro System, vol 24, no 9, pp 1602-1606, Sep.2003.
-
(2003)
Mini-Micro System
, vol.24
, Issue.9
, pp. 1602-1606
-
-
Li, H.1
-
12
-
-
13944256121
-
Visflowconnect: Netflow visualizations of link relationships for security situational awareness
-
Washington, October
-
X.Yin, et al. Visflowconnect: Netflow visualizations of link relationships for security situational awareness. In Proc. of CCS Workshop on Visualization and Data Mining for Computer Security, Washington, October 2004, pp 26-34
-
(2004)
Proc. of CCS Workshop on Visualization and Data Mining for Computer Security
, pp. 26-34
-
-
Yin, X.1
-
14
-
-
84870637005
-
Flowscan: A network traffic flow reporting and visualization tool
-
P. Dave, "Flowscan: A network traffic flow reporting and visualization tool". In 14th Systems Administration Conference (USA 2000), 2000, pp 305-318.
-
(2000)
14th Systems Administration Conference (USA 2000)
, pp. 305-318
-
-
Dave, P.1
-
18
-
-
0142163128
-
Multi-sensor fusion and integration: Approaches, applications, and future research directions
-
r. C. Luo, C. C. Yih and L. K. Su, "Multi-sensor fusion and integration: approaches, applications, and future research directions", IEEE Sensors Journal, vol 2, no. 2, 2002, pp. 107-119.
-
(2002)
IEEE Sensors Journal
, vol.2
, Issue.2
, pp. 107-119
-
-
Luo, R.C.1
Yih, C.C.2
Su, L.K.3
-
19
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion: Creating cyberspace situational awareness
-
Apr.
-
T. Bass, "Intrusion Detection Systems and Multisensor Data Fusion: Creating Cyberspace Situational Awareness", Communications of the ACM, Vol. 43, no. 4, pp. 99-105, Apr. 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
|