-
3
-
-
84890544641
-
-
Sourcefire, Inc., Accessed in June 2011
-
Sourcefire, Inc., "SNORT-Intrusion Prevention System," http://www.snort.org/, 2011, Accessed in June 2011.
-
(2011)
Intrusion Prevention System
-
-
-
6
-
-
33845989821
-
Can machine learning be secure
-
ACM
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar, "Can machine learning be secure?," in ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, New York, NY, USA, 2006, pp. 16-25, ACM.
-
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, New York, NY, USA, 2006
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
7
-
-
84877775237
-
ANtidote: Understanding and defending against poisoning of anomaly detectors
-
B.I.P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S.H. Lau, S. Rao, N. Taft, and J. D. Tygar, "ANTIDOTE: understanding and defending against poisoning of anomaly detectors," Internet Measurement Conference, pp. 1-14, 2009.
-
(2009)
Internet Measurement Conference
, pp. 1-14
-
-
Rubinstein, B.I.P.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.H.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
8
-
-
0004145058
-
-
Tech. Rep., Secure Networks, Inc., Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6
-
T. H. Ptacek and T. N. Newsham, "Insertion, evasion, and denial of service: Eluding network intrusion detection," Tech. Rep., Secure Networks, Inc., Suite 330, 1201 5th Street S.W, Calgary, Alberta, Canada, T2R-0Y6, 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
9
-
-
33748611921
-
Esemble based systems in decision making
-
R. Polikar, "Esemble based systems in decision making," IEEE Circuits and Systems Mag., vol. 6, no. 3, pp. 21-45, 2006.
-
(2006)
IEEE Circuits and Systems Mag.
, vol.6
, Issue.3
, pp. 21-45
-
-
Polikar, R.1
-
10
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
Philadelphia, PA, August 2005, New York, NY, USA, ACM Press
-
A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies using Traffic Feature Distributions," in ACM SIGCOMM, Philadelphia, PA, August 2005, New York, NY, USA, 2005, pp. 217-228, ACM Press.
-
(2005)
ACM SIGCOMM
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
11
-
-
33750332606
-
Paragraph: Thwarting signature learning by training maliciously
-
Springer
-
J. Newsome, B. Karp, and D. Song, "Paragraph: Thwarting signature learning by training maliciously," in Recent Advances in Intrusion Detection. 2006, pp. 81-105, Springer.
-
(2006)
Recent Advances in Intrusion Detection
, pp. 81-105
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
12
-
-
33745441630
-
MInds-Minnesota intrusion detection system
-
MIT Press
-
L. Ertoz, E. Eilertson, A. Lazarevic, P. N. Tan, V. Kumar, J. Srivastava, and P. Dokas, "MINDS-Minnesota Intrusion Detection System," in Next Generation Data Mining. 2004, MIT Press.
-
(2004)
Next Generation Data Mining
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.N.4
Kumar, V.5
Srivastava, J.6
Dokas, P.7
-
13
-
-
78650149893
-
Reducing unwanted traffic in a backbone network
-
Boston, MA, July
-
K. Xu, Z.L. Zhang, and S. Bhattacharrya, "Reducing Unwanted Traffic in a Backbone Network," in USENIX Workshop on Steps to Reduce Unwanted Traffic in the Internet (SRUTI), Boston, MA, July 2005.
-
(2005)
USENIX Workshop on Steps to Reduce Unwanted Traffic in the Internet (SRUTI)
-
-
Xu, K.1
Zhang, Z.L.2
Bhattacharrya, S.3
-
14
-
-
33751053025
-
Connectionless port scan detection on the backbone
-
april
-
Avinash Sridharan, T. Ye, and Supratik Bhattacharyya, "Connectionless port scan detection on the backbone," in Performance, Computing, and Communications Conference, 2006. IPCCC 2006. 25th IEEE International, april 2006, pp. 10 pp.-576.
-
(2006)
Performance, Computing, and Communications Conference, 2006. IPCCC 2006. 25th IEEE International
, vol.10
, pp. 576
-
-
Sridharan, A.1
Ye, T.2
Bhattacharyya, S.3
-
15
-
-
44149113560
-
Network intrusion detection by means of community of trusting agents
-
IEEE Computer Society
-
Martin Rehak, Michal Pechoucek, Karel Bartos, Martin Grill, and Pavel Celeda, "Network intrusion detection by means of community of trusting agents," in IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2007 Main Conference Proceedings) (IAT'07), Los Alamitos, CA, USA, 2007, IEEE Computer Society.
-
(2007)
IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2007 Main Conference Proceedings) (IAT'07), Los Alamitos, CA, USA
-
-
Rehak, M.1
Pechoucek, M.2
Bartos, K.3
Grill, M.4
Celeda, P.5
|