-
1
-
-
76249114557
-
Performance analysis of of artifical neural network intrusion detection systems
-
Bursa, Turkey
-
M. Abdel-Azim, A. I. Abdel-Fateh, and M. Awad, "Performance analysis of of artifical neural network intrusion detection systems", in Intl. Conf. on Electrical and Elctronics Engineering, Bursa, Turkey, 2009, pp. 385-389.
-
(2009)
Intl. Conf. on Electrical and Elctronics Engineering
, pp. 385-389
-
-
Abdel-Azim, M.1
Abdel-Fateh, A.I.2
Awad, M.3
-
2
-
-
76549120185
-
Host based intrusion detection using RBF neural networks
-
Islamaabad, Pakistan
-
U. Ahmed and A. Masood, "Host based intrusion detection using RBF neural networks", in Int. Conf. on Emerging Technologies, ICET 2009, Islamaabad, Pakistan, 2009, pp. 48-51.
-
(2009)
Int. Conf. on Emerging Technologies, ICET 2009
, pp. 48-51
-
-
Ahmed, U.1
Masood, A.2
-
3
-
-
33751039507
-
Dataflow anomaly detection
-
Berkeley, CA, USA
-
S. Bhatkar, A. Chaturvedi, and R. Sekar, "Dataflow Anomaly Detection", in IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2006, pp. 48-62.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 48-62
-
-
Bhatkar, S.1
Chaturvedi, A.2
Sekar, R.3
-
4
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows using hidden Markov model
-
Jan.
-
S. B. Cho and H. J. Park, "Efficient anomaly detection by modeling privilege flows using hidden Markov model", Computers and Security, vol. 22, no. 1, pp. 45-55, Jan. 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.B.1
Park, H.J.2
-
5
-
-
84881102082
-
A semantic approach to hostbased intrusion detection systems using contiguous and discontiguous system call patterns
-
G. Creech and J. Hu, "A Semantic Approach to Hostbased Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns", IEEE Transactions on Computers, vol. PP, no. 99, pp. 1-1, 2013.
-
(2013)
IEEE Transactions on Computers
, vol.PP
, Issue.99
, pp. 1-1
-
-
Creech, G.1
Hu, J.2
-
6
-
-
85084012473
-
Clustering and visualizing study state sequences
-
Memphis, TN, USA
-
M. C. Desmarais and F. Lemieux, "Clustering and Visualizing Study State Sequences", in Proc. of 5th Conf. on Educational Data Mining, Memphis, TN, USA, 2013.
-
(2013)
Proc. of 5th Conf. on Educational Data Mining
-
-
Desmarais, M.C.1
Lemieux, F.2
-
7
-
-
0029716418
-
A sense of self for Unix processes
-
Washington, DC, USA, May
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes", in Proc. of the 1996 IEEE Symp. on Security and Privacy, Washington, DC, USA, May 1996, pp. 120-128.
-
(1996)
Proc. of the 1996 IEEE Symp. on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
8
-
-
79961238252
-
Analyzing and visualizing state sequences in R with traminer
-
A. Gabadinho, G. Ritschard, N. S. Müller, and M. Studer, "Analyzing and Visualizing State Sequences in R with TraMineR", Journal of Statistical Software, vol. 40, no. 4, pp. 1-37, 2011.
-
(2011)
Journal of Statistical Software
, vol.40
, Issue.4
, pp. 1-37
-
-
Gabadinho, A.1
Ritschard, G.2
Müller, N.S.3
Studer, M.4
-
9
-
-
80052007699
-
A real-time intrusion detection system based on learning program behavior
-
Toulouse, France, Oct
-
A. K. Ghosh, C. Michael, and M. Schatz, "A Real-Time Intrusion Detection System Based on Learning Program Behavior", in Proc. of the third Intl. Workshop on Recent Advances in Intrusion Detection, Toulouse, France, Oct. 2000, pp. 93-109.
-
(2000)
Proc. of the Third Intl. Workshop on Recent Advances in Intrusion Detection
, pp. 93-109
-
-
Ghosh, A.K.1
Michael, C.2
Schatz, M.3
-
11
-
-
27144523481
-
Measuring various properties of execution traces to help build better trace analysis tools
-
China
-
A. Hamou-Lhadj and T. Lethbridge, "Measuring Various Properties of Execution Traces to Help Build Better Trace Analysis Tools", in Proc. of 10th Conf. on Eng. of Complex Comp. Sys., China, 2005, pp. 559-568.
-
(2005)
Proc. of 10th Conf. on Eng. of Complex Comp. Sys.
, pp. 559-568
-
-
Hamou-Lhadj, A.1
Lethbridge, T.2
-
12
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection using program sequences of system calls
-
Sep.
-
X. D. Hoang, Jiankun Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection using program sequences of system calls", in 11th IEEE Conf. on Network, Sep. 2003, pp. 531-536.
-
(2003)
11th IEEE Conf. on Network
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
13
-
-
68949196337
-
A programbased anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
Nov.
-
X. D. Hoang, J. Hu, and and P. Bertok., "A programbased anomaly intrusion detection scheme using multiple detection engines and fuzzy inference", J. Netw. Comput. Appl, vol. 32, no. 6, pp. 1219-1228, Nov. 2009.
-
(2009)
J. Netw. Comput. Appl
, vol.32
, Issue.6
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, A.P.3
-
14
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Aug.
-
S. A. Hofmeyr, S. Forrest, and and A. Somayaji, "Intrusion detection using sequences of system calls", J. Comput. Security, vol. 6, no. 3, pp. 151-180, Aug. 1998.
-
(1998)
J. Comput. Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.A.3
-
15
-
-
65249107163
-
A simple and efficient hidden Markov model scheme for hostbased anomaly intrusion detection
-
Jan.
-
J. Hu, X. Yu, D. Qiu, and and H. H. Chen, "A simple and efficient hidden Markov model scheme for hostbased anomaly intrusion detection", IEEE Network, vol. 23, no. 1, pp. 42-47, Jan. 2009.
-
(2009)
IEEE Network
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Yu, X.2
Qiu, D.3
Chen, A.H.H.4
-
16
-
-
33745486745
-
Multi-resolution abnormal trace detection using varied-length N-grams and automata
-
Seattle, USA, June
-
G. Jiang, H. Chen, C. Ungureanu, and K. I. Yoshihira, "Multi-resolution Abnormal Trace Detection Using Varied-length N-grams and Automata", in Proc. 2nd Intl. Conf. on Automatic Comp., Seattle, USA, June 2005, pp. 111-122.
-
(2005)
Proc. 2nd Intl. Conf. on Automatic Comp.
, pp. 111-122
-
-
Jiang, G.1
Chen, H.2
Ungureanu, C.3
Yoshihira, K.I.4
-
17
-
-
79851497098
-
Using system call information to reveal hidden attack manifestations
-
Norway
-
U. Larson, D. Nilsson, E. Jonsson, and S. Lindskog, "Using System Call Information to Reveal Hidden Attack Manifestations", in Proc. 1st Intl Workshop on in Security and Communication Networks, Norway, 2009, pp. 1-8.
-
(2009)
Proc. 1st Intl Workshop on in Security and Communication Networks
, pp. 1-8
-
-
Larson, U.1
Nilsson, D.2
Jonsson, E.3
Lindskog, S.4
-
18
-
-
0036079805
-
Host-based intrusion detection using selforganizing maps
-
Honolulu, USA
-
P. Lichodzijewski, A. Nur Zincir-Heywood, and M. Heywood, "Host-based intrusion detection using selforganizing maps", in Proceedings of the 2002 Intl. Conf. on Neural Networks, Honolulu, USA, 2002, pp. 1714-1719.
-
(2002)
Proceedings of the 2002 Intl. Conf. on Neural Networks
, pp. 1714-1719
-
-
Lichodzijewski, P.1
Zincir-Heywood, A.N.2
Heywood, M.3
-
19
-
-
84881605872
-
Enhancing system called-based intrusion detection with protocol context
-
A. Liu, X. Jiang, J. Jin, F. Mao, and J. Chen, "Enhancing System Called-Based Intrusion Detection with Protocol Context", in Fifth Intl. Conf. on Emerging Security Information Systems and Technologies, 2011, pp. 103-108.
-
(2011)
Fifth Intl. Conf. on Emerging Security Information Systems and Technologies
, pp. 103-108
-
-
Liu, A.1
Jiang, X.2
Jin, J.3
Mao, F.4
Chen, J.5
-
20
-
-
78149460823
-
Detecting intrusions through system call sequence and argument analysis
-
Dec.
-
F. Maggi, M. Matteucci, and S. Zanero, "Detecting Intrusions through System Call Sequence and Argument Analysis", IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 4, pp. 381-395, Dec. 2010.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.4
, pp. 381-395
-
-
Maggi, F.1
Matteucci, M.2
Zanero, S.3
-
22
-
-
84893260142
-
-
Mozilla-Testers, 2012. [Online]. https://developer.mozilla.org/en/ Mozilla-automated-tes ting
-
(2012)
-
-
-
24
-
-
78149297786
-
Learning rules for anomaly detection of hostile network traffic
-
Melbourne, Florida, USA, Nov
-
M. Mahoney and P. Chan, "Learning rules for anomaly detection of hostile network traffic", in Proc. 3rd IEEE Intl. Conf. on Data Mining, Melbourne, Florida, USA, Nov. 2003, pp. 601-604.
-
(2003)
Proc. 3rd IEEE Intl. Conf. on Data Mining
, pp. 601-604
-
-
Mahoney, M.1
Chan, P.2
-
25
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Aug.
-
A. Patcha and J. M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends", Computer Networks, vol. 51, no. 12, pp. 3448-3470, Aug. 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
26
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb.
-
L. R Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition", Proc. of IEEE, vol. 77, no. 2, pp. 257-286, Feb. 1989.
-
(1989)
Proc. of IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
27
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Nov.
-
W. Lee and S. J. Stolfo, "A framework for constructing features and models for intrusion detection systems.", ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 227-261, Nov. 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
28
-
-
84860502869
-
-
Florida Institue of Technology, Melbourne Florida, USA, Ph. D. thesis
-
G. Tandon, "Machine Learning for Host-based Anomaly Detection", Florida Institue of Technology, Melbourne, Florida, USA, Ph. D. thesis 2008.
-
(2008)
Machine Learning for Host-based Anomaly Detection
-
-
Tandon, G.1
-
29
-
-
0037252253
-
Determining the operational limits of an anomaly-based intrusion detector
-
K. M. C. Tan and R. A. Maxion, "Determining the Operational Limits of an Anomaly-Based Intrusion Detector", IEEE Journal on Seletected Areas in Communications, vol. 21, no. 1, pp. 96-110, 2003.
-
(2003)
IEEE Journal on Seletected Areas in Communications
, vol.21
, Issue.1
, pp. 96-110
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
30
-
-
84907095419
-
R: A language and environment for statistical computing
-
R Development Core Team
-
R Development Core Team, "R: A Language and Environment for Statistical Computing", R Foundation for Statistical Computing, 2011.
-
(2011)
R Foundation for Statistical Computing
-
-
-
32
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
France, Oct
-
A. Valdes and K. Skinner, "Adaptive, Model-Based Monitoring for Cyber Attack Detection", in Proc. of 3rd Intl. Workshop on Recent Advances in Intrusion Detection, LNCS, France, Oct. 2000, pp. 80-92.
-
(2000)
Proc. of 3rd Intl. Workshop on Recent Advances in Intrusion Detection, LNCS
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
33
-
-
6344239144
-
Modeling program behaviors by hidden Markov models for intrusion detection
-
Shanghai, China, Aug
-
W. Wang, X. H. Guan, and X. L. Zhang, "Modeling program behaviors by hidden Markov models for intrusion detection", in Proc. of Intl. Conf. on Machine Learning and Cybernetics, Shanghai, China, Aug. 2004, pp. 2830-2835.
-
(2004)
Proc. of Intl. Conf. on Machine Learning and Cybernetics
, pp. 2830-2835
-
-
Wang, W.1
Guan, X.H.2
Zhang, X.L.3
-
34
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, USA, May
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: alternative data models", in Proc. of 1999 IEEE Symposium on Security and Privacy, Oakland, USA, May 1999, pp. 133-145.
-
(1999)
Proc. of 1999 IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
36
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
July
-
N. Ye, S. M. Emran, Q. Chen, and S. Vilbert, "Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection", IEEE Trans. on Computers, vol. 51, no. 7, pp. 810-820, July 2002.
-
(2002)
IEEE Trans. on Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
37
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
Jan.
-
D. Y. Yeung and Y. Ding., "Host-based intrusion detection using dynamic and static behavioral models", Pattern Recognition, vol. 36, no. 1, pp. 229-243, Jan. 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
-
38
-
-
80051781512
-
Feature representation and selection in malicious code detection methods based on static system calls
-
D. Yuxin, Y. Xuebing, Z. Di, D. Li, and A. Zhanchao, "Feature representation and selection in malicious code detection methods based on static system calls", Computers & Security, vol. 30, no. 6-7, pp. 514-524, 2011.
-
(2011)
Computers & Security
, vol.30
, Issue.6-7
, pp. 514-524
-
-
Yuxin, D.1
Xuebing, Y.2
Di, Z.3
Li, D.4
Zhanchao, A.5
|