-
1
-
-
79251616434
-
Stuxnet and the future of cyber war
-
J.P. Farwell and R. Rohozinski, "Stuxnet and the Future of Cyber War, " Survival, vol. 53, no. 1, pp. 23-40, 2011.
-
(2011)
Survival
, vol.53
, Issue.1
, pp. 23-40
-
-
Farwell, J.P.1
Rohozinski, R.2
-
2
-
-
78349299834
-
Stuxnet, the real start of cyber warfare?
-
T. Chen, "Stuxnet, the Real Start of Cyber Warfare?" IEEE Network, vol. 24, no. 6, pp. 2-3, Nov./Dec. 2010.
-
IEEE Network
, vol.24
, Issue.6
, pp. 2-3
-
-
Chen, T.1
-
5
-
-
84897134636
-
-
Defence Signals Directorate-Cyber Security Operations Centre Mar.
-
Defence Signals Directorate-Cyber Security Operations Centre, "Top 35 Mitigation Strategies for Targeted Cyber Intrusions, " http://www.dsd.gov.au/publications/Top-35-Mitigations.pdf, Mar. 2012.
-
(2012)
Top 35 Mitigation Strategies for Targeted Cyber Intrusions
-
-
-
6
-
-
77950566663
-
Analysis of the 1999 darpa/lincoln laboratory ids evaluation data with netadhict
-
July
-
C. Brown, A. Cowperthwaite, A. Hijazi, and A. SoMayaji, "Analysis of the 1999 DARPA/Lincoln Laboratory IDS Evaluation Data with NetADHICT, " Proc. IEEE Symp. Computational Intelligence for Security and Defense Applications, (CISDA '09), pp. 1-7, July 2009.
-
(2009)
Proc. IEEE Symp. Computational Intelligence for Security and Defense Applications, (CISDA '09)
, pp. 1-7
-
-
Brown, C.1
Cowperthwaite, A.2
Hijazi, A.3
Somayaji, A.4
-
8
-
-
79953303626
-
Exploring discrepancies in findings obtained with the kdd cup '99 data set
-
V. Engen, J. Vincent, and K. Phalp, "Exploring Discrepancies in Findings Obtained with the KDD Cup '99 Data Set, " Intelligent Data Analysis, vol. 15, no. 2, pp. 251-276, 2011.
-
(2011)
Intelligent Data Analysis
, vol.15
, Issue.2
, pp. 251-276
-
-
Engen, V.1
Vincent, J.2
Phalp, K.3
-
9
-
-
33749606368
-
Labelling clusters in an intrusion detection system using a combination of clustering evaluation techniques
-
DOI 10.1109/HICSS.2006.247, 1579550, Proceedings of the 39th Annual Hawaii International Conference on System Sciences, HICSS'06
-
S. Petrovic, G. Alvarez, A. Orfila, and J. Carbo, "Labelling Clusters in an Intrusion Detection System Using a Combination of Clustering Evaluation Techniques, " Proc. 39th Ann. Hawaii Int'l Conf. System Sciences (HICSS '06), vol. 6, p. 129b, Jan. 2006. (Pubitemid 44539456)
-
(2006)
Proceedings of the Annual Hawaii International Conference on System Sciences
, vol.6
-
-
Petrovic, S.1
Alvarez, G.2
Orfila, A.3
Carbo, J.4
-
11
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evalua tions as performed by lincoln laboratory
-
Nov.
-
J. McHugh, "Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evalua tions as Performed by Lincoln Laboratory, " ACM Trans. Informa tion and System Security, vol. 3, no. 4, pp. 262-294, http://doi.acm.org/10.1145/382912.382923, Nov. 2000.
-
(2000)
ACM Trans. Informa Tion and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
13
-
-
79952762919
-
A new system to evaluate ga-based clustering algorithms in intrusion detection alert management system
-
Dec.
-
H. Bahrbegi, A. Navin, A. Ahrabi, M. Mirnia, and A. Mollanejad, "A New System to Evaluate GA-Based Clustering Algorithms in Intrusion Detection Alert Management System, " Proc. Second World Congress on Nature and Biologically Inspired Computing (NaBIC), pp. 115-120, Dec. 2010.
-
(2010)
Proc. Second World Congress on Nature and Biologically Inspired Computing (NaBIC)
, pp. 115-120
-
-
Bahrbegi, H.1
Navin, A.2
Ahrabi, A.3
Mirnia, M.4
Mollanejad, A.5
-
14
-
-
44249089794
-
Effective value of decision tree with KDD 99 intrusion detection datasets for intrusion detection system
-
DOI 10.1109/ICACT.2008.4493974, 4493974, 10th International Conference on Advanced Communication Technology, ICACT 2008 - Proceedings
-
J.-H. Lee, J.-H. Lee, S.-G. Sohn, J.-H. Ryu, and T.-M. Chung, "Effective Value of Decision Tree with KDD 99 Intrusion Detection Datasets for Intrusion Detection System, " Proc. 10th Int'l Conf. Advanced Comm. Technology (ICACT), vol. 2, pp. 1170-1175, Feb. 2008. (Pubitemid 351720687)
-
(2008)
International Conference on Advanced Communication Technology, ICACT
, vol.2
, pp. 1170-1175
-
-
Lee, J.-H.1
Leet, J.-H.2
Sohn, S.-G.3
Ryu, J.-H.4
Chung, T.-M.5
-
15
-
-
10944272650
-
Extreme learning machine: A new learning scheme of feedforward neural networks
-
2004 IEEE International Joint Conference on Neural Networks - Proceedings
-
G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, "Extreme Learning Machine: A New Learning Scheme of Feedforward Neural Networks, " Proc. IEEE Int'l Joint Conf. Neural Networks, vol. 2, pp. 985-990, 2004. (Pubitemid 40011594)
-
(2004)
IEEE International Conference on Neural Networks - Conference Proceedings
, vol.2
, pp. 985-990
-
-
Huang, G.-B.1
Zhu, Q.-Y.2
Siew, C.-K.3
-
17
-
-
77952683499
-
The design and implementation of host-based intrusion detection system
-
Apr.
-
L. Ying, Z. Yan, and O. Yang-jia, "The Design and Implementation of Host-Based Intrusion Detection System, " Proc. Third Int'l Symp. Intelligent Information Technology and Security Informatics (IITSI), pp. 595-598, Apr. 2010.
-
(2010)
Proc. Third Int'l Symp. Intelligent Information Technology and Security Informatics (IITSI)
, pp. 595-598
-
-
Ying, L.1
Yan, Z.2
Yang-Jia, O.3
-
18
-
-
0034822547
-
PROFS-performance-oriented data reorganization for log-structured file system on multi-zone disks
-
J. Wang and Y. Hu, "PROFS-Performance-Oriented Data Reorganization for Log-Structured File System on Multi-Zone Disks, " Proc. Ninth Int'l Symp. Modeling, Analysis and Simulation of Computer and Telecomm. Systems, pp. 285-292, 2001. (Pubitemid 32878212)
-
(2001)
IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Proceedings
, pp. 285-292
-
-
Wang, J.1
Hu, Y.2
-
19
-
-
0026242806
-
File system measurements and their application to the design of efficient operation logging algorithms
-
Sept.
-
D. Bacon, "File System Measurements and Their Application to the Design of Efficient Operation Logging Algorithms, " Proc. 10th Symp. Reliable Distributed Systems, pp. 21-30, Sept. 1991.
-
(1991)
Proc. 10th Symp. Reliable Distributed Systems
, pp. 21-30
-
-
Bacon, D.1
-
20
-
-
0029716418
-
A sense of self for unix processes
-
May
-
S. Forrest, S. Hofmeyr, A. SoMayaji, and T. Longstaff, "A Sense of Self for Unix Processes, " Proc. IEEE Symp. Security and Privacy, pp. 120-128, May 1996.
-
(1996)
Proc. IEEE Symp. Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
21
-
-
34250188502
-
Alert fusion for a computer host based intrusion detection system
-
DOI 10.1109/ECBS.2007.17, 4148960, Proceedings - 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems, ECBS 2007: Raising Expectations of Computer-Based Systems
-
C. Feng, J. Peng, H. Qiao, and J.W. Rozenblit, "Alert Fusion for a Computer Host Based Intrusion Detection System, " Proc. 14th Ann. IEEE Int'l Conf. Workshops on the Eng. Computer-Based Systems (ECBS '07), pp. 433-440, Mar. 2007. (Pubitemid 46900699)
-
(2007)
Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems
, pp. 433-440
-
-
Chuan, F.1
Jianfeng, P.2
Haiyan, Q.3
Rozenblit, J.W.4
-
22
-
-
12344304006
-
Intrusion sensor data fusion in an intelligent intrusion detection system architecture
-
Jan.
-
A. Siraj, R. Vaughn, and S. Bridges, "Intrusion Sensor Data Fusion in an Intelligent Intrusion Detection System Architecture, " Proc. 37th Ann. Hawaii Int'l Conf. System Sciences, p. 10, Jan. 2004.
-
(2004)
Proc. 37th Ann. Hawaii Int'l Conf. System Sciences
, pp. 10
-
-
Siraj, A.1
Vaughn, R.2
Bridges, S.3
-
23
-
-
21644438395
-
An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls
-
Proceedings - 2004 12th IEEE International Conference on Networks, ICON 2004 - Unity in Diversity
-
X. Hoang and J. Hu, "An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls, " Proc. IEEE Int'l Conf. Networks (ICON 2004), vol. 2, pp. 470-474, Nov. 2004. (Pubitemid 40926525)
-
(2004)
Proceedings - IEEE International Conference on Networks, ICON
, vol.2
, pp. 470-474
-
-
Hoang, X.D.1
Hu, J.2
-
24
-
-
33744919321
-
A hybrid method to intrusion detection systems using HMM
-
DOI 10.1007/11604655-44, Distributed Computing and Internet Technology - Second International Conference, ICDCIT 2005, Proceedings
-
C. Raman and A. Negi, "A Hybrid Method to Intrusion Detection Systems Using HMM, " Proc. Second Int'l Conf. Distributed Computing and Internet Technology, pp. 389-396, http://dx.doi.org/10.1007/11604655-44, 2005. (Pubitemid 43846707)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 389-396
-
-
Raman, C.V.1
Negi, A.2
-
25
-
-
0031258214
-
Computer Immunology
-
S. Forrest, S.A. Hofmeyr, and A. SoMayaji, "Computer Immunology, " Comm. ACM, vol. 40, no. 10, pp. 88-96, http://doi.acm.org/10.1145/262793. 262811, Oct. 1997. (Pubitemid 127442917)
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
26
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S.A. Hofmeyr, S. Forrest, and A. SoMayaji, "Intrusion Detection Using Sequences of System Calls, " J. Computer Security, vol. 6, no. 3, p. 151, http://search.ebscohost.com/login.aspx?direct =true&db=tsh&AN= 1531432&site=ehost-live, 1998.
-
(1998)
J. Computer Security
, vol.6
, Issue.3
, pp. 151
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
27
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection using program sequences of system calls
-
X.D. Hoang, J. Hu, and P. Bertok, "A Multi-Layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls, " Proc. 11th IEEE Int'l. Conf. Networks, pp. 531-536, 2003.
-
(2003)
Proc. 11th IEEE int'L. Conf. Networks
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
28
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows using hidden markov model
-
S.-B. Cho and H.-J. Park, "Efficient Anomaly Detection by Modeling Privilege Flows Using Hidden Markov Model, " Computers and Security, vol. 22, no. 1, pp. 45-55, 2003.
-
(2003)
Computers and Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.-B.1
Park, H.-J.2
-
29
-
-
65249107163
-
A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection
-
Jan./Feb.
-
J. Hu, X. Yu, D. Qiu, and H.-H. Chen, "A Simple and Efficient Hidden Markov Model Scheme for Host-Based Anomaly Intrusion Detection, " IEEE Network, vol. 23, no. 1, pp. 42-47, Jan./Feb. 2009.
-
(2009)
IEEE Network
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Yu, X.2
Qiu, D.3
Chen, H.-H.4
-
30
-
-
0036079805
-
Host-based intrusion detection using self-organizing maps
-
P. Lichodzijewski, A. Nur Zincir-Heywood, and M. Heywood, "Host-Based Intrusion Detection Using Self-Organizing Maps, " Proc. Int'l Joint Conf. Neural Networks (IJCNN '02), vol. 2, pp. 1714-1719, 2002. (Pubitemid 34647888)
-
(2002)
Proceedings of the International Joint Conference on Neural Networks
, vol.2
, pp. 1714-1719
-
-
Lichodzijewski, P.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
32
-
-
76249114557
-
Performance analysis of artificial neural network intrusion detection systems
-
M. Abdel Azim, A.I. Abdel Fatah, and M. Awad, "Performance Analysis of Artificial Neural Network Intrusion Detection Systems, " Proc. Int'l Conf. Electrical and Electronics Eng. (ELECO '09), pp. 385-389, 2009.
-
(2009)
Proc. Int'l Conf. Electrical and Electronics Eng. (ELECO '09)
, pp. 385-389
-
-
Abdel Azim, M.1
Abdel Fatah, A.I.2
Awad, M.3
-
33
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
DOI 10.1109/TC.2002.1017701
-
N. Ye, S. Emran, Q. Chen, and S. Vilbert, "Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection, " IEEE Trans. Computers, vol. 51, no. 7, pp. 810-820, July 2002. (Pubitemid 34835448)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
37
-
-
36348944590
-
An efficient technique for preventing mimicry and impossible paths execution attacks
-
DOI 10.1109/PCCC.2007.358922, 4197958, 27th IEEE International Performance Computing and Communications Conference, IPCCC 07
-
D. Bruschi, L. Cavallaro, and A. Lanzi, "An Efficient Technique for Preventing Mimicry and Impossible Paths Execution Attacks, " Proc. IEEE Int'l Performance, Computing, and Comm. Conf. (IPCCC '07), pp. 418-425, Apr. 2007. (Pubitemid 350139325)
-
(2007)
Conference Proceedings of the IEEE International Performance, Computing, and Communications Conference
, pp. 418-425
-
-
Bruschi, D.1
Cavallaro, L.2
Lanzi, A.3
-
38
-
-
67649202948
-
Beyond output voting: Detecting compromised replicas using hmm-based behavioral distance
-
Apr.-June
-
D. Gao, M. Reiter, and D. Song, "Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance, " IEEE Trans. Dependable and Secure Computing, vol. 6, no. 2, pp. 96-110, Apr.-June 2009.
-
(2009)
IEEE Trans. Dependable and Secure Computing
, vol.6
, Issue.2
, pp. 96-110
-
-
Gao, D.1
Reiter, M.2
Song, D.3
-
39
-
-
79851497098
-
Using system call information to reveal hidden attack manifestations
-
May
-
U. Larson, D. Nilsson, E. Jonsson, and S. Lindskog, "Using System Call Information to Reveal Hidden Attack Manifestations, " Proc. First Int'l Workshop Security and Comm. Networks (IWSCN), pp. 1-8, May 2009.
-
(2009)
Proc. First Int'l Workshop Security and Comm. Networks (IWSCN)
, pp. 1-8
-
-
Larson, U.1
Nilsson, D.2
Jonsson, E.3
Lindskog, S.4
-
41
-
-
67650470601
-
Generating mimicry attacks using genetic programming: A benchmarking study
-
Apr.
-
H. Gunes Kayacik, A. Zincir-Heywood, M. Heywood, and S. Burschka, "Generating Mimicry Attacks Using Genetic Programming: A Benchmarking Study, " Proc. IEEE Symp. Computational Intelligence in Cyber Security (CICS '09), pp. 136-143, Apr. 2009.
-
(2009)
Proc. IEEE Symp. Computational Intelligence in Cyber Security (CICS '09)
, pp. 136-143
-
-
Gunes Kayacik, H.1
Zincir-Heywood, A.2
Heywood, M.3
Burschka, S.4
-
42
-
-
34548774169
-
Automatically evading IDS using GP authored attacks
-
DOI 10.1109/CISDA.2007.368148, 4219095, Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007
-
H. Kayacik, A. Zincir-Heywood, and M. Heywood, "Automatically Evading IDS Using GP Authored Attacks, " Proc. IEEE Symp. Computational Intelligence in Security and Defense Applications (CISDA '07), pp. 153-160, Apr. 2007. (Pubitemid 47431350)
-
(2007)
Proceedings of the 2007 IEEE Symposium on Computational Intelligence in Security and Defense Applications, CISDA 2007
, pp. 153-160
-
-
Kayacik, H.G.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
43
-
-
84881605872
-
Enhancing system-called-based intrusion detection with protocol context
-
Aug.
-
A. Liu, X. Jiang, J. Jin, F. Mao, and J. Chen, "Enhancing System-Called-Based Intrusion Detection with Protocol Context, " Proc. Fifth Int'l Conf. Emerging Security Information, Systems and Technologies (SECURWARE '11), pp. 103-108, Aug. 2011.
-
(2011)
Proc. Fifth Int'l Conf. Emerging Security Information, Systems and Technologies (SECURWARE '11)
, pp. 103-108
-
-
Liu, A.1
Jiang, X.2
Jin, J.3
Mao, F.4
Chen, J.5
-
44
-
-
84883090850
-
The application of extreme learning machines to the network intrusion detection problem
-
G. Creech and F. Jiang, "The Application of Extreme Learning Machines to the Network Intrusion Detection Problem, " AIP Conf. Proc., vol. 1479, no. 1, pp. 1506-1511, http://link.aip.org/link/?APC/1479/1506/1, 2012.
-
(2012)
AIP Conf. Proc.
, vol.1479
, Issue.1
, pp. 1506-1511
-
-
Creech, G.1
Jiang, F.2
-
45
-
-
84865067272
-
Extreme learning machines for intrusion detection
-
June
-
C. Cheng, W.P. Tay, and G.-B. Huang, "Extreme Learning Machines for Intrusion Detection, " Proc. Int'l Joint Conf. Neural Networks (IJCNN), pp. 1-8, June 2012.
-
(2012)
Proc. Int'l Joint Conf. Neural Networks (IJCNN)
, pp. 1-8
-
-
Cheng, C.1
Tay, W.P.2
Huang, G.-B.3
-
46
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models, " Proc. IEEE Symp. Security and Privacy, pp. 133-145, 1999.
-
(1999)
Proc. IEEE Symp. Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
47
-
-
0034546374
-
Architecture for an artificial immune system
-
S.A. Hofmeyr and S. Forrest, "Architecture for an Artificial Immune System, " Evolutionary Computation, vol. 8, no. 4, pp. 443-473, 2000.
-
(2000)
Evolutionary Computation
, vol.8
, Issue.4
, pp. 443-473
-
-
Hofmeyr, S.A.1
Forrest, S.2
-
48
-
-
85006546591
-
KDD98 intrusion detection dataset
-
R.K. Gunningham, R.P. Lippmann, D.J. Fried, S.L. Garfinkel, I. Graf, K.R. Kendall, S.E. Webster, D. Wyschogrod, and M.A. Zissman, "KDD98 Intrusion Detection Dataset, " Proc. Int'l Conf. Knowledge Discovery and Data Mining '98), http://www.ll. mit.edu/mission/communications/ist/corpora/ideval/data/ 1998data.html, 1998.
-
(1998)
Proc. Int'l Conf. Knowledge Discovery and Data Mining '98)
-
-
Gunningham, R.K.1
Lippmann, R.P.2
Fried, D.J.3
Garfinkel, S.L.4
Graf, I.5
Kendall, K.R.6
Webster, S.E.7
Wyschogrod, D.8
Zissman, M.A.9
-
49
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
PII S0031320396001422
-
A.P. Bradley, "The Use of the Area under the ROC Curve in the Evaluation of Machine Learning Algorithms, " Pattern Recognition, vol. 30, no. 7, pp. 1145-1159, http://www.sciencedirect.-com/science/article/pii/ S0031320396001422, 1997. (Pubitemid 127406521)
-
(1997)
Pattern Recognition
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.P.1
-
50
-
-
68949196337
-
A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
-
X.D. Hoang, J. Hu, and P. Bertok, "A Program-Based Anomaly Intrusion Detection Scheme Using Multiple Detection Engines and Fuzzy Inference, " J. Network and Computer Applications, vol. 32, no. 6, pp. 1219-1228, http://www.sciencedirect.com/science/article/pii/S108480450900071X, 2009.
-
(2009)
J. Network and Computer Applications
, vol.32
, Issue.6
, pp. 1219-1228
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
51
-
-
84935113569
-
Error bounds for convolutional codes and an asymptotically optimum decoding algorithm
-
Apr.
-
A. Viterbi, "Error Bounds for Convolutional Codes and an Asymptotically Optimum Decoding Algorithm, " IEEE Trans. Information Theory, vol. 13, no. 2, pp. 260-269, Apr. 1967.
-
(1967)
IEEE Trans. Information Theory
, vol.13
, Issue.2
, pp. 260-269
-
-
Viterbi, A.1
-
53
-
-
84897138621
-
-
May
-
"Ubuntu Linux, " http://www.ubuntu.com, May 2012.
-
(2012)
Ubuntu Linux
-
-
-
56
-
-
84897128358
-
-
May
-
"TikiWiki: CMS Groupware, " http://info.tiki.org/Tiki+Wiki+ CMS+Groupware, May 2012.
-
(2012)
TikiWiki: CMS Groupware
-
-
-
58
-
-
84897142852
-
-
Nov.
-
"Offensive Security Certified Professional, " http://www. offensive-security.com/information-security-certifications/oscp-offensive- security-certified-professional/, Nov. 2012.
-
(2012)
Offensive Security Certified Professional
-
-
-
60
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
W. Lee, S. Stolfo, and K. Mok, "A Data Mining Framework for Building Intrusion Detection Models, " Proc. IEEE Symp. Security and Privacy, pp. 120-132, 1999.
-
(1999)
Proc. IEEE Symp. Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
61
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioural models
-
D. Yeung and Y. Ding, "Host-Based Intrusion Detection Using Dynamic and Static Behavioural Models, " Pattern Recognition, vol. 36, no. 1, pp. 229-243, 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.1
Ding, Y.2
-
62
-
-
13544269338
-
Application of SVM and ANN for intrusion detection
-
DOI 10.1016/j.cor.2004.03.019, PII S0305054804000711, Application of Neural Networks
-
W.-H. Chen, S.-H. Hsu, and H.-P. Shen, "Application of SVM and ANN for Intrusion Detection, " Computers and Operations Research, vol. 32, no. 10, pp. 2617-2634, http://www.sciencedirect.com/science/article/pii/ S0305054804000711, 2005. (Pubitemid 40219764)
-
(2005)
Computers and Operations Research
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.-H.1
Hsu, S.-H.2
Shen, H.-P.3
-
63
-
-
36549015685
-
Intrusion detection using text processing techniques with a kernel based similarity measure
-
DOI 10.1016/j.cose.2007.10.003, PII S0167404807001113
-
A. Sharma, A.K. Pujari, and K.K. Paliwal, "Intrusion Detection Using Text Processing Techniques with a Kernel Based Similarity Measure, " Computers and Security, vol. 26, no. 7, pp. 488-495, http://www.sciencedirect. com/science/article/pii/S0167404807001113, 2007. (Pubitemid 350191974)
-
(2007)
Computers and Security
, vol.26
, Issue.7-8
, pp. 488-495
-
-
Sharma, A.1
Pujari, A.K.2
Paliwal, K.K.3
-
64
-
-
33746752558
-
A fast host-based intrusion detection system using rough set theory
-
Springer
-
S. Rawat, V. Gulati, and A. Pujari, "A Fast Host-Based Intrusion Detection System Using Rough Set Theory, " Trans. Rough Sets IV, pp. 144-161, Springer, 2005.
-
(2005)
Trans. Rough Sets IV
, pp. 144-161
-
-
Rawat, S.1
Gulati, V.2
Pujari, A.3
-
65
-
-
79955697946
-
Classifying attacks in a network intrusion detection system based on artificial neural networks
-
M.R. Norouzian and S. Merati, "Classifying Attacks in a Network Intrusion Detection System Based on Artificial Neural Networks, " Proc. 13th Int'l Conf. Advanced Comm. Technology (ICACT), pp. 868-873, 2011.
-
(2011)
Proc. 13th Int'l Conf. Advanced Comm. Technology (ICACT)
, pp. 868-873
-
-
Norouzian, M.R.1
Merati, S.2
-
66
-
-
52449110986
-
The research of dynamic change learning rate strategy in bp neural network and application in network intrusion detection
-
G. Song, J. Zhang, and Z. Sun, "The Research of Dynamic Change Learning Rate Strategy in BP Neural Network and Application in Network Intrusion Detection, " Proc. Third Int'l Conf. Innovative Computing Information and Control (ICICIC '08), pp. 513-513, 2008.
-
(2008)
Proc. Third Int'l Conf. Innovative Computing Information and Control (ICICIC '08)
, pp. 513-513
-
-
Song, G.1
Zhang, J.2
Sun, Z.3
-
67
-
-
70350442135
-
A novel adaptive intrusion detection approach based on comparison of neural networks and idiotypic networks
-
Z. Linhui, F. Xin, and D. Yaping, "A Novel Adaptive Intrusion Detection Approach Based on Comparison of Neural Networks and Idiotypic Networks, " Proc. Second Int'l Workshop Nonlinear Dynamics and Synchronization (INDS '09), pp. 203-208, 2009.
-
(2009)
Proc. Second Int'l Workshop Nonlinear Dynamics and Synchronization (INDS '09)
, pp. 203-208
-
-
Linhui, Z.1
Xin, F.2
Yaping, D.3
|