-
1
-
-
23844458149
-
Intelligent systems: Architectures and perspectives, recent advances in intelligent paradigms and applications
-
In A. Abraham, L. Jain & J. Kacprzyk (Eds.), Germany: Springer Verlag
-
Abraham, A. (2003). Intelligent systems: Architectures and perspectives, recent advances in intelligent paradigms and applications. In A. Abraham, L. Jain & J. Kacprzyk (Eds.), Studies in fuzziness and soft computing (pp. 1-35). Germany: Springer Verlag.
-
(2003)
Studies In Fuzziness and Soft Computing
, pp. 1-35
-
-
Abraham, A.1
-
3
-
-
0003802343
-
-
New York, Chapman and Hall
-
Breiman, L., Friedman, J., Olshen, R., Stone, C. (1984). Classification and regression trees. New York: Chapman and Hall.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Friedman, J.2
Olshen, R.3
Stone, C.4
-
4
-
-
30644462052
-
Feature deduction and ensemble design of intrusion detection systems
-
(in press)
-
Chebrolu, S., Abraham, A., & Thomas, J. (2004). Feature deduction and ensemble design of intrusion detection systems. Computers and Security, Elsevier Science (in press).
-
(2004)
Computers and Security, Elsevier Science
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.3
-
6
-
-
1242263788
-
Mitigation of network tampering using dynamic dispatch of mobile agents
-
DeMara, R.F., & Rocke, A.J. (2004). Mitigation of network tampering using dynamic dispatch of mobile agents. Computers & Security, 23, 31-42.
-
(2004)
Computers & Security
, vol.23
, pp. 31-42
-
-
Demara, R.F.1
Rocke, A.J.2
-
9
-
-
0034302005
-
Intrusion detection inter-component adaptive negotiation
-
Feiertag, R., Rho, S., Benzingher, L., Wu, S., Redmond, R., Zhang, C., Levitt, K., Peticolas, D., Heckman, M., Staniford, S., & McAlerney, J. (2000). Intrusion detection inter-component adaptive negotiation. Computer Networks, 34, 605-621.
-
(2000)
Computer Networks
, vol.34
, pp. 605-621
-
-
Feiertag, R.1
Rho, S.2
Benzingher, L.3
Wu, S.4
Redmond, R.5
Zhang, C.6
Levitt, K.7
Peticolas, D.8
Heckman, M.9
Staniford, S.10
McAlerney, J.11
-
10
-
-
0031258214
-
Computer immunology
-
Forrest, S., Hofmeyr, S.A., & Somayaji, A. (1997). Computer immunology. CACM, 40(10), 88-96.
-
(1997)
CACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
11
-
-
0002432565
-
Multivariate adaptative regression splines
-
Friedman, J.H. (1991). Multivariate adaptative regression splines. Annals of Statistics, 19.
-
(1991)
Annals of Statistics
, pp. 19
-
-
Friedman, J.H.1
-
13
-
-
85015336184
-
-
Retrieved from
-
Helmer, G., Wong, J., Honavar, V., & Miller, L. (1998). Intelligent agents for intrusion detection. Retrieved from http://citeseer.nj.nec.com/helmer98intelligent.html
-
(1998)
Intelligent Agents For Intrusion Detection
-
-
Helmer, G.1
Wong, J.2
Honavar, V.3
Miller, L.4
-
14
-
-
0038729639
-
Lightweight agents for intrusion detection
-
Helmer, G., Wong, J.S.K, Honavar, V., Miller, L., & Wang, Y. (2003). Lightweight agents for intrusion detection. The Journal of Systems and Software, 67, 109-122.
-
(2003)
The Journal of Systems and Software
, vol.67
, pp. 109-122
-
-
Helmer, G.1
Wong, J.S.K.2
Honavar, V.3
Miller, L.4
Wang, Y.5
-
16
-
-
0011066222
-
Applying mobile agents to intrusion detection and response
-
Retrieved from
-
Jansen, W., Mell, P., Karygiannis, T., & Marks, D. (1999). Applying mobile agents to intrusion detection and response. National Institute of Standards and Technology, Computer Security Division. Retrieved from http://csrc.nist.gov/publications/nistir/ir6416.pdf
-
(1999)
National Institute of Standards and Technology, Computer Security Division
-
-
Jansen, W.1
Mell, P.2
Karygiannis, T.3
Marks, D.4
-
17
-
-
84962306569
-
Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
-
Jou, Y.F., Gong, F., Sargor, C., Wu, X., Wu, S.F., Chang, H.C., Wang, F. (2000). Design and implementation of a scalable intrusion detection system for the protection of network infrastructure. DARPA Information Survivability Conference and Exposition.
-
(2000)
DARPA Information Survivability Conference and Exposition
-
-
Jou, Y.F.1
Gong, F.2
Sargor, C.3
Wu, X.4
Wu, S.F.5
Chang, H.C.6
Wang, F.7
-
19
-
-
84899393302
-
-
KDD cup 99 Intrusion detection data set. Retrieved October 25, 2004, from
-
KDD cup 99 Intrusion detection data set. Retrieved October 25, 2004, from http://kdd.ics.uci.edu/databases/kddcup99/kddcup.data_10_percent.gz
-
-
-
-
20
-
-
0004175084
-
NSTAT: A model-based real-time network intrusion detection system
-
Santa Barbara: University of California
-
Kemmerer, R.A. (1997). NSTAT: A model-based real-time network intrusion detection system. Technical Report TRCS97-18, Department of Computer Science. Santa Barbara: University of California.
-
(1997)
Technical Report TRCS97-18, Department of Computer Science
-
-
Kemmerer, R.A.1
-
23
-
-
0003900915
-
An application of pattern matching in intrusion detection
-
Purdue University
-
Kumar, S., & Spafford, E.H. (1994). An application of pattern matching in intrusion detection. Technical Report CSD-TR-94-013. Purdue University.
-
(1994)
Technical Report CSD-TR-94-013
-
-
Kumar, S.1
Spafford, E.H.2
-
24
-
-
33746507819
-
A data mining and CIDF based approach for detecting novel and distributed intrusions
-
Lee, W., Nimbalker, R.A., Yee, K.K., Patil, S.B., Desai, P.H., Tran, P.P., & Stolfo, S.J. (2000). A data mining and CIDF based approach for detecting novel and distributed intrusions. Proceedings of the 3rd International Workshop on Recent Advances in Intrusion Detection.
-
(2000)
Proceedings of the 3rd International Workshop On Recent Advances In Intrusion Detection
-
-
Lee, W.1
Nimbalker, R.A.2
Yee, K.K.3
Patil, S.B.4
Desai, P.H.5
Tran, P.P.6
Stolfo, S.J.7
-
27
-
-
0002535673
-
Distributed audit trail analysis
-
Mouinji, A., Charlier, B.L., Zampunieris, D., & Habra, N. (1995). Distributed audit trail analysis. Proceedings of the ISOC 95 Symposium on Network and Distributed System Security (pp. 102-112).
-
(1995)
Proceedings of the ISOC 95 Symposium On Network and Distributed System Security
, pp. 102-112
-
-
Mouinji, A.1
Charlier, B.L.2
Zampunieris, D.3
Habra, N.4
-
28
-
-
0028430224
-
Network intrusion detection
-
Mukherjee, B., Heberlein, L.T., & Levitt, K.N. (1994). Network intrusion detection. IEEE Network, 8(3), 26-41.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
30
-
-
9444267133
-
Modeling intrusion detection systems using linear genetic programming approach
-
In R. Orchard, C. Yang, & M. Ali (Eds.), Germany: Springer Verlag
-
Mukkamala, S., Sung, A.H., & Abraham, A. (2004).Modeling intrusion detection systems using linear genetic programming approach. In R. Orchard, C. Yang, & M. Ali (Eds.), Proceedings of the 17th International Conference on Industrial & Engineering Applications of Artificial Intelligence and Expert Systems, Innovations in Applied Artificial Intelligence. Lecture Notes in Computer Science 3029 (pp. 633-642). Germany: Springer Verlag.
-
(2004)
Proceedings of the 17th International Conference On Industrial & Engineering Applications of Artificial Intelligence and Expert Systems, Innovations In Applied Artificial Intelligence. Lecture Notes In Computer Science 3029
, pp. 633-642
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
31
-
-
8444224269
-
Intrusion detection systems using adaptive regression splines
-
In I. Seruca, J. Filipe, S. Hammoudi, & J. Cordeiro (Eds.), ISBN 972- 8865-00-7
-
Mukkamala, S., Sung, A.H., Abraham, A., & Ramos, V. (2004). Intrusion detection systems using adaptive regression splines. In I. Seruca, J. Filipe, S. Hammoudi, & J. Cordeiro (Eds.), Proceedings of the 6th International Conference on Enterprise Information Systems. ISBN 972- 8865-00-7 (vol. 3, pp. 26-33).
-
(2004)
Proceedings of the 6th International Conference On Enterprise Information Systems
, vol.3
, pp. 26-33
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
Ramos, V.4
-
32
-
-
0037105913
-
Design and implementation of a decentralized prototype system for detecting distributed attacks
-
Ning, P, Jajodia, S., & Wang, X.S. (2002). Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications, 25, 1374-1391.
-
(2002)
Computer Communications
, vol.25
, pp. 1374-1391
-
-
Ning, P.1
Jajodia, S.2
Wang, X.S.3
-
34
-
-
0004084716
-
STAT: A State Transition Analysis Tool for intrusion detection
-
July, (masters thesis), Santa Barbara: University of California
-
Porras, P.A. (1992, July). STAT: A State Transition Analysis Tool for intrusion detection (masters thesis). Computer Science Dept. Santa Barbara: University of California.
-
(1992)
Computer Science Dept
-
-
Porras, P.A.1
-
36
-
-
3042595031
-
Adaptive neuro-fuzzy intrusion detection system
-
Shah, K., Dave, N., Chavan, S., Mukherjee, S., Abraham, A., & Sanyal, S. (2004). Adaptive neuro-fuzzy intrusion detection system. Proceedings of the IEEE International Conference on Information Technology: Coding and Computing. IEEE Computer Society, 1 (pp. 70-74).
-
(2004)
Proceedings of the IEEE International Conference On Information Technology: Coding and Computing. IEEE Computer Society
, vol.1
, pp. 70-74
-
-
Shah, K.1
Dave, N.2
Chavan, S.3
Mukherjee, S.4
Abraham, A.5
Sanyal, S.6
-
37
-
-
0002473030
-
DIDS - motivation architecture and an early prototype
-
Snapp, S.R., Bretano, J., Diaz, G.V., Goan, T.L., Heberlain, L.T., Ho, C., Levitt, K.N., Mukherjee, B., Smaha, S.E., Grance, T., Teal, D.M., Mansur, D. (1999). DIDS - motivation architecture and an early prototype. Proceedings of the 14th National Computer Security Conference (pp. 167-176).
-
(1999)
Proceedings of the 14th National Computer Security Conference
, pp. 167-176
-
-
Snapp, S.R.1
Bretano, J.2
Diaz, G.V.3
Goan, T.L.4
Heberlain, L.T.5
Ho, C.6
Levitt, K.N.7
Mukherjee, B.8
Smaha, S.E.9
Grance, T.10
Teal, D.M.11
Mansur, D.12
-
38
-
-
0034300682
-
Intrusion detection using autonomous agents
-
Spafford, E.H., & Zamboni, D. (2000). Intrusion detection using autonomous agents. Computer Networks, 34, 547-570.
-
(2000)
Computer Networks
, vol.34
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
39
-
-
0000949239
-
GriDS - a large scale intrusion detection system for large networks
-
Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Wee, C., Yipi, R., & Erkle, D.Z. (1996). GriDS - a large scale intrusion detection system for large networks. Proceedings of the 19th National Information Security Conference (vol. 1, pp. 361-370).
-
(1996)
Proceedings of the 19th National Information Security Conference
, vol.1
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yipi, R.9
Erkle, D.Z.10
-
41
-
-
85172423269
-
JAM: Java Agents for Meta-learning over distributed databases
-
Stolfo, S.J., Prodromidis, A.L., Tselepis, S., Lee, W., Fan, D., & Chan, P.K. (1997). JAM: Java Agents for Meta-learning over distributed databases. Proceedings of the Third International Conference on Knowledge Discovery and Data Mining (pp. 74-81).
-
(1997)
Proceedings of the Third International Conference On Knowledge Discovery and Data Mining
, pp. 74-81
-
-
Stolfo, S.J.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.5
Chan, P.K.6
-
45
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
Vigna, G., & Kemmerer, R.A. (1999). NetSTAT: A network-based intrusion detection system. Journal Computer Security, 7(1), 37-71.
-
(1999)
Journal Computer Security
, vol.7
, Issue.1
, pp. 37-71
-
-
Vigna, G.1
Kemmerer, R.A.2
-
46
-
-
0029756282
-
Cooperating security managers: A peer-based intrusion detection system
-
White, G.B., Fisch, E.A., & Wpooch, U. (1996). Cooperating security managers: a peer-based intrusion detection system. IEEE Networks.
-
(1996)
IEEE Networks
-
-
White, G.B.1
Fisch, E.A.2
Wpooch, U.3
|