-
1
-
-
69749095234
-
Improvement in intrusion detection with advances in sensor fusion
-
C. Thomas, and N. Balakrishnan, Improvement in intrusion detection with advances in sensor fusion, IEEE Trans. on Information Forensics and Security, Vol. 4, pp. 542-551, 2009.
-
(2009)
IEEE Trans. on Information Forensics and Security
, vol.4
, pp. 542-551
-
-
Thomas, C.1
Balakrishnan, N.2
-
2
-
-
2442505788
-
Towards multisensor data fusion for dos detection, acm symp
-
C. Siaterlis and B. Maglaris. Towards multisensor data fusion for DoS detection, ACM Symp. on Applied computing. ACM, pp. 439-446, 2004.
-
(2004)
On Applied Computing. ACM
, pp. 439-446
-
-
Siaterlis, C.1
Maglaris, B.2
-
3
-
-
60349101742
-
Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
-
R. Perdisci, G. Gu, and W. Lee, Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems, IEEE Int. Conf. on Data Mining (ICDM'06), 2006.
-
(2006)
IEEE Int. Conf. on Data Mining (ICDM'06
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
5
-
-
84899416264
-
The behavior knowledge space fusion method:Analysis of generalization error and strategies for performance improvement
-
S. Raudys, and F. Roli, The behavior knowledge space fusion method: Analysis of generalization error and strategies for performance improvement, Multiple Classifier Systems, pp. 160-160, 2003.
-
(2003)
Multiple Classifier Systems
, pp. 160-160
-
-
Raudys, S.1
Roli, F.2
-
6
-
-
2442424268
-
Näve bayesvs decision trees in intrusion detection systems
-
N.B. Amor, S. Benferhat, and Z. Elouedi, Näve bayesvs decision trees in intrusion detection systems, ACM Symp. on Applied computing, pp. 420-424, 2004.
-
(2004)
ACM Symp. on Applied Computing
, pp. 420-424
-
-
Amor, N.B.1
Benferhat, S.2
Elouedi, Z.3
-
7
-
-
39749091030
-
Intrusion detection engine on dempster-shafer's theory of evidence
-
W. Hu, J. Li, and Q. Gao, Intrusion Detection Engine on Dempster-Shafer's Theory of Evidence, Int. Conf. on Communications, Circuits and Systems, Vol. 3, pp. 1627-1631, 2006.
-
(2006)
Int. Conf. on Communications, Circuits and Systems
, vol.3
, pp. 1627-1631
-
-
Hu, W.1
Li, J.2
Gao, Q.3
-
8
-
-
28444476267
-
Comparison of different fusion approaches for network intrusion detection using ensemble of rbfnn
-
A.P.F. Chan, W.W.Y. Ng, D.S. Yeung, and E.C.C. Tsang, Comparison of different fusion approaches for network intrusion detection using ensemble of RBFNN, Int. Conf. on Machine Learning and Cybernetics, Vol. 6, 2005.
-
(2005)
Int. Conf. on Machine Learning and Cybernetics
, vol.6
-
-
Chan, A.P.F.1
Ng, W.W.Y.2
Yeung, D.S.3
Tsang, E.C.C.4
-
9
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
F. Valeur, G. Vigna, C. Kruegel, and R.A. Kemmerer, A comprehensive approach to intrusion detection alert correlation, IEEE Trans. on dependable and secure computing, pp. 146-169, 2004.
-
(2004)
IEEE Trans. on Dependable and Secure Computing
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
10
-
-
38149027709
-
Alert correlation for extracting attack strategies
-
B. Zhu, and A.A. Ghorbani, Alert correlation for extracting attack strategies, Int. J. of Network Security, Vol. 3, No. 3, pp. 244-258, 2006.
-
(2006)
Int. J. of Network Security
, vol.3
, Issue.3
, pp. 244-258
-
-
Zhu, B.1
Ghorbani, A.A.2
-
11
-
-
77952384694
-
Principled reasoning and practical applications of alert fusion in intrusion detection systems
-
G. Gu, A. Ćardenas, and W. Lee, Principled reasoning and practical applications of alert fusion in intrusion detection systems, ACM Symp. on Information, computer and communications security, pp. 136-147, 2008.
-
(2008)
ACM Symp. on Information, Computer and Communications Security
, pp. 136-147
-
-
Gu, G.1
Ćardenas, A.2
Lee, W.3
-
12
-
-
70349879121
-
Using contextual information for ids alarm classification
-
F. Gagnon, F. Massicotte, and B. Esfandiari, Using Contextual Information for IDS Alarm Classification, Conf. on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), pp. 147-156, 2009.
-
(2009)
Conf. on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA
, pp. 147-156
-
-
Gagnon, F.1
Massicotte, F.2
Esfandiari, B.3
-
13
-
-
33750337672
-
WIND:Workload-aware intrusion detection
-
S. Sinha, F. Jahanian, and J.M. Patel, WIND: workload-aware INtrusion detection, Int. conference on Recent Advances in Intrusion Detection (RAID), pp. 290-310, 2006.
-
(2006)
Int. Conference on Recent Advances in Intrusion Detection (RAID
, pp. 290-310
-
-
Sinha, S.1
Jahanian, F.2
Patel, J.M.3
-
14
-
-
78649504015
-
An ontology-driven approach applied to information security
-
A. Vorobiev, and N. Bekmamedova, An ontology-driven approach applied to information security, J. of Research and Practice in Information Technology, Vol. 42, No. 1, 2010.
-
(2010)
J. of Research and Practice in Information Technology
, vol.42
, Issue.1
-
-
Vorobiev, A.1
Bekmamedova, N.2
-
15
-
-
78650458684
-
From intrusion detection tointrusion detection and diagnosis:An ontology-based approach
-
L. Coppolino, S. DAntonio, I. Elia, and L. Romano, From intrusion detection tointrusion detection and diagnosis: An ontology-based approach, Software Technologies for Embedded and Ubiquitous Systems, pp. 192-202, 2009.
-
(2009)
Software Technologies for Embedded and Ubiquitous Systems
, pp. 192-202
-
-
Coppolino, L.1
Dantonio, S.2
Elia, I.3
Romano, L.4
-
20
-
-
77957282880
-
Datamastera plug-in for importing schemas and data from relational databases into protégé
-
C. Nyulas, M. O'Connor, and S. Tu, Datamastera plug-in for importing schemas and data from relational databases into protege., 10th Int. Prot́eǵe Conf., 2007.
-
(2007)
10th Int. Prot́eǵe Conf.
-
-
Nyulas, C.1
O'connor, M.2
Tu, S.3
-
24
-
-
84899459373
-
-
MIT Lincoln Laboratory, 2000 DARPA intrusion detection scenario specific data sets, 2000
-
MIT Lincoln Laboratory, 2000 DARPA intrusion detection scenario specific data sets, 2000.
-
-
-
-
25
-
-
84892710333
-
A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks
-
S. T. Zargar, J. Joshi, and D. Tipper, A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys &Tutorials, vol.PP, no.99, pp. 1-24.
-
IEEE Communications Surveys &Tutorials
, Issue.99
, pp. 1-24
-
-
Zargar, S.T.1
Joshi, J.2
Tipper, D.3
-
26
-
-
84899435979
-
-
North Carolina State University Cyber Defense Laboratory, Tiaa: A toolkit for intrusion alert analysis, [online
-
North Carolina State University Cyber Defense Laboratory, Tiaa: A toolkit for intrusion alert analysis, [online] http://discovery.csc.ncsu.edu/software/ correlator/ver0.4/index.html.
-
-
-
|