-
1
-
-
33845947480
-
Applying data mining of fuzzy association rules to network intrusion detection
-
presented at the United States Military Academy, West Point, NY
-
J. G.-P. A. El Semaray, J. Edmonds, and M. Papa, "Applying data mining of fuzzy association rules to network intrusion detection," presented at the IEEE Workshop Inf., United States Military Academy, West Point, NY, 2006.
-
(2006)
IEEE Workshop Inf
-
-
El Semaray, J.G.-P.A.1
Edmonds, J.2
Papa, M.3
-
2
-
-
0029716418
-
A sense of self for unix processes
-
presented at the Los Alamitos, CA
-
A. S. S. Forrest, S. A. Hofmeyr, and T. A. Longstaff, "A sense of self for unix processes," presented at the IEEE Symp. Secur. Privacy, Los Alamitos, CA, 1996.
-
(1996)
IEEE Symp. Secur. Privacy
-
-
Forrest, A.S.S.1
Hofmeyr, S.A.2
Longstaff, T.A.3
-
3
-
-
0344095523
-
-
Master's thesis, Dept. Comput. Sci., Mississippi State Univ., Starkville, MS
-
J. Luo, "Integrating fuzzy logic with data mining methods for intrusion detection," Master's thesis, Dept. Comput. Sci., Mississippi State Univ., Starkville, MS, 1999.
-
(1999)
Integrating Fuzzy Logic with Data Mining Methods for Intrusion Detection
-
-
Luo, J.1
-
4
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA offline intrusion detection evaluation
-
Los Alamitos, CA: IEEE Comput. Soc. Press
-
R. P. Lippmann, D. J. Fried, I. Graf, J. Haines, K. P. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Ziss-man, "Evaluating intrusion detection systems: The 1998 DARPA offline intrusion detection evaluation," in Proc. DARPA Inf. Survivability Conf. Expo. vol. 2, Los Alamitos, CA: IEEE Comput. Soc. Press, 2000.
-
(2000)
Proc. DARPA Inf. Survivability Conf. Expo.
, vol.2
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.4
Kendall, K.P.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.K.10
Ziss-Man, M.A.11
-
5
-
-
84905049498
-
-
Kddcup
-
Kddcup 1999 data [Online]. Available: kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html.
-
(1999)
Data
-
-
-
6
-
-
69249205008
-
-
Darpa Intrusion Detection datasets [Online]. Available: www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html.
-
Darpa Intrusion Detection Datasets
-
-
-
7
-
-
50649094035
-
Random-forests-based network intrusion detection systems
-
Sep.
-
J. Zhang, M. Zulkernine, and A. Haque, "Random-forests-based network intrusion detection systems," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 5, pp. 649-659, Sep. 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.
, vol.38
, Issue.5
, pp. 649-659
-
-
Zhang, J.1
Zulkernine, M.2
Haque, A.3
-
8
-
-
34047229997
-
An automatically tuning intrusion detection system
-
Apr.
-
Z. Yu, J. J. P. Tsai, and T. Weigert, "An automatically tuning intrusion detection system," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 37, no. 2, pp. 373-384, Apr. 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.37
, Issue.2
, pp. 373-384
-
-
Yu, Z.1
Tsai, J.J.P.2
Weigert, T.3
-
9
-
-
41749107387
-
Adaboost-based algorithm for network intrusion detection
-
Apr.
-
W. Hu, W. Hu, and S. Maybank, "Adaboost-based algorithm for network intrusion detection," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 38, no. 2, pp. 577-583, Apr. 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.38
, Issue.2
, pp. 577-583
-
-
Hu, W.1
Hu, W.2
Maybank, S.3
-
10
-
-
33744529638
-
Evolutionary neural networks for anomaly detection based on the behavior of a program
-
Jun.
-
S.-J. Han and S.-B. Cho, "Evolutionary neural networks for anomaly detection based on the behavior of a program," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 3, pp. 559-570, Jun. 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.36
, Issue.3
, pp. 559-570
-
-
Han, S.-J.1
Cho, S.-B.2
-
11
-
-
49549110728
-
Data fusion and cost minimization for intrusion detection
-
Sep.
-
D. Parikh and T. Chen, "Data fusion and cost minimization for intrusion detection," IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp. 381-389, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.3
, pp. 381-389
-
-
Parikh, D.1
Chen, T.2
-
12
-
-
29844441257
-
A data mining analysis of rtid alarms
-
presented at the West Lafayette, IN
-
S. Manganaris, M. Christensen, D. Serkle, and K. Hermix, "A data mining analysis of rtid alarms," presented at the 2nd Int. Workshop Recent Adv. Intrusion Detect., West Lafayette, IN, 1999.
-
(1999)
2nd Int. Workshop Recent Adv. Intrusion Detect
-
-
Manganaris, S.1
Christensen, M.2
Serkle, D.3
Hermix, K.4
-
13
-
-
0023294428
-
An intrusion detection model
-
Feb.
-
D. E. Denning, "An intrusion detection model," IEEE Trans. Softw. Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
14
-
-
0001882616
-
Fast algorithms for mining association rules
-
Santiago, Chile
-
R. Agrawal and R. Srikant, "Fast algorithms for mining association rules," in Proc. 20th VLDB Conf., Santiago, Chile, 1994, pp. 487-499.
-
(1994)
Proc. 20th VLDB Conf
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
20
-
-
74949104861
-
Applying genetic programming to intrusion detection
-
presented at the AAAI Press, Menlo Park, CA, Tech. Rep. FS-95-01
-
M. Crosbie and G. Spafford, "Applying genetic programming to intrusion detection," presented at the AAAI Fall Symp. Series, AAAI Press, Menlo Park, CA, Tech. Rep. FS-95-01, 1995.
-
(1995)
AAAI Fall Symp. Series
-
-
Crosbie, M.1
Spafford, G.2
-
21
-
-
4344588856
-
Detecting new forms of network intrusion using genetic programming
-
W. Lu and I. Traore, "Detecting new forms of network intrusion using genetic programming," Comput. Intell., vol. 20, no. 3, pp. 474-494, 2004.
-
(2004)
Comput. Intell.
, vol.20
, Issue.3
, pp. 474-494
-
-
Lu, W.1
Traore, I.2
-
22
-
-
35748930908
-
A graph-based evolutionary algorithm: Genetic network programming (GNP) and its extension using reinforcement learning
-
S. Mabu, K. Hirasawa, and J. Hu, "A graph-based evolutionary algorithm: Genetic network programming (GNP) and its extension using reinforcement learning," Evol. Comput., vol. 15, no. 3, pp. 369-398, 2007.
-
(2007)
Evol. Comput.
, vol.15
, Issue.3
, pp. 369-398
-
-
Mabu, S.1
Hirasawa, K.2
Hu, J.3
-
23
-
-
31744437360
-
A study of evolutionary multiagent models based on symbiosis
-
Feb.
-
T. Eguchi, K. Hirasawa, J. Hu, and N. Ota, "A study of evolutionary multiagent models based on symbiosis," IEEE Trans. Syst., Man, Cybern. B, Cybern., vol. 36, no. 1, pp. 179-193, Feb. 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. B, Cybern.
, vol.36
, Issue.1
, pp. 179-193
-
-
Eguchi, T.1
Hirasawa, K.2
Hu, J.3
Ota, N.4
-
24
-
-
46849110563
-
A doubledeck elevator group supervisory control system using genetic network programming
-
Jul.
-
K. Hirasawa, T. Eguchi, J. Zhou, L. Yu, and S. Markon, "A doubledeck elevator group supervisory control system using genetic network programming," IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 38, no. 4, pp. 535-550, Jul. 2008.
-
(2008)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.
, vol.38
, Issue.4
, pp. 535-550
-
-
Hirasawa, K.1
Eguchi, T.2
Zhou, J.3
Yu, L.4
Markon, S.5
-
25
-
-
0034867763
-
Comparison between genetic network programming (GNP) and genetic programming (GP)
-
K. Hirasawa, M. Okubo, H. Katagiri, J. Hu, and J. Murata, "Comparison between genetic network programming (GNP) and genetic programming (GP)," in Proc. Congr. Evol. Comput., 2001, pp. 1276-1282.
-
(2001)
Proc. Congr. Evol. Comput.
, pp. 1276-1282
-
-
Hirasawa, K.1
Okubo, M.2
Katagiri, H.3
Hu, J.4
Murata, J.5
-
26
-
-
33746470808
-
Genetic network programming with acquisition mechanisms of association rules
-
K. Shimada, K. Hirasawa, and J. Hu, "Genetic network programming with acquisition mechanisms of association rules," J. Adv. Comput. Intell. Intell. Inf., vol. 10, no. 1, pp. 102-111, 2006.
-
(2006)
J. Adv. Comput. Intell. Intell. Inf.
, vol.10
, Issue.1
, pp. 102-111
-
-
Shimada, K.1
Hirasawa, K.2
Hu, J.3
-
27
-
-
0034832620
-
Outliers detection for high dimensional data
-
C. C. Aggarwal and P. Yu, "Outliers detection for high dimensional data," in Proc. ACM SIGMOD Conf., 2001, pp. 37-46.
-
(2001)
Proc. ACM SIGMOD Conf.
, pp. 37-46
-
-
Aggarwal, C.C.1
Yu, P.2
-
28
-
-
34548139002
-
Class association rule mining with chi-squared test using genetic network programming
-
K. Shimada, K. Hirasawa, and J. Hu, "Class association rule mining with chi-squared test using genetic network programming," in Proc. IEEE Int. Conf. Syst., Man, Cybern., 2006, pp. 5338-5344.
-
(2006)
Proc. IEEE Int. Conf. Syst., Man, Cybern.
, pp. 5338-5344
-
-
Shimada, K.1
Hirasawa, K.2
Hu, J.3
-
29
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and S. J. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 227-261, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
31
-
-
34548490738
-
Improving network security using genetic algorithm approach
-
Z. Banković, D. Stepanović, S. Bojanić, and O. Nieto-Taladriz, "Improving network security using genetic algorithm approach," Comput. Elect. Eng., vol. 33, pp. 438-451, 2007.
-
(2007)
Comput. Elect. Eng.
, vol.33
, pp. 438-451
-
-
Banković, Z.1
Stepanović, D.2
Bojanić, S.3
Nieto-Taladriz, O.4
-
32
-
-
50249114634
-
Genetic network programming with class association rule acquisition mechanisms from incomplete databases
-
K. Shimada, K. Hirasawa, and J. Hu, "Genetic network programming with class association rule acquisition mechanisms from incomplete databases," in Proc. SICE Annu. Conf., Kagawa, Japan, 2007, pp. 2708-2714.
-
(2007)
Proc. SICE Annu. Conf., Kagawa, Japan
, pp. 2708-2714
-
-
Shimada, K.1
Hirasawa, K.2
Hu, J.3
-
33
-
-
72549089077
-
Class association rule mining from incomplete database using genetic network programming," (in Japanese)
-
K. Shimada, K. Hirasawa, and J. Hu, "Class association rule mining from incomplete database using genetic network programming," (in Japanese), IEEJ Trans. EIS, vol. 128, no. 5, pp. 795-803, 2008.
-
(2008)
IEEJ Trans. EIS
, vol.128
, Issue.5
, pp. 795-803
-
-
Shimada, K.1
Hirasawa, K.2
Hu, J.3
|