-
1
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A.V. Aho, and M.J. Corasick Efficient string matching: an aid to bibliographic search Commun ACM 18 6 1975 333 340
-
(1975)
Commun ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
2
-
-
26444495635
-
IDS False alarm reduction using continuous and discontinuous patterns
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
A. Alharbt, and H. Imai IDS false alarm reduction using continuous and discontinuous patterns Proceedings of the 3rd Int'l Conf. on Applied Cryptography and Network Security 2005 192 205 (Pubitemid 41422117)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 192-205
-
-
Alharby, A.1
Imai, H.2
-
3
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson The base-rate fallacy and the difficulty of intrusion detection ACM Trans Information Syst Secur 3 3 2000 186 205
-
(2000)
ACM Trans Information Syst Secur
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
5
-
-
0017547820
-
A fast string searching algorithm
-
R.S. Boyer, and J.S. Moore A fast string searching algorithm Commun ACM 20 10 1977 762 772
-
(1977)
Commun ACM
, vol.20
, Issue.10
, pp. 762-772
-
-
Boyer, R.S.1
Moore, J.S.2
-
7
-
-
77954866456
-
Semi-supervised learning for false alarm reduction
-
C.Y. Chiu, Y.J. Lee, C.C. Chang, W.Y. Luo, and H.C. Huang Semi-supervised learning for false alarm reduction Proceedings of the 10th Industrial Conference on Data Mining 2010 595 605
-
(2010)
Proceedings of the 10th Industrial Conference on Data Mining
, pp. 595-605
-
-
Chiu, C.Y.1
Lee, Y.J.2
Chang, C.C.3
Luo, W.Y.4
Huang, H.C.5
-
8
-
-
79961024286
-
A fast pattern matching algorithm with multi-byte search unit for high-speed network security
-
Y.-H. Choi, M.-Y. Jung, and S.-W. Seo A fast pattern matching algorithm with multi-byte search unit for high-speed network security Comput Commun 34 14 2011 1750 1763
-
(2011)
Comput Commun
, vol.34
, Issue.14
, pp. 1750-1763
-
-
Choi, Y.-H.1
Jung, M.-Y.2
Seo, S.-W.3
-
12
-
-
84901220271
-
-
DARPA intrusion detection evaluation data set
-
DARPA intrusion detection evaluation data set: http://www.ll.mit.edu/ mission/communications/ist/corpora/ideval/data/1999data.html, 1999.
-
(1999)
-
-
-
16
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, C. Kreibich, and V. Paxson Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics Proceedings of the 10th Usenix Security Symp 2001 115 131
-
(2001)
Proceedings of the 10th Usenix Security Symp
, pp. 115-131
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
17
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji Intrusion detection using sequences of system calls J Comput Secur 6 3 1998 151 180
-
(1998)
J Comput Secur
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
18
-
-
84984028908
-
Practical fast searching in strings
-
R. Horspool Practical fast searching in strings Softw Pract Exp 10 6 1980 501 506
-
(1980)
Softw Pract Exp
, vol.10
, Issue.6
, pp. 501-506
-
-
Horspool, R.1
-
20
-
-
80053570343
-
A memory-efficient bit-split parallel string matching using pattern dividing for intrusion detection systems
-
H. Kim, H.-S. Kim, and S. Kang A memory-efficient bit-split parallel string matching using pattern dividing for intrusion detection systems IEEE Transactions Parallel Distributed Syst 22 11 2011 1904 1911
-
(2011)
IEEE Transactions Parallel Distributed Syst
, vol.22
, Issue.11
, pp. 1904-1911
-
-
Kim, H.1
Kim, H.-S.2
Kang, S.3
-
22
-
-
23944484457
-
IDS false alarm filtering using KNN classifier
-
Information Security Applications - 5th International Workshop, WISA 2004
-
K.H. Law, and L.F. Kwok IDS false alarm filtering using KNN classifier Proceedings of the 5th Int'l Conf. on Information Security Applications 2005 114 121 (Pubitemid 41190806)
-
(2005)
Lecture Notes in Computer Science
, vol.3325
, pp. 114-121
-
-
Law, K.H.1
Kwok, L.F.2
-
23
-
-
84875860431
-
A memory-efficient and modular approach for large-scale string pattern matching
-
H. Le, and V.K. Prasanna A memory-efficient and modular approach for large-scale string pattern matching IEEE Trans Comput 62 5 2013 844 857
-
(2013)
IEEE Trans Comput
, vol.62
, Issue.5
, pp. 844-857
-
-
Le, H.1
Prasanna, V.K.2
-
24
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee, and S.J. Stolfo A framework for constructing features and models for intrusion detection systems ACM Trans Information Syst Secur 3 4 2000 227 261
-
(2000)
ACM Trans Information Syst Secur
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
25
-
-
36549085110
-
An active learning based TCM-KNN algorithm for supervised network intrusion detection
-
DOI 10.1016/j.cose.2007.10.002, PII S0167404807001101
-
Y. Li, and L. Guo An active learning based TCM-KNN algorithm for supervised network intrusion detection Comput Secur 26 7-8 2007 459 467 (Pubitemid 350191973)
-
(2007)
Computers and Security
, vol.26
, Issue.7-8
, pp. 459-467
-
-
Li, Y.1
Guo, L.2
-
27
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
DOI 10.1016/S0167-4048(02)00514-X
-
Y. Liao, and V. Rao Vemuri Use of k-nearest neighbor classifier for intrusion detection Comput Secur 21 5 2002 439 448 (Pubitemid 34835644)
-
(2002)
Computers and Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
28
-
-
65449128886
-
Adaptive alarm filtering by causal correlation consideration in intrusion detection
-
H.S. Lin, H.K. Pao, C.H. Mao, H.M. Lee, T. Chen, and Y.J. Lee Adaptive alarm filtering by causal correlation consideration in intrusion detection Proceedings of the 2009 Int'l Symp. on Intelligent Decision Technologies 2009 437 447
-
(2009)
Proceedings of the 2009 Int'l Symp. on Intelligent Decision Technologies
, pp. 437-447
-
-
Lin, H.S.1
Pao, H.K.2
Mao, C.H.3
Lee, H.M.4
Chen, T.5
Lee, Y.J.6
-
29
-
-
84875834638
-
A new filtration method and a hybrid strategy for approximate string matching
-
C.W. Lu, C.L. Lu, and R.C.T. Lee A new filtration method and a hybrid strategy for approximate string matching Theor Comput Sci 481 2013 9 17
-
(2013)
Theor Comput Sci
, vol.481
, pp. 9-17
-
-
Lu, C.W.1
Lu, C.L.2
Lee, R.C.T.3
-
31
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
-
J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory ACM Trans Information Syst Secur 3 4 2000 262 294
-
(2000)
ACM Trans Information Syst Secur
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
32
-
-
84856688278
-
Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection
-
Y. Meng, and L.-F. Kwok Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection Proceedings of the 7th Int'l Conf. on Information Assurance and Security 2011 74 79
-
(2011)
Proceedings of the 7th Int'l Conf. on Information Assurance and Security
, pp. 74-79
-
-
Meng, Y.1
Kwok, L.-F.2
-
34
-
-
84893779151
-
Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection
-
10.1016/j.jnca.2013.05.009
-
Y. Meng, and L.-F. Kwok Adaptive blacklist-based packet filter with a statistic-based approach in network intrusion detection J Netw Comput Appl 2013 10.1016/j.jnca.2013.05.009
-
(2013)
J Netw Comput Appl
-
-
Meng, Y.1
Kwok, L.-F.2
-
36
-
-
84867325287
-
Multi-stride string searching for high-speed content inspection
-
D. Pao, and X. Wang Multi-stride string searching for high-speed content inspection Comput J 55 10 2012 1216 1231
-
(2012)
Comput J
, vol.55
, Issue.10
, pp. 1216-1231
-
-
Pao, D.1
Wang, X.2
-
37
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson Bro: a system for detecting network intruders in real-time Comput Networks 31 23-24 1999 2435 2463
-
(1999)
Comput Networks
, vol.31
, Issue.2324
, pp. 2435-2463
-
-
Paxson, V.1
-
39
-
-
0007526771
-
On the worst-case behavior of string-searching algorithms
-
R.L. Rivest On the worst-case behavior of string-searching algorithms SIAM J Comput 6 4 1977 669 674
-
(1977)
SIAM J Comput
, vol.6
, Issue.4
, pp. 669-674
-
-
Rivest, R.L.1
-
40
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch Snort: lightweight intrusion detection for networks Proceedings of Usenix LISA Conference 1999 229 238
-
(1999)
Proceedings of Usenix LISA Conference
, pp. 229-238
-
-
Roesch, M.1
-
47
-
-
84947547225
-
Experiences with Specification-Based Intrusion Detection
-
Recent Advances in Intrusion Detection
-
P. Uppuluri, and R. Sekar Experiences with specification-based intrusion detection Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID) 2001 172 189 (Pubitemid 33352007)
-
(2001)
Lecture Notes in Computer Science
, Issue.2212
, pp. 172-189
-
-
Uppuluri, P.1
Sekar, R.2
-
50
-
-
0012405865
-
-
Technical Report TR-94-17 Department of Computer Science. University of Arizona
-
S. Wu, and U. Manber A fast algorithm for multi-pattern seaching Technical Report TR-94-17 May 1994 Department of Computer Science. University of Arizona
-
(1994)
A Fast Algorithm for Multi-pattern Seaching
-
-
Wu, S.1
Manber, U.2
|