-
1
-
-
77955469676
-
An Overview of IP Flow-Based intrusion detection
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller, "An Overview of IP Flow-Based Intrusion Detection," IEEE Communications Surveys & Tutorials, vol. 12, no. 3, pp. 343-356, 2010.
-
(2010)
IEEE Communications Surveys & Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
3
-
-
79952826624
-
Inductive intrusion detection in flow-based network data using one-class support vector machines
-
Dubai, UAE
-
P. Winter, E. Hermann, and M. Zeilinger, "Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines," in 4th IFIP International Conference on New Technologies, Mobility and Security (NTMS'11), Dubai, UAE, 2011, pp. 1-5.
-
(2011)
4th IFIP International Conference on New Technologies, Mobility and Security (NTMS'11)
, pp. 1-5
-
-
Winter, P.1
Hermann, E.2
Zeilinger, M.3
-
5
-
-
33846200876
-
Entropy based worm and anomaly detection in fast IP networks
-
Modena, Italy
-
A. Wagner and B. Plattner, "Entropy Based Worm and Anomaly Detection in Fast IP Networks," in 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise., Modena, Italy, 2005, pp. 172-177.
-
(2005)
14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise
, pp. 172-177
-
-
Wagner, A.1
Plattner, B.2
-
6
-
-
84991972328
-
Flow-Based worm detection using correlated honeypot logs
-
F. Dressler, W. Jaegers, and R. German, "Flow-Based Worm Detection Using Correlated Honeypot Logs," in ITG-GI Conference on Communication in Distributed Systems(KiVS), 2007, pp. 1-6.
-
(2007)
ITG-GI Conference on Communication in Distributed Systems(KiVS)
, pp. 1-6
-
-
Dressler, F.1
Jaegers, W.2
German, R.3
-
7
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
San Jose, CA
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection," in Proceedings of the 17th conference on Security(USENIX'08), San Jose, CA, 2008, pp. 139-154.
-
(2008)
Proceedings of the 17th Conference on Security(USENIX'08)
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
8
-
-
77349112206
-
Hidden markov model modeling of ssh brute-force attacks
-
Venice, Italy
-
A. Sperotto, R. Sadre, P. Boer, and A. Pras, "Hidden Markov Model Modeling of Ssh Brute-Force Attacks," in Proceedings of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM '09), Venice, Italy, 2009, pp. 164-176.
-
(2009)
Proceedings of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM '09)
, pp. 164-176
-
-
Sperotto, A.1
Sadre, R.2
Boer, P.3
Pras, A.4
-
9
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions," SIGCOMM Comput. Commun. Rev., vol. 35, no. 4, pp. 217-228, 2005.
-
(2005)
SIGCOMM Comput. Commun. Rev.
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
10
-
-
60749124000
-
Schema theory for semantic link network
-
Beijing
-
Z. Hai, S. Yunchuan, and Z. Junsheng, "Schema Theory for Semantic Link Network," in Fourth International Conference on Semantics, Knowledge and Grid(SKG'08), Beijing, 2008, pp. 189-196.
-
(2008)
Fourth International Conference on Semantics, Knowledge and Grid(SKG'08)
, pp. 189-196
-
-
Hai, Z.1
Yunchuan, S.2
Junsheng, Z.3
-
11
-
-
71649094670
-
Using semantic networks and context in search for relevant software engineering Artifacts
-
Journal on Data Semantics
-
G. Karabatis, Z. Chen, V. Janeja, T. Lobo, M. Advani, M. Lindvall, et al., "Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts," Journal on Data Semantics, LNCS 5880, vol. 14, no. pp. 74-104, 2009.
-
(2009)
LNCS 5880
, vol.14
, pp. 74-104
-
-
Karabatis, G.1
Chen, Z.2
Janeja, V.3
Lobo, T.4
Advani, M.5
Lindvall, M.6
-
12
-
-
34147143063
-
Semantic integration and knowledge discovery for environmental research
-
Z. Chen, A. Gangopadhyay, G. Karabatis, M. McGuire, and C. Welty, "Semantic Integration and Knowledge Discovery for Environmental Research," Journal of Database Management (JDM), vol. 18, no. 1, pp. 43-68, 2007.
-
(2007)
Journal of Database Management (JDM)
, vol.18
, Issue.1
, pp. 43-68
-
-
Chen, Z.1
Gangopadhyay, A.2
Karabatis, G.3
McGuire, M.4
Welty, C.5
-
13
-
-
66149184544
-
Communities and emerging semantics in semantic link network: Discovery and learning
-
H. Zhuge, "Communities and Emerging Semantics in Semantic Link Network: Discovery and Learning," IEEE Trans. on Knowl. and Data Eng., vol. 21, no. 6, pp. 785-799, 2009.
-
(2009)
IEEE Trans. on Knowl. and Data Eng.
, vol.21
, Issue.6
, pp. 785-799
-
-
Zhuge, H.1
-
14
-
-
0031245667
-
Context-aware applications: From the laboratory to the marketplace
-
P. J. Brown, J. D. Bovey, and C. Xian, "Context-Aware Applications: From the Laboratory to the Marketplace," IEEE Personal Communications, vol. 4, no. 5, pp. 58-64, 1997.
-
(1997)
IEEE Personal Communications
, vol.4
, Issue.5
, pp. 58-64
-
-
Brown, P.J.1
Bovey, J.D.2
Xian, C.3
-
15
-
-
37249039465
-
An operational definition of context
-
Roskilde University, Denmark
-
A. Zimmermann, A. Lorenz, and R. Oppermann, "An Operational Definition of Context," in Proceedings of the 6th International and Interdisciplinary Conference on Modeling and Using Context (Context'07), Roskilde University, Denmark, 2007, pp. 558-571.
-
(2007)
Proceedings of the 6th International and Interdisciplinary Conference on Modeling and Using Context (Context'07)
, pp. 558-571
-
-
Zimmermann, A.1
Lorenz, A.2
Oppermann, R.3
-
16
-
-
21644481812
-
Correlating intrusion events and building attack scenarios through attack graph distances
-
Tucson, AZ, USA
-
S. Noel, E. Robertson, and S. Jajodia, "Correlating Intrusion Events and Building Attack Scenarios through Attack Graph Distances," in 20th Annual Computer Security Applications Conference(CSAC'04), Tucson, AZ, USA, 2004, pp. 350-359.
-
(2004)
20th Annual Computer Security Applications Conference(CSAC'04)
, pp. 350-359
-
-
Noel, S.1
Robertson, E.2
Jajodia, S.3
-
18
-
-
74949107111
-
An integrated cyber security monitoring system using correlation-based techniques
-
W. Qishi, D. Ferebee, L. Yunyue, and D. Dasgupta, "An Integrated Cyber Security Monitoring System Using Correlation-Based Techniques," in IEEE International Conference on System of Systems Engineering(SoSE'09), Albuquerque, NM, 2009, pp. 1-6.
-
(2009)
IEEE International Conference on System of Systems Engineering(SoSE'09), Albuquerque, NM
, pp. 1-6
-
-
Qishi, W.1
Ferebee, D.2
Yunyue, L.3
Dasgupta, D.4
-
20
-
-
52649136576
-
Similarity measures for categorical data: A comparative evaluation
-
Atlanta, Georgia
-
S. Boriah, V. Chandola, and V. Kumar, "Similarity Measures for Categorical Data: A Comparative Evaluation," in Proceedings of the eighth SIAM International Conference on Data Mining (SDM), Atlanta, Georgia, 2008, pp. 243-254.
-
(2008)
Proceedings of the Eighth SIAM International Conference on Data Mining (SDM)
, pp. 243-254
-
-
Boriah, S.1
Chandola, V.2
Kumar, V.3
-
21
-
-
0027540520
-
Selected algorithms of machine learning from examples
-
J. W. Grzymala-Busse, "Selected Algorithms of Machine Learning from Examples," Fundamenta Informaticae, vol. 1, no. 8, pp. 193-207, 1993.
-
(1993)
Fundamenta Informaticae
, vol.1
, Issue.8
, pp. 193-207
-
-
Grzymala-Busse, J.W.1
-
22
-
-
77049103625
-
A labeled data set for flow-based intrusion detection
-
Venice, Italy
-
A. Sperotto, R. Sadre, F. Vliet, and A. Pras, "A Labeled Data Set for Flow-Based Intrusion Detection," in 9th IEEE International Workshop on IP Operations and Management((IPOM'09), Venice, Italy, 2009, pp. 39-50.
-
(2009)
9th IEEE International Workshop on IP Operations and Management((IPOM'09)
, pp. 39-50
-
-
Sperotto, A.1
Sadre, R.2
Vliet, F.3
Pras, A.4
-
23
-
-
84859430323
-
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
-
A. Shiravi, H. Shiravi, M. Tavallaee, and A. A. Ghorbani, "Toward Developing a Systematic Approach to Generate Benchmark Datasets for Intrusion Detection," Computers & Security, vol. 31, no. 3, pp. 357-374, 2012.
-
(2012)
Computers & Security
, vol.31
, Issue.3
, pp. 357-374
-
-
Shiravi, A.1
Shiravi, H.2
Tavallaee, M.3
Ghorbani, A.A.4
-
24
-
-
77950575061
-
A detailed analysis of the Kdd Cup 99 Data Set
-
Ottawa, ON
-
M. Tavallaee, E. Bagheri, W. Lu, and A.-A. Ghorbani, "A Detailed Analysis of the Kdd Cup 99 Data Set," in Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications(CISDA'09), Ottawa, ON, 2009.
-
(2009)
Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications(CISDA'09)
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.-A.4
-
25
-
-
84888882172
-
Efficient intrusion detection using representative instances
-
C. Guo, Y.-J. Zhou, Y. Ping, S.-S. Luo, Y.-P. Lai, and Z.-K. Zhang, "Efficient Intrusion Detection Using Representative Instances," Computers & Security, vol. 39, no. p. 255, 2013.
-
(2013)
Computers & Security
, vol.39
, pp. 255
-
-
Guo, C.1
Zhou, Y.-J.2
Ping, Y.3
Luo, S.-S.4
Lai, Y.-P.5
Zhang, Z.-K.6
|