-
1
-
-
27144489164
-
A tutorial on support vector machines for pattern recognition
-
C. Burges A tutorial on support vector machines for pattern recognition Data Min. Knowl. Discov. 2 2 1998 121 167
-
(1998)
Data Min. Knowl. Discov.
, vol.2
, Issue.2
, pp. 121-167
-
-
Burges, C.1
-
2
-
-
13544269338
-
Application of svm and ann for intrusion detection
-
W. Chen, S. Hsu, and H. Shen Application of svm and ann for intrusion detection Comput. Oper. Res. 32 10 2005 2617 2634
-
(2005)
Comput. Oper. Res.
, vol.32
, Issue.10
, pp. 2617-2634
-
-
Chen, W.1
Hsu, S.2
Shen, H.3
-
3
-
-
78751621903
-
Neural visualization of network traffic data for intrusion detection
-
E. Corchado, and Á Herrero Neural visualization of network traffic data for intrusion detection Appl. Soft Comput. 11 2 2011 2042 2056
-
(2011)
Appl. Soft Comput.
, vol.11
, Issue.2
, pp. 2042-2056
-
-
Corchado, E.1
Herrero Á.2
-
4
-
-
0023294428
-
An intrusion-detection model
-
D. Denning An intrusion-detection model IEEE Trans. Softw. Eng. 2 1987 222 232
-
(1987)
IEEE Trans. Softw. Eng.
, vol.2
, pp. 222-232
-
-
Denning, D.1
-
5
-
-
0029716418
-
A sense of self for unix processes
-
IEEE
-
S. Forrest, S. Hofmeyr, A. Somayaji, and T. Longstaff A sense of self for unix processes IEEE Symposium on Security and Privacy, 1996 Proceedings 1996 IEEE 120 128
-
(1996)
IEEE Symposium on Security and Privacy, 1996 Proceedings
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
6
-
-
0027961889
-
Self-nonself discrimination in a computer
-
IEEE
-
S. Forrest, A. Perelson, L. Allen, and R. Cherukuri Self-nonself discrimination in a computer IEEE ComputerSociety Symposium on Research in Security and Privacy, 1994 Proceedings 1994 IEEE 202 212
-
(1994)
IEEE ComputerSociety Symposium on Research in Security and Privacy, 1994 Proceedings
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukuri, R.4
-
7
-
-
78651547976
-
Anomaly detection analysis of intrusion data using supervised & unsupervised approach
-
P. Gogoi, B. Borah, and D.K. Bhattacharyya Anomaly detection analysis of intrusion data using supervised & unsupervised approach J. Converg. Inf. Technol. 5 1 2010 95 110
-
(2010)
J. Converg. Inf. Technol.
, vol.5
, Issue.1
, pp. 95-110
-
-
Gogoi, P.1
Borah, B.2
Bhattacharyya, D.K.3
-
8
-
-
0027593257
-
Nadir: An automated system for detecting network intrusion and misuse
-
J. Hochberg, K. Jackson, C. Stallings, J. McClary, D. DuBois, and J. Ford Nadir: An automated system for detecting network intrusion and misuse Comput. Secur. 12 3 1993 235 248
-
(1993)
Comput. Secur.
, vol.12
, Issue.3
, pp. 235-248
-
-
Hochberg, J.1
Jackson, K.2
Stallings, C.3
McClary, J.4
Dubois, D.5
Ford, J.6
-
9
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji Intrusion detection using sequences of system calls J. Comput. Secur. 6 3 1998 151 180
-
(1998)
J. Comput. Secur.
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
10
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, J.-L. Lai, and C.D. Perkasa A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Syst. Appl. 38 1 2011 306 313
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.1
, pp. 306-313
-
-
Horng, S.-J.1
Su, M.-Y.2
Chen, Y.-H.3
Kao, T.-W.4
Chen, R.-J.5
Lai, J.-L.6
Perkasa, C.D.7
-
12
-
-
82255175861
-
A differentiated one-class classification method with applications to intrusion detection
-
I. Kang, M. Jeong, and D. Kong A differentiated one-class classification method with applications to intrusion detection Expert Syst. Appl. 39 4 2012 3899 3905
-
(2012)
Expert Syst. Appl.
, vol.39
, Issue.4
, pp. 3899-3905
-
-
Kang, I.1
Jeong, M.2
Kong, D.3
-
13
-
-
56949107719
-
Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection
-
G. Kou, Y. Peng, Z. Chen, and Y. Shi Multiple criteria mathematical programming for multi-class classification and application in network intrusion detection Inf. Sci. 179 4 2009 371 381
-
(2009)
Inf. Sci.
, vol.179
, Issue.4
, pp. 371-381
-
-
Kou, G.1
Peng, Y.2
Chen, Z.3
Shi, Y.4
-
16
-
-
84964411176
-
Real time data mining-based intrusion detection
-
IEEE
-
W. Lee, S. Stolfo, P. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, and J. Zhang Real time data mining-based intrusion detection DARPA Information Survivability Conference and Exposition II, 2001, DISCEX'01, Proceedings, vol. 1 2001 IEEE 89 100
-
(2001)
DARPA Information Survivability Conference and Exposition II, 2001, DISCEX'01, Proceedings, Vol. 1
, pp. 89-100
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
18
-
-
0036321445
-
Use of k-nearest neighbor classifier for intrusion detection
-
Y. Liao, and V. Vemuri Use of k-nearest neighbor classifier for intrusion detection Comput. Secur. 21 5 2002 439 448
-
(2002)
Comput. Secur.
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.2
-
20
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
-
IEEE
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, and R. Cunningham Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation DARPA Information Survivability Conference and Exposition, DISCEX'00, Proceedings, vol. 2 2000 IEEE 12 26
-
(2000)
DARPA Information Survivability Conference and Exposition, DISCEX'00, Proceedings, Vol. 2
, pp. 12-26
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
-
21
-
-
0034301517
-
The 1999 darpa off-line intrusion detection evaluation
-
R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das The 1999 darpa off-line intrusion detection evaluation Comput. Netw. 34 4 2000 579 595
-
(2000)
Comput. Netw.
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
22
-
-
33847410597
-
One-class document classification via neural networks
-
L. Manevitz, and M. Yousef One-class document classification via neural networks Neurocomputing 70 7 2007 1466 1481
-
(2007)
Neurocomputing
, vol.70
, Issue.7
, pp. 1466-1481
-
-
Manevitz, L.1
Yousef, M.2
-
24
-
-
33745201000
-
Anomalous system call detection
-
D. Mutz, F. Valeur, G. Vigna, and C. Kruegel Anomalous system call detection ACM Trans. Inform. Syst. Secur. 9 1 2006 61 93
-
(2006)
ACM Trans. Inform. Syst. Secur.
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
25
-
-
80555140075
-
Scikit-learn: Machine learning in Python
-
F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion, O. Grisel, M. Blondel, P. Prettenhofer, R. Weiss, V. Dubourg, J. Vanderplas, A. Passos, D. Cournapeau, M. Brucher, M. Perrot, and E. Duchesnay Scikit-learn: Machine learning in Python J. Mach. Learn. Res. 12 2011 2825 2830
-
(2011)
J. Mach. Learn. Res.
, vol.12
, pp. 2825-2830
-
-
Pedregosa, F.1
Varoquaux, G.2
Gramfort, A.3
Michel, V.4
Thirion, B.5
Grisel, O.6
Blondel, M.7
Prettenhofer, P.8
Weiss, R.9
Dubourg, V.10
Vanderplas, J.11
Passos, A.12
Cournapeau, D.13
Brucher, M.14
Perrot, M.15
Duchesnay, E.16
-
26
-
-
34249057779
-
Analysis of computer intrusions using sequences of function calls
-
S. Peisert, M. Bishop, S. Karin, and K. Marzullo Analysis of computer intrusions using sequences of function calls IEEE Trans. Depend. Secure Comput. 4 2 2007 137 150
-
(2007)
IEEE Trans. Depend. Secure Comput.
, vol.4
, Issue.2
, pp. 137-150
-
-
Peisert, S.1
Bishop, M.2
Karin, S.3
Marzullo, K.4
-
28
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
M. Roesch Snort: lightweight intrusion detection for networks LISA 99 1999 229 238
-
(1999)
LISA
, vol.99
, pp. 229-238
-
-
Roesch, M.1
-
29
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
B. Schölkopf, J. Platt, J. Shawe-Taylor, A. Smola, and R. Williamson Estimating the support of a high-dimensional distribution Neural Comput. 13 7 2001 1443 1471
-
(2001)
Neural Comput.
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.2
Shawe-Taylor, J.3
Smola, A.4
Williamson, R.5
-
33
-
-
33745472867
-
Fabs: File and block surveillance system for determining anomalous disk accesses
-
P. Stanton, W. Yurcik, and L. Brumbaugh Fabs: file and block surveillance system for determining anomalous disk accesses Information Assurance Workshop, 2005, IAW'05, Proceedings from the Sixth Annual IEEE SMC, IEEE 2005 207 214
-
(2005)
Information Assurance Workshop, 2005, IAW'05, Proceedings from the Sixth Annual IEEE SMC, IEEE
, pp. 207-214
-
-
Stanton, P.1
Yurcik, W.2
Brumbaugh, L.3
-
34
-
-
26944448557
-
Anomaly detection in computer security and an application to file system accesses
-
S. Stolfo, S. Hershkop, L. Bui, R. Ferster, and K. Wang Anomaly detection in computer security and an application to file system accesses Found. Intell. Syst. 2005 14 28
-
(2005)
Found. Intell. Syst.
, pp. 14-28
-
-
Stolfo, S.1
Hershkop, S.2
Bui, L.3
Ferster, R.4
Wang, K.5
-
35
-
-
27144475340
-
A comparative evaluation of two algorithms for windows registry anomaly detection
-
S.J. Stolfo, F. Apap, E. Eskin, K. Heller, S. Hershkop, A. Honig, and K. Svore A comparative evaluation of two algorithms for windows registry anomaly detection J. Comput. Secur. 13 4 2005 659 693
-
(2005)
J. Comput. Secur.
, vol.13
, Issue.4
, pp. 659-693
-
-
Stolfo, S.J.1
Apap, F.2
Eskin, E.3
Heller, K.4
Hershkop, S.5
Honig, A.6
Svore, K.7
-
36
-
-
68949161842
-
A triangle area based nearest neighbors approach to intrusion detection
-
C.-F. Tsai, and C.-Y. Lin A triangle area based nearest neighbors approach to intrusion detection Pattern Recognit. 43 1 2010 222 229
-
(2010)
Pattern Recognit.
, vol.43
, Issue.1
, pp. 222-229
-
-
Tsai, C.-F.1
Lin, C.-Y.2
-
38
-
-
33750333036
-
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
-
W. Wang, X. Guan, X. Zhang, and L. Yang Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data Comput. Secur. 25 7 2006 539 550
-
(2006)
Comput. Secur.
, vol.25
, Issue.7
, pp. 539-550
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
Yang, L.4
-
40
-
-
78651432290
-
Intrusion detection using continuous time bayesian networks
-
J. Xu, and C. Shelton Intrusion detection using continuous time bayesian networks J. Artif. Intell. Res. 39 1 2010 745 774
-
(2010)
J. Artif. Intell. Res.
, vol.39
, Issue.1
, pp. 745-774
-
-
Xu, J.1
Shelton, C.2
-
41
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D. Yeung, and Y. Ding Host-based intrusion detection using dynamic and static behavioral models Pattern Recognit. 36 1 2003 229 243
-
(2003)
Pattern Recognit.
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.1
Ding, Y.2
-
42
-
-
21844433474
-
Application of online-training svms for real-time intrusion detection with different considerations
-
Z. Zhang, and H. Shen Application of online-training svms for real-time intrusion detection with different considerations Comput. Commun. 28 12 2005 1428 1442
-
(2005)
Comput. Commun.
, vol.28
, Issue.12
, pp. 1428-1442
-
-
Zhang, Z.1
Shen, H.2
|