-
1
-
-
84872504246
-
A survey of information-centric networking (draft)
-
Germany
-
B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, B. Ohlman, A survey of information-centric networking (draft), in: Information-Centric Networking, Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany, 2011.
-
(2011)
Information-Centric Networking, Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik
-
-
Ahlgren, B.1
Dannewitz, C.2
Imbrenda, C.3
Kutscher, D.4
Ohlman, B.5
-
2
-
-
76749083002
-
Networking named content
-
ACM, New York, NY, USA
-
V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, R.L. Braynard, Networking named content, in: Proceedings of the Fifth International Conference on Emerging Networking Experiments and Technologies (CoNEXT '09), ACM, New York, NY, USA, 2009.
-
(2009)
Proceedings of the Fifth International Conference on Emerging Networking Experiments and Technologies (CoNEXT '09)
-
-
Jacobson, V.1
Smetters, D.K.2
Thornton, J.D.3
Plass, M.F.4
Briggs, N.H.5
Braynard, R.L.6
-
3
-
-
77951149066
-
First netinf Architecture Description
-
FP7-ICT-2007-1-216041-4WARD/D-6.1
-
B. Ohlman, B. Ahlgren, M. Brunner, M. D'Ambrosio, C. Dannewitz, A. Eriksson, et al., First netinf Architecture Description. FP7-ICT-2007-1-216041-4WARD/D-6.1, 2009.
-
(2009)
-
-
Ohlman, B.1
Ahlgren, B.2
Brunner, M.3
D'Ambrosio, M.4
Dannewitz, C.5
Eriksson, A.6
-
4
-
-
84912095799
-
Congestion control in content-centric networking using neural network
-
PARC, a Xerox company
-
M. Hovaidi Ardestani, A. Karami, P. Sarolahti, J. Ott, Congestion control in content-centric networking using neural network, in: CCNxCon 2013. PARC, a Xerox company, 2013.
-
(2013)
CCNxCon 2013
-
-
Hovaidi Ardestani, M.1
Karami, A.2
Sarolahti, P.3
Ott, J.4
-
5
-
-
80052504558
-
Named data networking (NDN) project
-
L. Zhang, D. Estrin, J. Burke, V. Jacobson, J.D. Thornton, D.K. Smetters, et al., Named data networking (NDN) project, in: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (PARC TR-2010-3), 2010, pp. 68-73.
-
(2010)
Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (PARC TR-2010-3)
, pp. 68-73
-
-
Zhang, L.1
Estrin, D.2
Burke, J.3
Jacobson, V.4
Thornton, J.D.5
Smetters, D.K.6
-
6
-
-
84884207884
-
Effects-based feature identification for network intrusion detection
-
Louvieris P., Clewley N., Liu X. Effects-based feature identification for network intrusion detection. Neurocomputing 2013, 121:265-273.
-
(2013)
Neurocomputing
, vol.121
, pp. 265-273
-
-
Louvieris, P.1
Clewley, N.2
Liu, X.3
-
7
-
-
84874742021
-
DoS and DDoS in Named-Data Networking
-
abs/1208.0952
-
P. Gasti, G. Tsudik, E. Uzun, L. Zhang, DoS and DDoS in Named-Data Networking. CoRR (2012), abs/1208.0952.
-
(2012)
CoRR
-
-
Gasti, P.1
Tsudik, G.2
Uzun, E.3
Zhang, L.4
-
8
-
-
84870713037
-
Intrusion detection system. a comprehensive review
-
Liao H.J., Lin C.H.R., Lin Y.C., Tung K.Y. Intrusion detection system. a comprehensive review. J. Netw. Comput. Appl. 2013, 36(1):16-24.
-
(2013)
J. Netw. Comput. Appl.
, vol.36
, Issue.1
, pp. 16-24
-
-
Liao, H.J.1
Lin, C.H.R.2
Lin, Y.C.3
Tung, K.Y.4
-
9
-
-
80955142722
-
Swarm intelligence in intrusion detection. a survey
-
Kolias C., Kambourakis G., Maragoudakis M. Swarm intelligence in intrusion detection. a survey. Comput. Secur. 2011, 30(8):625-642.
-
(2011)
Comput. Secur.
, vol.30
, Issue.8
, pp. 625-642
-
-
Kolias, C.1
Kambourakis, G.2
Maragoudakis, M.3
-
10
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
Peddabachigari S., Abraham A., Grosan C., Thomas J. Modeling intrusion detection system using hybrid intelligent systems. J. Netw. Comput. Appl. 2007, 30(1):114-132.
-
(2007)
J. Netw. Comput. Appl.
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
11
-
-
34250315640
-
An overview of anomaly detection techniques. existing solutions and latest technological trends
-
Patcha A., Park J.M. An overview of anomaly detection techniques. existing solutions and latest technological trends. Comput. Netw. 2007, 51(12):3448-3470.
-
(2007)
Comput. Netw.
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
12
-
-
77956393826
-
Network anomaly detection through nonlinear analysis
-
Palmieri F., Fiore U. Network anomaly detection through nonlinear analysis. Comput. Secur. 2010, 29:737-755.
-
(2010)
Comput. Secur.
, vol.29
, pp. 737-755
-
-
Palmieri, F.1
Fiore, U.2
-
13
-
-
61749083929
-
Mcpad: a multiple classifier system for accurate payload-based anomaly detection
-
Perdisci R., Ariu D., Fogla P., Giacinto G., Lee W. Mcpad: a multiple classifier system for accurate payload-based anomaly detection. Comput. Netw. 2009, 53:864-881.
-
(2009)
Comput. Netw.
, vol.53
, pp. 864-881
-
-
Perdisci, R.1
Ariu, D.2
Fogla, P.3
Giacinto, G.4
Lee, W.5
-
14
-
-
80455177941
-
Towards cyber defense. research in intrusion detection and intrusion prevention systems
-
Faysel M.A., Haque S.S. Towards cyber defense. research in intrusion detection and intrusion prevention systems. Int. J. Comput. Sci. Netw. Secur. 2010, 10(7):316-325.
-
(2010)
Int. J. Comput. Sci. Netw. Secur.
, vol.10
, Issue.7
, pp. 316-325
-
-
Faysel, M.A.1
Haque, S.S.2
-
15
-
-
84887613816
-
Diversity measures for one-class classifier ensembles
-
Krawczyk B., Woźniak M. Diversity measures for one-class classifier ensembles. Neurocomputing 2014, 126:36-44.
-
(2014)
Neurocomputing
, vol.126
, pp. 36-44
-
-
Krawczyk, B.1
Woźniak, M.2
-
16
-
-
84884203185
-
Network anomaly detection with the restricted boltzmann machine
-
Fiore U., Palmieri F., Castiglione A., Santis A.D. Network anomaly detection with the restricted boltzmann machine. Neurocomputing 2013, 122(25):13-23.
-
(2013)
Neurocomputing
, vol.122
, Issue.25
, pp. 13-23
-
-
Fiore, U.1
Palmieri, F.2
Castiglione, A.3
Santis, A.D.4
-
18
-
-
79951747896
-
Explanations of unsupervised learning clustering applied to data security analysis
-
Corral G., Armengol E., Fornells A., Golobardes E. Explanations of unsupervised learning clustering applied to data security analysis. Neurocomputing 2009, 72(13-15):2754-2762.
-
(2009)
Neurocomputing
, vol.72
, Issue.13-15
, pp. 2754-2762
-
-
Corral, G.1
Armengol, E.2
Fornells, A.3
Golobardes, E.4
-
19
-
-
78650174100
-
A performance evaluation framework for association mining in spatial data
-
Wang Q., Megalooikonomou V. A performance evaluation framework for association mining in spatial data. Intell. Inf. Syst. 2010, 35(3):465-494.
-
(2010)
Intell. Inf. Syst.
, vol.35
, Issue.3
, pp. 465-494
-
-
Wang, Q.1
Megalooikonomou, V.2
-
21
-
-
84912087455
-
Choosing DBSCAN parameters automatically using differential evolution
-
(Published by Foundation of Computer Science, New York, USA)
-
Karami A., Johansson R. Choosing DBSCAN parameters automatically using differential evolution. Int. J. Comput. Appl. 2014, 91(7):1-11. (Published by Foundation of Computer Science, New York, USA).
-
(2014)
Int. J. Comput. Appl.
, vol.91
, Issue.7
, pp. 1-11
-
-
Karami, A.1
Johansson, R.2
-
22
-
-
37349047955
-
A hybridized approach to data clustering
-
Kao Y.T., Zahara E., Kao I.W. A hybridized approach to data clustering. Expert Syst. Appl. 2008, 34(3):1754-1762.
-
(2008)
Expert Syst. Appl.
, vol.34
, Issue.3
, pp. 1754-1762
-
-
Kao, Y.T.1
Zahara, E.2
Kao, I.W.3
-
23
-
-
35148867445
-
A genetic algorithm that exchanges neighboring centers for k-means clustering
-
Laszlo M., Mukherjee S. A genetic algorithm that exchanges neighboring centers for k-means clustering. Pattern Recognit. Lett. 2007, 28(16):2359-2366.
-
(2007)
Pattern Recognit. Lett.
, vol.28
, Issue.16
, pp. 2359-2366
-
-
Laszlo, M.1
Mukherjee, S.2
-
24
-
-
43249119791
-
An efficient k-means clustering algorithm
-
Zalik K.R. An efficient k-means clustering algorithm. Pattern Recognit. Lett. 2008, 29:1385-1391.
-
(2008)
Pattern Recognit. Lett.
, vol.29
, pp. 1385-1391
-
-
Zalik, K.R.1
-
25
-
-
2942665786
-
Particle swarm optimization algorithm and its application to clustering analysis
-
C.Y. Chen, F. Ye, Particle swarm optimization algorithm and its application to clustering analysis, in: Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2004, pp. 789-794.
-
(2004)
Proceedings of the IEEE International Conference on Networking, Sensing and Control
, pp. 789-794
-
-
Chen, C.Y.1
Ye, F.2
-
26
-
-
0021202650
-
K-means-type algorithms: a generalized convergence theorem and characterization of local optimality
-
Selim S.Z., Ismail M.A. K-means-type algorithms: a generalized convergence theorem and characterization of local optimality. IEEE Trans. Pattern Anal. Mach. Intell. 1984, 6(1):81-87.
-
(1984)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.6
, Issue.1
, pp. 81-87
-
-
Selim, S.Z.1
Ismail, M.A.2
-
27
-
-
84912131446
-
Data clustering for anomaly detection in content-centric networks
-
(Published by Foundation of Computer Science, New York, USA)
-
Karami A. Data clustering for anomaly detection in content-centric networks. Int. J. Comput. Appl. 2013, 81(7):1-8. (Published by Foundation of Computer Science, New York, USA).
-
(2013)
Int. J. Comput. Appl.
, vol.81
, Issue.7
, pp. 1-8
-
-
Karami, A.1
-
28
-
-
84888439861
-
Evolutionary k-means for distributed data sets
-
Naldi M., Campello R. Evolutionary k-means for distributed data sets. Neurocomputing 2014, 127:30-42.
-
(2014)
Neurocomputing
, vol.127
, pp. 30-42
-
-
Naldi, M.1
Campello, R.2
-
30
-
-
84888437077
-
Particle swarm optimization for construction of neural network-based prediction intervals
-
Quan H., Srinivasan D., Khosravi A. Particle swarm optimization for construction of neural network-based prediction intervals. Neurocomputing 2014, 127:172-180.
-
(2014)
Neurocomputing
, vol.127
, pp. 172-180
-
-
Quan, H.1
Srinivasan, D.2
Khosravi, A.3
-
33
-
-
0003578015
-
-
Edward Arnold / Halsted Press, London
-
Everitt B.S. Cluster Analysis 1993, Edward Arnold / Halsted Press, London. 3rd ed.
-
(1993)
Cluster Analysis
-
-
Everitt, B.S.1
-
35
-
-
84912059246
-
Minimization of the value of Davies-Bouldin index
-
Marbella, Spain
-
I. Kärkkäinen, P. Fränti, Minimization of the value of Davies-Bouldin index, in: Proceedings of the LASTED International Conference Signal Processing and Communications, Marbella, Spain, 2000, pp. 426-432.
-
(2000)
Proceedings of the LASTED International Conference Signal Processing and Communications
, pp. 426-432
-
-
Kärkkäinen, I.1
Fränti, P.2
-
36
-
-
84874514225
-
Hybrid clustering algorithm based on pso with the multidimensional asynchronism and stochastic disturbance method
-
Chen J. Hybrid clustering algorithm based on pso with the multidimensional asynchronism and stochastic disturbance method. J. Theor. Appl. Inf. Technol. 2012, 46(1):434-440.
-
(2012)
J. Theor. Appl. Inf. Technol.
, vol.46
, Issue.1
, pp. 434-440
-
-
Chen, J.1
-
37
-
-
57949092753
-
The clustering algorithm based on particle swarm optimization algorithm
-
IEEE Computer Society, Washington, DC, USA
-
P. Zhenkui, H. Xia, H. Jinfeng, The clustering algorithm based on particle swarm optimization algorithm, in: Proceedings of the International Conference on Intelligent Computation Technology and Automation (ICICTA'08), IEEE Computer Society, Washington, DC, USA, 2008, pp. 148-151.
-
(2008)
Proceedings of the International Conference on Intelligent Computation Technology and Automation (ICICTA'08)
, pp. 148-151
-
-
Zhenkui, P.1
Xia, H.2
Jinfeng, H.3
-
38
-
-
33750998476
-
Document clustering analysis based on hybrid pso+k-means algorithm
-
Cui X., Potok T.E. Document clustering analysis based on hybrid pso+k-means algorithm. J. Comput. Sci. 2005, 27-33.
-
(2005)
J. Comput. Sci.
, pp. 27-33
-
-
Cui, X.1
Potok, T.E.2
-
40
-
-
34047197634
-
K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection
-
Dalian, China
-
L. Xiao, Z. Shao, G. Liu, K-means algorithm based on particle swarm optimization algorithm for anomaly intrusion detection, in: Proceedings of the Sixth World Congress on Intelligent Control and Automation, Dalian, China, 2006, pp. 5854-5858.
-
(2006)
Proceedings of the Sixth World Congress on Intelligent Control and Automation
, pp. 5854-5858
-
-
Xiao, L.1
Shao, Z.2
Liu, G.3
-
41
-
-
84886396936
-
A lightweight mechanism for detection of cache pollution attacks in named data networking
-
Conti M., Gasti P., Teoli M. A lightweight mechanism for detection of cache pollution attacks in named data networking. Comput. Netw. 2013, 57(16):3178-3191.
-
(2013)
Comput. Netw.
, vol.57
, Issue.16
, pp. 3178-3191
-
-
Conti, M.1
Gasti, P.2
Teoli, M.3
-
42
-
-
84855199644
-
A survey of information-centric networking (draft)
-
Dagstuhl, Germany
-
B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, B. Ohlman, A survey of information-centric networking (draft), in: Proceedings from Dagstuhl Seminar 10492 on Information-Centric Networking, Dagstuhl, Germany, 2010.
-
(2010)
Proceedings from Dagstuhl Seminar 10492 on Information-Centric Networking
-
-
Ahlgren, B.1
Dannewitz, C.2
Imbrenda, C.3
Kutscher, D.4
Ohlman, B.5
-
43
-
-
84861616701
-
Enhancing cache robustness for content-centric networking
-
M. Xie, I. Widjaja, H. Wang, Enhancing cache robustness for content-centric networking, in: INFOCOM, 2012, pp. 2426-2434.
-
(2012)
INFOCOM
, pp. 2426-2434
-
-
Xie, M.1
Widjaja, I.2
Wang, H.3
-
45
-
-
80052504558
-
Named data networking (NDN) project
-
L. Zhang, D. Estrin, J. Burke, V. Jacobson, J.D. Thornton, D.K. Smetters, et al. Named data networking (NDN) project, in: Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, Number PARC TR-2010-3, 2010, pp. 68-73.
-
(2010)
Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking, Number PARC TR-2010-3
, pp. 68-73
-
-
Zhang, L.1
Estrin, D.2
Burke, J.3
Jacobson, V.4
Thornton, J.D.5
Smetters, D.K.6
-
47
-
-
84912139058
-
Poseidon: mitigating interest flooding DDoS attacks in named data networking
-
abs/1303.4823
-
A. Compagno, M. Conti, P. Gasti, G. Tsudik, Poseidon: mitigating interest flooding DDoS attacks in named data networking. CoRR (2013), abs/1303.4823.
-
(2013)
CoRR
-
-
Compagno, A.1
Conti, M.2
Gasti, P.3
Tsudik, G.4
-
49
-
-
0029535737
-
Particle swarm optimization
-
J. Kennedy, R. Eberhart, Particle swarm optimization, in: Proceedings in IEEE International Conference Neural Networks, vol. 4, 1995, pp. 1942-1948.
-
(1995)
Proceedings in IEEE International Conference Neural Networks
, vol.4
, pp. 1942-1948
-
-
Kennedy, J.1
Eberhart, R.2
-
50
-
-
84885853221
-
Enhanced particle swarm optimizer incorporating a weighted particle
-
Li N.J., Wang W.J., Hsu C.C.J., Chang W., Chou H.G., Chang J.W. Enhanced particle swarm optimizer incorporating a weighted particle. Neurocomputing 2014, 124:218-227.
-
(2014)
Neurocomputing
, vol.124
, pp. 218-227
-
-
Li, N.J.1
Wang, W.J.2
Hsu, C.C.J.3
Chang, W.4
Chou, H.G.5
Chang, J.W.6
-
53
-
-
0033666935
-
Comparing inertia weights and constriction factors in particle swarm optimization
-
R.C. Eberhart, Y. Shi, Comparing inertia weights and constriction factors in particle swarm optimization, in: Proceedings of the Evolutionary Computation, vol. 1, 2000, pp. 84-88.
-
(2000)
Proceedings of the Evolutionary Computation
, vol.1
, pp. 84-88
-
-
Eberhart, R.C.1
Shi, Y.2
-
54
-
-
84875089050
-
Boundary handling approaches in particle swarm optimization
-
N. Padhye, K. Deb, P. Mittal, Boundary handling approaches in particle swarm optimization, in: BIC-TA (1), 2012, pp. 287-298.
-
(2012)
BIC-TA
, Issue.1
, pp. 287-298
-
-
Padhye, N.1
Deb, K.2
Mittal, P.3
-
57
-
-
84888431725
-
Agreement-based fuzzy c-means for clustering data with blocks of features
-
Izakian H., Pedrycz W. Agreement-based fuzzy c-means for clustering data with blocks of features. Neurocomputing 2014, 127:266-280.
-
(2014)
Neurocomputing
, vol.127
, pp. 266-280
-
-
Izakian, H.1
Pedrycz, W.2
-
58
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: a review
-
Wu S.X., Banzhaf W. The use of computational intelligence in intrusion detection systems: a review. J. Appl. Soft Comput. 2010, 10:1-35.
-
(2010)
J. Appl. Soft Comput.
, vol.10
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
59
-
-
30644467871
-
Unsupervised clustering methods for identifying rare events in anomaly detection
-
W. Chimphlee, A.H. Abdullah, S. Chimphlee, S. Srinoy, Unsupervised clustering methods for identifying rare events in anomaly detection, in: The Sixth International Enformatika Conference, 2005, pp. 26-28.
-
(2005)
The Sixth International Enformatika Conference
, pp. 26-28
-
-
Chimphlee, W.1
Abdullah, A.H.2
Chimphlee, S.3
Srinoy, S.4
-
60
-
-
27144490740
-
Detecting anomalous network traffic with combined fuzzy-based approaches
-
H. tao He, X. nan Luo, B. lu Liu, Detecting anomalous network traffic with combined fuzzy-based approaches, in: International Conference on Intelligent Computing (ICIC), 2005, pp. 433-442.
-
(2005)
International Conference on Intelligent Computing (ICIC)
, pp. 433-442
-
-
Tao He, H.1
Nan Luo, X.2
Lu Liu, B.3
-
62
-
-
84912059079
-
Utilization of multi attribute decision making techniques to integrate automatic and manual ranking of options
-
Karami A., Johansson R. Utilization of multi attribute decision making techniques to integrate automatic and manual ranking of options. J. Inf. Sci. Eng. 2014, 30(2):519-534.
-
(2014)
J. Inf. Sci. Eng.
, vol.30
, Issue.2
, pp. 519-534
-
-
Karami, A.1
Johansson, R.2
-
65
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W., Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 2000, 3(4):227-261.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
66
-
-
76249095726
-
Traffic anomaly detection using k-means clustering
-
4GI/ITG Workshop MMBnet, Hamburg, Germany
-
G. Münz, S. Li, G. Carle, Traffic anomaly detection using k-means clustering, in: Proceedings of Performance, Reliability and Dependability Evaluation of Communication Networks and Distributed Systems, 4GI/ITG Workshop MMBnet, Hamburg, Germany, 2007.
-
(2007)
Proceedings of Performance, Reliability and Dependability Evaluation of Communication Networks and Distributed Systems
-
-
Münz, G.1
Li, S.2
Carle, G.3
-
67
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
Bradley A. The use of the area under the ROC curve in the evaluation of machine learning algorithms. Pattern Recognit. 1997, 30(7):1145-1159.
-
(1997)
Pattern Recognit.
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.1
|