-
1
-
-
84893435715
-
Web malware that target web application
-
IGI Global, Hershey, PA
-
Alazab, A., Abawajy, J. and Hobbs, M. (2013), "Web malware that target web application", Social Network Engineering for Secure Web Data and Services, IGI Global, Hershey, PA, pp. 248-264.
-
(2013)
Social Network Engineering for Secure Web Data and Services
, pp. 248-264
-
-
Alazab, A.1
Abawajy, J.2
Hobbs, M.3
-
2
-
-
84872150200
-
Using feature selection for intrusion detection system
-
Gold Coast
-
Alazab, A., Hobbs, M., Abawajy, J. and Alazab, M. (2012), "Using feature selection for intrusion detection system", 2012 International Symposium on Communications and Information Technologies (ISCIT), Gold Coast, pp. 296-301.
-
(2012)
2012 International Symposium on Communications and Information Technologies (ISCIT)
, pp. 296-301
-
-
Alazab, A.1
Hobbs, M.2
Abawajy, J.3
Alazab, M.4
-
3
-
-
84868135965
-
Cybercrime: The case of obuscated malware
-
Safety & Sustainability, Thessaloniki
-
Alazab, M., Ventatraman, S., Watters, P., Alazab, M. and Alazab, A. (2011a), "Cybercrime: the case of obuscated malware", in 7th International Conference on Global Security, Safety & Sustainability, Thessaloniki.
-
(2011)
7th International Conference on Global Security
-
-
Alazab, M.1
Ventatraman, S.2
Watters, P.3
Alazab, M.4
Alazab, A.5
-
4
-
-
84870509534
-
Zero-day malware detection based on supervised learning algorithms of API call signatures
-
Ballarat
-
Alazab, M., Venkatraman, S., Watters, P. and Alazab, M. (2011b), "Zero-day malware detection based on supervised learning algorithms of API call signatures", Australasian Data Mining Conference (AusDM 11), Ballarat, pp. 171-182.
-
(2011)
Australasian Data Mining Conference (AusDM 11)
, pp. 171-182
-
-
Alazab, M.1
Venkatraman, S.2
Watters, P.3
Alazab, M.4
-
8
-
-
38149011298
-
Swaddler: An approach for the anomaly-based detection of state violations in web applications
-
Queensland, 5-7 September
-
Cova, M., Balzarotti, D., Felmetsger, V. and Vigna, G. (2007), "Swaddler: an approach for the anomaly-based detection of state violations in web applications", Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID), Queensland, 5-7 September, pp. 63-86.
-
(2007)
Proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 63-86
-
-
Cova, M.1
Balzarotti, D.2
Felmetsger, V.3
Vigna, G.4
-
9
-
-
56549099594
-
WebIDS: A cooperative bayesian anomaly-based intrusion detection system for web applications (Extended Abstract)
-
Springer Berlin, Heidelberg
-
Dagorn, N. (2008), "WebIDS: a cooperative bayesian anomaly-based intrusion detection system for web applications (Extended Abstract) ", Recent Advances in Intrusion Detection, Springer Berlin, Heidelberg pp. 392-393.
-
(2008)
Recent Advances in Intrusion Detection
, pp. 392-393
-
-
Dagorn, N.1
-
10
-
-
80051793908
-
Data preprocessing for anomaly based network intrusion detection: A review
-
Davis, J. J. and Clark, A. J. (2011), "Data preprocessing for anomaly based network intrusion detection: a review", Computers & Security, Vol. 30 Nos 6/7, pp. 353-375.
-
(2011)
Computers & Security
, vol.30
, Issue.6-7
, pp. 353-375
-
-
Davis, J.J.1
Clark, A.J.2
-
11
-
-
79960556588
-
Alert correlation in collaborative intelligent intrusion detection systems - A survey
-
Elshoush, H. T. and Osman, I. M. (2011), "Alert correlation in collaborative intelligent intrusion detection systems - a survey", Applied Soft Computing, Vol. 11 No. 7, pp. 4349-4365.
-
(2011)
Applied Soft Computing
, vol.11
, Issue.7
, pp. 4349-4365
-
-
Elshoush, H.T.1
Osman, I.M.2
-
12
-
-
80455177941
-
Towards cyber defense: Research in intrusion detection and intrusion prevention systems
-
Faysel, M. A. and Haque, S. S. (2010), "Towards cyber defense: research in intrusion detection and intrusion prevention systems", International Journal of Computer Science and Network Security, Vol. 10 No. 7, pp. 316-325.
-
(2010)
International Journal of Computer Science and Network Security
, vol.10
, Issue.7
, pp. 316-325
-
-
Faysel, M.A.1
Haque, S.S.2
-
13
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G. and Vázquez, E. (2009), "Anomaly-based network intrusion detection: techniques, systems and challenges", Computers & Security, Vol. 28 Nos 1/2, pp. 18-28.
-
(2009)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
García-Teodoro, P.1
Díaz-Verdejo, J.2
Maciá-Fernández, G.3
Vázquez, E.4
-
15
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
Horng, S. J., Su, M. Y., Chen, Y. H., Kao, T. W., Chen, R. J., Lai, J. L. and Perkasa, C. D. (2011), "A novel intrusion detection system based on hierarchical clustering and support vector machines", Expert Systems with Applications, Vol. 38 No. 1, pp. 306-313.
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.1
, pp. 306-313
-
-
Horng, S.J.1
Su, M.Y.2
Chen, Y.H.3
Kao, T.W.4
Chen, R.J.5
Lai, J.L.6
Perkasa, C.D.7
-
16
-
-
84870698695
-
Database intrusion prevention cum detection system with appropriate response
-
Jaiswal, A. and Jain, S. (2010), "Database intrusion prevention cum detection system with appropriate response", International Journal of Information Technology, Vol. 2 No. 2, pp. 651-656.
-
(2010)
International Journal of Information Technology
, vol.2
, Issue.2
, pp. 651-656
-
-
Jaiswal, A.1
Jain, S.2
-
17
-
-
14844319067
-
Anomaly detection of web-based attacks
-
Washington, DC, 27-31 October
-
Kruegel, C. and Vigna, G. (2008), "Anomaly detection of web-based attacks", CCS'03 Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, 27-31 October, pp. 251-261.
-
(2008)
CCS'03 Proceedings of the 10th ACM Conference on Computer and Communications Security
, pp. 251-261
-
-
Kruegel, C.1
Vigna, G.2
-
18
-
-
76649142367
-
Protecting a moving target: Addressing web application concept drift
-
Springer Berlin, Heidelberg
-
Maggi, F., Robertson, W., Kruegel, C. and Vigna, G. (2009), "Protecting a moving target: addressing web application concept drift", Recent Advances in Intrusion Detection, Springer Berlin, Heidelberg, pp. 21-40.
-
(2009)
Recent Advances in Intrusion Detection
, pp. 21-40
-
-
Maggi, F.1
Robertson, W.2
Kruegel, C.3
Vigna, G.4
-
19
-
-
84904645119
-
-
PhD Dissertation, University of California at Santa Barbara, Santa Barbara, CA
-
Robertson, W. K. (2010), "Detecting and preventing attacks against web applications", PhD Dissertation, University of California at Santa Barbara, Santa Barbara, CA.
-
(2010)
Detecting and Preventing Attacks Against Web Applications
-
-
Robertson, W.K.1
-
21
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
Seattle, Washington, 7-12 November
-
Roesch, M. (1999), "Snort-lightweight intrusion detection for networks", Proceedings of the 13th USENIX Conference on System Administration, Seattle, Washington, 7-12 November, pp. 229-238.
-
(1999)
Proceedings of the 13th USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
22
-
-
63049125148
-
An incremental frequent structure mining framework for real-time alert correlation
-
Sadoddin, R. and Ghorbani, A. A. (2009), "An incremental frequent structure mining framework for real-time alert correlation", Computers & Security, Vol. 28 Nos 3/4, pp. 153-173.
-
(2009)
Computers & Security
, vol.28
, Issue.3-4
, pp. 153-173
-
-
Sadoddin, R.1
Ghorbani, A.A.2
-
23
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
Oakland, CA
-
Sekar, R., Bendre, M., Dhurjati, D. and Bollineni, P. (2001), "A fast automaton-based method for detecting anomalous program behaviors", Proceedings of the 2001 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 144-155.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
24
-
-
84865058730
-
Intrusion response systems: Survey and taxonomy
-
Shameli-Sendi, A., Ezzati-Jivan, N., Jabbarifar, M. and Dagenais, M. (2012), "Intrusion response systems: survey and taxonomy", International Journal of Computer Science Network Security, Vol. 12 No. 1, pp. 1-14.
-
(2012)
International Journal of Computer Science Network Security
, vol.12
, Issue.1
, pp. 1-14
-
-
Shameli-Sendi, A.1
Ezzati-Jivan, N.2
Jabbarifar, M.3
Dagenais, M.4
-
25
-
-
0038324607
-
-
SPADE, "Silicon defense", available at: www.silicondefense.com/software/spice
-
Silicon Defense
-
-
SPADE1
-
26
-
-
34548776459
-
A taxonomy of intrusion response systems
-
Stakhanova, N., Basu, S. and Wong, J. (2007), "A taxonomy of intrusion response systems", International Journal of Information and Computer Security, Vol. 1 Nos 1/2, pp. 169-184.
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 169-184
-
-
Stakhanova, N.1
Basu, S.2
Wong, J.3
-
27
-
-
77954786610
-
Agent based correlation model for intrusion detection alerts
-
Vancouver
-
Taha, A. E., Ghaffar, I. A., Bahaa Eldin, A. M. and Mahdi, H. M. (2010), "Agent based correlation model for intrusion detection alerts", 2010 IEEE International Conference on Intelligence and Security Informatics (ISI), Vancouver, pp. 89-94.
-
(2010)
2010 IEEE International Conference on Intelligence and Security Informatics (ISI)
, pp. 89-94
-
-
Taha, A.E.1
Ghaffar, I.A.2
Bahaa Eldin, A.M.3
Mahdi, H.M.4
-
28
-
-
77950575061
-
Adetailed analysisofthe KDD CUP 99 data set
-
Tavallaee, M., Bagheri, E., Lu, W. and Ghorbani, A. A. (2009), "Adetailed analysisofthe KDD CUP 99 data set", Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009.
-
(2009)
Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defence Applications 2009
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
29
-
-
0002067431
-
NetSTAT: A network-based intrusion detection system
-
Vigna, G. and Kemmerer, R. A. (1999), "NetSTAT: a network-based intrusion detection system", Journal of Computer Security, Vol. 7 No. 1, pp. 37-72.
-
(1999)
Journal of Computer Security
, vol.7
, Issue.1
, pp. 37-72
-
-
Vigna, G.1
Kemmerer, R.A.2
-
30
-
-
68149139611
-
Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries
-
Vigna, G., Valeur, F., Balzarotti, D., Robertson, W., Kruegel, C. and Kirda, E. (2009), "Reducing errors in the anomaly-based detection of web-based attacks through the combined analysis of web requests and SQL queries", Journal of Computer Security, Vol. 17 No. 3, pp. 305-329.
-
(2009)
Journal of Computer Security
, vol.17
, Issue.3
, pp. 305-329
-
-
Vigna, G.1
Valeur, F.2
Balzarotti, D.3
Robertson, W.4
Kruegel, C.5
Kirda, E.6
-
31
-
-
79551626282
-
Linguistic summarization using IF-THEN rules and interval type-2 fuzzy sets
-
Wu, D. and Mendel, J. M. (2011), "Linguistic summarization using IF-THEN rules and interval type-2 fuzzy sets", IEEE Transactions on Fuzzy Systems, Vol. 19 No. 1, pp. 136-151.
-
(2011)
IEEE Transactions on Fuzzy Systems
, vol.19
, Issue.1
, pp. 136-151
-
-
Wu, D.1
Mendel, J.M.2
-
32
-
-
84868144659
-
Web application protection against SQL injection attack
-
Hershey, PA
-
Alazab, A., Alazab, M., Abawajy, J. and Hobbs, M. (2011), "Web application protection against SQL injection attack", Proceedings of the 7th International Conference on Information Technology and Applications, Hershey, PA, pp. 1-7.
-
(2011)
Proceedings of the 7th International Conference on Information Technology and Applications
, pp. 1-7
-
-
Alazab, A.1
Alazab, M.2
Abawajy, J.3
Hobbs, M.4
|