-
1
-
-
84894646147
-
Network anomaly detection: Methods, systems and tools
-
accepted to
-
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "Network anomaly detection: Methods, systems and tools", accepted to IEEE Communications surveys and Tutorials, 2014.
-
(2014)
IEEE Communications Surveys and Tutorials
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
2
-
-
7544223741
-
A survey of outlier detection methodologies
-
V. Hodge and J. Austin, "A survey of outlier detection methodologies", Artificial Intelligence Review, vol. 22, no. 2, pp. 85-126, 2004.
-
(2004)
Artificial Intelligence Review
, vol.22
, Issue.2
, pp. 85-126
-
-
Hodge, V.1
Austin, J.2
-
3
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
October
-
C. Manikopoulus and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach", IEEE Communications Magazine, vol. 40, pp. 76-82, October 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, pp. 76-82
-
-
Manikopoulus, C.1
Papavassiliou, S.2
-
4
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical prepocessing and neural network classification
-
Z. Zhang, J. Li, C. N. Manikopoulus, J. Jorgenson, and J. Ucles, "HIDE: a hierarchical network intrusion detection system using statistical prepocessing and neural network classification", in Proc. IEEE Man. Systems and Cybernetics Information Assurance Workshop, 2001.
-
(2001)
Proc. IEEE Man. Systems and Cybernetics Information Assurance Workshop
-
-
Zhang, Z.1
Li, J.2
Manikopoulus, C.N.3
Jorgenson, J.4
Ucles, J.5
-
5
-
-
78650634152
-
Efficient decision tree for protocol analysis in intrusion detection
-
December
-
T. Abbes, A. Bouhoula, and M. Rusinowitch, "Efficient decision tree for protocol analysis in intrusion detection", Internation Journal Security and Networks, vol. 5, pp. 220-235, December 2010.
-
(2010)
Internation Journal Security and Networks
, vol.5
, pp. 220-235
-
-
Abbes, T.1
Bouhoula, A.2
Rusinowitch, M.3
-
6
-
-
33847704184
-
K-means + ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods
-
March
-
S. R. Gaddam, V. V. Phoha, and K. S. Balagni, "K-means + ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods", IEEE Trans. Knowl. Data Eng., vol. 19, pp. 345-354, March 2007.
-
(2007)
IEEE Trans. Knowl. Data Eng.
, vol.19
, pp. 345-354
-
-
Gaddam, S.R.1
Phoha, V.V.2
Balagni, K.S.3
-
7
-
-
79956058361
-
Machine learning approach for IP-flow record anomaly detection
-
C. Wagner, J. Francois, R. State, and T. Engel, "Machine learning approach for IP-flow record anomaly detection", in Proc. 10th International IFIP TC 6 Conference on Networking - Volume Part I, pp. 28-39, 2011.
-
(2011)
Proc. 10th International IFIP TC 6 Conference on Networking - Volume Part I
, pp. 28-39
-
-
Wagner, C.1
Francois, J.2
State, R.3
Engel, T.4
-
8
-
-
84916913984
-
Data mining - Next generation challenges and future directions
-
ch
-
L. Ertoz, E. Eilertson, A. Lazarevic, P. Tan, V. Kumar, and J. Srivastava, "Data mining - next generation challenges and future directions", ch. MINDS-Minnesota Intrusion Detection System, 2004.
-
(2004)
MINDS-Minnesota Intrusion Detection System
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.4
Kumar, V.5
Srivastava, J.6
-
9
-
-
84866068108
-
An effective unsupervised network anomaly detection method
-
M. H. Bhuyan, D. K. Bhattacharyya, and J. K. Kalita, "An effective unsupervised network anomaly detection method", in Proc. Internation Conference on Advances in Computing, Communications and Informatics, pp. 533-539, 2012.
-
(2012)
Proc. Internation Conference on Advances in Computing, Communications and Informatics
, pp. 533-539
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
10
-
-
84871879955
-
Rule based network intrusion detection using genetic algorithm
-
March
-
M. S. A. Khan, "Rule based network intrusion detection using genetic algorithm", International Journal Computer Applications, vol. 18, pp. 26-29, March 2011.
-
(2011)
International Journal Computer Applications
, vol.18
, pp. 26-29
-
-
Khan, M.S.A.1
-
11
-
-
33847406678
-
A hierarchical intrusion detection model based on the PCA neural networks
-
G. Liu, Z. Yi, and S. Yang, "A hierarchical intrusion detection model based on the PCA neural networks", Neurocomputing, vol. 70, no. 7-9, pp. 1561-1568, 2007.
-
(2007)
Neurocomputing
, vol.70
, Issue.7-9
, pp. 1561-1568
-
-
Liu, G.1
Yi, Z.2
Yang, S.3
-
12
-
-
84900537680
-
An intrusion detection model based on fuzzy class-association-rule mining using genetic network programming
-
S. Mabu, C. Chen, N. Lu, K. Shimada, and K. Hirasawa, "An intrusion detection model based on fuzzy class-association-rule mining using genetic network programming", IEEE Trans. Syst. Man. Cybern. Part C Appl. Rev., vol. 41, no. 1, pp. 130-139, 2011.
-
(2011)
IEEE Trans. Syst. Man. Cybern. Part C Appl. Rev.
, vol.41
, Issue.1
, pp. 130-139
-
-
Mabu, S.1
Chen, C.2
Lu, N.3
Shimada, K.4
Hirasawa, K.5
-
15
-
-
68349159202
-
Detecting anomalies and intruders
-
A. Sattar and B.-h. Kang, eds., Lecture Notes in Computer Science, Springer, Berlin Heidelberg
-
A. Prayote and P. Compton, "Detecting anomalies and intruders", in AI 2006: Advances in Artificial Intelligence (A. Sattar and B.-h. Kang, eds.), vol. 4304 of Lecture Notes in Computer Science, pp. 1084-1088, Springer Berlin Heidelberg, 2006.
-
(2006)
AI 2006: Advances in Artificial Intelligence
, vol.4304
, pp. 1084-1088
-
-
Prayote, A.1
Compton, P.2
-
16
-
-
0029563452
-
Prudent expert systems with credentials: Managing the expertise of decision support systems
-
G. Edwards, B. Kang, P. Preston, and P. Compton, "Prudent expert systems with credentials: Managing the expertise of decision support systems", International Journal of Biomedical Computing, vol. 40, no. 2, pp. 125-132, 1995.
-
(1995)
International Journal of Biomedical Computing
, vol.40
, Issue.2
, pp. 125-132
-
-
Edwards, G.1
Kang, B.2
Preston, P.3
Compton, P.4
-
17
-
-
84870452716
-
-
Apache Hadoop, http://hadoop. apache.org/.
-
Apache Hadoop
-
-
|