-
3
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson, S. (2003). The base-rate fallacy and the difficulty of intrusion detection. ACM Transaction on Information and System Security, 3, 186-205.
-
(2003)
ACM Transaction on Information and System Security
, vol.3
, pp. 186-205
-
-
Anderson, J.1
-
5
-
-
53049099150
-
Critical study of neural networks in detecting intrusions
-
Beghdad, R. (2008). Critical study of neural networks in detecting intrusions. Computers and Security, 27(5-6), 168-175.
-
(2008)
Computers and Security
, vol.27
, Issue.5-6
, pp. 168-175
-
-
Beghdad, R.1
-
7
-
-
33947581868
-
Hybrid flexible neural-tree-based intrusion detection systems
-
DOI 10.1002/int.20203
-
Chen, Y. H., Abraham, A., & Yang, B. (2007). Hybrid flexible neural-tree-based intrusion detection systems. International Journal of Intelligent Systems, 22(4), 337-352. (Pubitemid 46480226)
-
(2007)
International Journal of Intelligent Systems
, vol.22
, Issue.4
, pp. 337-352
-
-
Chen, Y.1
Abraham, A.2
Yang, B.3
-
8
-
-
84974743850
-
Fuzzy model identification based on cluster estimation
-
Chiu, S. L. (1994). Fuzzy model identification based on cluster estimation. Journal of Intelligent and Fuzzy Systems, 2, 267-278.
-
(1994)
Journal of Intelligent and Fuzzy Systems
, vol.2
, pp. 267-278
-
-
Chiu, S.L.1
-
9
-
-
25844491810
-
An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks
-
DOI 10.1016/j.eswa.2005.05.002, PII S0957417405000989
-
Depren, O., Topallar, M., Anarim, E., & Ciliz, M. K. (2005). An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks. Expert Systems with Applications, 29(4), 713-722. (Pubitemid 41394445)
-
(2005)
Expert Systems with Applications
, vol.29
, Issue.4
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
10
-
-
79851498286
-
Data mining for network intrusion detection
-
Dokas, P., Ertoz, L., Lazarevic, A., Srivastava, J., & Tan, P. N. (2002). Data mining for network intrusion detection. Proceeding of NGDM, 21-30.
-
(2002)
Proceeding of NGDM
, pp. 21-30
-
-
Dokas, P.1
Ertoz, L.2
Lazarevic, A.3
Srivastava, J.4
Tan, P.N.5
-
13
-
-
33744529638
-
Evolutionary neural networks for anomaly detection based on the behavior of a program
-
Han, S. J., & Cho, S. B. (2005). Evolutionary neural networks for anomaly detection based on the behavior of a program. IEEE Transactions on Systems, Man and Cybernetics (Part B), 36(3), 559-570.
-
(2005)
IEEE Transactions on Systems, Man and Cybernetics (Part B)
, vol.36
, Issue.3
, pp. 559-570
-
-
Han, S.J.1
Cho, S.B.2
-
16
-
-
9444243157
-
Hybrid neural networks for intrusion detection system
-
Jirapummin, C., Wattanapongsakorn, N., & Kanthamanon, P. (2002). Hybrid neural networks for intrusion detection system. Proceedings of ITC-CSCC, 928-931.
-
(2002)
Proceedings of ITC-CSCC
, pp. 928-931
-
-
Jirapummin, C.1
Wattanapongsakorn, N.2
Kanthamanon, P.3
-
17
-
-
0037411435
-
The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors
-
Joo, D., Hong, T., & Han, I. (2003). The neural network models for IDS based on the asymmetric costs of false negative errors and false positive errors. Expert Systems with Applications, 25(1), 69-75.
-
(2003)
Expert Systems with Applications
, vol.25
, Issue.1
, pp. 69-75
-
-
Joo, D.1
Hong, T.2
Han, I.3
-
18
-
-
50249160574
-
-
(accessed March 2009)
-
KDD CUP 1999 dataset (1999). http://archive.ics.uci.edu/ml/datasets/ KDD+Cup+1999+Data (accessed March 2009).
-
(1999)
KDD CUP 1999 Dataset
-
-
-
20
-
-
0032630098
-
Detecting computer and network misuse through the production-based expert system toolset
-
Lindqvist, U., & Porras, P. A. (1999). Detecting computer and network misuse through the production-based expert system toolset. In: IEEE symposium on security and privacy (pp. 146-161).
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.A.2
-
21
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
DOI 10.1109/MCOM.2002.1039860
-
Manikopoulos, C., & Papavassiliou, S. (2002). Network intrusion and fault detection: A statistical anomaly approach. IEEE Communications Magazine, 40(10), 76-82. (Pubitemid 35311949)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
22
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
Mukkamala, S., Janoski, G., & Sung, A. (2002). Intrusion detection using neural networks and support vector machines. In: Proceedings of the IEEE international joint conference on neural networks (pp. 1702-1707). (Pubitemid 34647886)
-
(2002)
Proceedings of the International Joint Conference on Neural Networks
, vol.2
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
23
-
-
8444224269
-
Intrusion detection systems using adaptive regression splines
-
Mukkamala, S., Sung, A. H., Abraham, A., & Ramos, V. (2004). Intrusion detection systems using adaptive regression splines. In: Proceedings of ICEIS-04 (pp. 26-33).
-
(2004)
Proceedings of ICEIS-04
, pp. 26-33
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
Ramos, V.4
-
24
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
-
Patcha, A., & Park, J. M. (2007). An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks, 51(12), 3448-3470. (Pubitemid 46921030)
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
25
-
-
84888927134
-
Frequent rules for intrusive anomaly detection with Internet data mining
-
Qin, M., & Hwang, K. (2004). Frequent rules for intrusive anomaly detection with Internet data mining. In: Proceedings of the 13th USENIX security symposium (pp. 456-462).
-
(2004)
Proceedings of the 13th USENIX security symposium
, pp. 456-462
-
-
Qin, M.1
Hwang, K.2
-
26
-
-
84898944587
-
Intrusion detection with neural networks
-
Cambridge, MA: Springer
-
Ryan, J., Lin, M., & Miikkulainen, R. (1998). Intrusion detection with neural networks. Advances in neural information processing systems (Vol. 10). Cambridge, MA: Springer.
-
(1998)
Advances in neural information processing systems
, vol.10
-
-
Ryan, J.1
Lin, M.2
Miikkulainen, R.3
-
27
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
Shyu, M. L., Chen, S. C., Sarinnapakorn, K., & Chang, L. (2003). A novel anomaly detection scheme based on principal component classifier. In: Proceedings of the IEEE foundations and new directions of data mining workshop (pp. 172-179).
-
(2003)
Proceedings of the IEEE foundations and New Directions of Data Mining Workshop
, pp. 172-179
-
-
Shyu, M.L.1
Chen, S.C.2
Sarinnapakorn, K.3
Chang, L.4
-
28
-
-
38649100586
-
Detecting attack signatures in the real network traffic with ANNIDA
-
DOI 10.1016/j.eswa.2007.03.011, PII S095741740700125X
-
Silva, L. D. S., Santos, A. C., Mancilha, T. D., Silva, J. D., & Montes, A. (2008). Detecting attack signatures in the real network traffic with ANNIDA. Expert Systems with Applications, 34(4), 2326-2333. (Pubitemid 351173743)
-
(2008)
Expert Systems with Applications
, vol.34
, Issue.4
, pp. 2326-2333
-
-
De Sa Silva, L.1
Dos Santos, A.C.F.2
Mancilha, T.D.3
Da Silva, J.D.S.4
Montes, A.5
-
29
-
-
0029531733
-
The application of neural networks to UNIX computer security. In: Proceedings of the
-
Tan, K. (1995). The application of neural networks to UNIX computer security. In: Proceedings of the IEEE international conference on neural networks (Vol. 7, pp. 476-481).
-
(1995)
IEEE international conference on neural networks
, vol.7
, pp. 476-481
-
-
Tan, K.1
-
32
-
-
58349096877
-
Data mining-based intrusion detectors
-
Wu, S., & Yen, E. (2009). Data mining-based intrusion detectors. Expert Systems with Applications, 36(3), 5605-5612.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.3
, pp. 5605-5612
-
-
Wu, S.1
Yen, E.2
-
33
-
-
0028482884
-
Approximate clustering via the mountain method
-
Yager, R. R., & Filev, D. P. (1994). Approximate clustering via the mountain method. IEEE Transactions on Systems, Man and Cybernetics, 24(8), 1279-1284.
-
(1994)
IEEE Transactions on Systems, Man and Cybernetics
, vol.24
, Issue.8
, pp. 1279-1284
-
-
Yager, R.R.1
Filev, D.P.2
|