-
1
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
W. Lee, S. J. Stolfo, K. W. Mok, "A data mining framework for building intrusion detection models", in: Proceedings of IEEE Symposium on Security and Privacy, 1999, pp. 120-132.
-
(1999)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
3
-
-
0030157145
-
Birch: An efficient data clustering method for very large databases
-
T. Zhang, R. Ramakrishnan, M. Livny, "BIRCH: an efficient data clustering method for very large databases", in: Proceedings of SIGMOD, ACM, 1996, pp. 103-114.
-
(1996)
Proceedings of SIGMOD, ACM
, pp. 103-114
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
-
4
-
-
36049030250
-
A new intrusion detection system using support vector machines and hierarchical clustering
-
L. Khan, M. Awad, B. Thuraisingham, "A new intrusion detection system using support vector machines and hierarchical clustering", The VLDB Journal 16(2007) 507-521.
-
(2007)
The VLDB Journal
, vol.16
, pp. 507-521
-
-
Khan, L.1
Awad, M.2
Thuraisingham, B.3
-
5
-
-
84901589215
-
Adaptive intrusion detection based on machine learning: Feature extraction, classifier construction and sequential pattern prediction
-
X. Xu, "Adaptive intrusion detection based on machine learning: feature extraction, classifier construction and sequential pattern prediction", Information Assurance and Security 4 (2006) 237-246.
-
(2006)
Information Assurance and Security
, vol.4
, pp. 237-246
-
-
Xu, X.1
-
6
-
-
84886382572
-
High performance query expansion using adaptive co-training
-
J. X. Huang, J. Miao, Ben He, "High performance query expansion using adaptive co-training", Information Processing & Management 49 (2) (2013) 441-453.
-
(2013)
Information Processing & Management
, vol.49
, Issue.2
, pp. 441-453
-
-
Huang, J.X.1
Miao, J.2
He, B.3
-
7
-
-
79957591079
-
An, Combining integrated sampling with SVM ensembles for learning from imbalanced datasets
-
Y. Li u, X. Yu, J. X. Huang, A. " An, Combining integrated sampling with SVM ensembles for learning from imbalanced datasets", Information Processing &Management 47 (4) (2011) 617-631.
-
(2011)
Information Processing &management
, vol.47
, Issue.4
, pp. 617-631
-
-
Liu, Y.1
Yu, X.2
Huang, A.J.X.3
-
9
-
-
33745201667
-
Supervised and unsupervised learning for data clustering
-
P. Corsini, B. Lazzerini, F. Marcelloni, Combining "supervised and unsupervised learning for data clustering", Neural Computing & Applications 15 (3-4) (2006)289-297.
-
(2006)
Neural Computing & Applications
, vol.15
, Issue.3-4
, pp. 289-297
-
-
Corsini, P.1
Lazzerini, B.2
Marcelloni, F.3
Combining4
-
10
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, W.-Y. Lin, "Intrusion detection by machine learning: a review", Expert Systems with Applications 36 (2009) 11994-12000.
-
(2009)
Expert Systems with Applications
, vol.36
, pp. 11994-12000
-
-
Tsai, C.-F.1
Hsu, Y.-F.2
Lin, C.-Y.3
Lin, W.-Y.4
-
11
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S. X. Wu, W. Banzhaf, "The use of computational intelligence in intrusion detection systems: a review", Applied Soft Computing 10 (2010) 1-35.
-
(2010)
Applied Soft Computing
, vol.10
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
12
-
-
84861446593
-
OMC-IDS: At the cross-roads of OLAP mining and intrusion detection
-
LNCS
-
H. Brahmi, I. Brahmi, S. B. Yahia, "OMC-IDS: at the cross-roads of OLAP mining and intrusion detection", in: Advances in Knowledge Discovery and Data Mining, in: LNCS, vol. 7302, 2012, pp. 13-24.
-
(2012)
Advances in Knowledge Discovery and Data Mining
, vol.7302
, pp. 13-24
-
-
Brahmi, H.1
Brahmi, I.2
Yahia, S.B.3
-
13
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
S.-J. Horng, M.-Y. Su, Y.-H. Chen, T.-W. Kao, R.-J. Chen, J.-L. Lai, C. D. Perkasa," A novel intrusion detection system based on hierarchical clustering and support vector machines", Expert Systems with Applications 38 (2011) 306-313.
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 306-313
-
-
Horng, S.-J.1
Su, M.-Y.2
Chen, Y.-H.3
Kao, T.-W.4
Chen, R.-J.5
Lai, J.-L.6
Perkasa, C.D.7
-
14
-
-
77952705835
-
Design and performance evaluation of a machine learningbased method for intrusion detection
-
Springer
-
Q. Zhang, G. Hu, W. Feng, "Design and performance evaluation of a machine learningbased method for intrusion detection", in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, in: Studies in Computational Intelligence, vol. 295, Springer, 2010, pp. 69-83.
-
(2010)
Software Engineering, Artificial Intelligence, Networking, and Parallel/distributed Computing Studies in Computational Intelligence
, vol.295
, pp. 69-83
-
-
Zhang, Q.1
Hu, G.2
Feng, W.3
-
15
-
-
0005238259
-
Security of the internet
-
F. Froehlich, A. Kent (Eds.) Marcel Derrek
-
T. A. Longstaff, J. T. Ellis, S. V. Hernan, H. F. Lipson, R. D. McMillan, L. H. Pazente,D. Simmel, "Security of the Internet", in: F. Froehlich, A. Kent (Eds.), The Froehlich/Kent Encyclopedia of Telecommunications. Vol. 15, Marcel Derrek,1998, pp. 231-254.
-
(1998)
The Froehlich/Kent Encyclopedia of Telecommunications
, vol.15
, pp. 231-254
-
-
Longstaff, T.A.1
Ellis, J.T.2
Hernan, S.V.3
Lipson, H.F.4
McMillan, R.D.5
Pazente, L.H.6
Simmel, D.7
-
19
-
-
0027609384
-
A survey of intrusion detection techniques
-
T. F. Lunt, "A survey of intrusion detection techniques", Computers and Security12 (4) (1993) 405-418.
-
(1993)
Computers and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
20
-
-
0013324757
-
Intrusion detection with neural networks
-
J. Ryan, M.-J. Lin, R. Miikkulainen,"Intrusion detection with neural networks", in: Proceedings of AAAI-97 Workshop on AI Approaches to Fraud Detection and Task Management, 1997, pp. 92-97.
-
(1997)
Proceedings of AAAI-97 Workshop on AI Approaches to Fraud Detection and Task Management
, pp. 92-97
-
-
Ryan, J.1
Lin, M.-J.2
Miikkulainen, R.3
-
21
-
-
0025548907
-
Security audit trail analysis using inductively generated predictive rules
-
H. Teng, K. Chen, S. Lu, "Security audit trail analysis using inductively generated predictive rules", in: Proceedings of the 6th Conference on Artificial Intelligence Applications, Vol. 1, 1990, pp. 24-29.
-
(1990)
Proceedings of the 6th Conference on Artificial Intelligence Applications
, vol.1
, pp. 24-29
-
-
Teng, H.1
Chen, K.2
Lu, S.3
-
24
-
-
0033667059
-
Comparing local search with respect to genetic evolution to detect intrusion in computer networks
-
La Jolla, CA,IEEE Press, 16-19 July
-
Neri, F., "Comparing local search with respect to genetic evolution to detect intrusion in computer networks", In Proc. of the 2000 Congress on Evolutionary Computation CEC00, La Jolla, CA, pp. 238243. IEEE Press, 16-19 July, 2000.
-
(2000)
Proc. of the 2000 Congress on Evolutionary Computation CEC00
, pp. 238243
-
-
Neri, F.1
-
25
-
-
33847760783
-
Mining TCP/IP traffic for network intrusion detection
-
L. de M'antaras and E. Plaza (Eds.) Barcelona, Spain,Springer, May 31-June 2
-
Neri, F. "Mining TCP/IP traffic for network intrusion detection", In R. L. de M'antaras and E. Plaza (Eds.), Proc. of Machine Learning: ECML\2000, 11th European Conference on Machine Learning, Volume 1810of Lecture Notes in Computer Science, Barcelona, Spain, pp. 313322. Springer, May 31-June 2, 2000.
-
(2000)
Proc. of Machine Learning: ECML\2000, 11th European Conference on Machine Learning, Volume 1810of Lecture Notes in Computer Science
, pp. 313322
-
-
Neri, F.1
-
26
-
-
84955591263
-
An intelligent decision support system for intrusion detection and response
-
St. Petersburg. Springer-Verlag, 21-23 May
-
Dasgupta, D. and F. A. Gonzalez,"An intelligent decision support system for intrusion detection and response", In Proc. of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS), St. Petersburg. Springer-Verlag, 21-23 May, 2001
-
(2001)
Proc. of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS)
-
-
Dasgupta, D.1
Gonzalez, F.A.2
-
28
-
-
84934277641
-
Active defense of a computer system agents
-
West Lafayette, IN, 15 February
-
Crosbie, M. and E. H. Spafford,"Active defense of a computer system agents", Technical Report CSDTR-95-008, Purdue Univ. West Lafayette, IN, 15 February 1995.
-
(1995)
Technical Report CSDTR-95-008,Purdue Univ.
-
-
Crosbie, M.1
Spafford, E.H.2
-
29
-
-
1642330574
-
Fuzzy arithmetic with requisite constraints
-
G. J. Klir,"Fuzzy arithmetic with requisite constraints", Fuzzy Sets and Systems, 91:165175, 1997. http://wenke. gtisc. gatech. edu/project/image004. gif
-
(1997)
Fuzzy Sets and Systems
, vol.91
, pp. 165175
-
-
Klir, G.J.1
-
31
-
-
1242321281
-
DDoS attacks and defense mechanisms: Classification and state-of-the-art
-
Christos Douligeris, Aikaterini Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art",Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 44, Issue 5, pp: 643-666, 2004.
-
(2004)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
32
-
-
0005238259
-
Security of the internet
-
F. Froehlich, A. Kent (Eds.) Marcel Derrek
-
T. A. Longstaff, J. T. Ellis, S. V. Hernan, H. F. Lipson, R. D. McMillan, L. H. Pazente,D. Simmel, "Security of the Internet", in: F. Froehlich, A. Kent (Eds.), The Froehlich/Kent Encyclopedia of Telecommunications. Vol. 15, Marcel Derrek,1998, pp. 231-254.
-
(1998)
The Froehlich/Kent Encyclopedia of Telecommunications
, vol.15
, pp. 231-254
-
-
Longstaff, T.A.1
Ellis, J.T.2
Hernan, S.V.3
Lipson, H.F.4
McMillan, R.D.5
Pazente, L.H.6
Simmel, D.7
-
36
-
-
0027609384
-
A survey of intrusion detection techniques
-
T. F. Lunt, "A survey of intrusion detection techniques", Computers and Security12 (4) (1993) 405-418.
-
(1993)
Computers and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
37
-
-
0013324757
-
Intrusion detection with neural networks
-
J. Ryan, M.-J. Lin, R. Miikkulainen,"Intrusion detection with neural networks", in: Proceedings of AAAI-97 Workshop on AI Approaches to Fraud Detection and Task Management, 1997, pp. 92-97
-
(1997)
Proceedings of AAAI-97 Workshop on AI Approaches to Fraud Detection and Task Management
, pp. 92-97
-
-
Ryan, J.1
Lin, M.-J.2
Miikkulainen, R.3
-
38
-
-
0025548907
-
Security audit trail analysis using inductively generated predictive rules
-
H. Teng, K. Chen, S. Lu, "Security audit trail analysis using inductively generated predictive rules", in: Proceedings of the 6th Conference on Artificial Intelligence Applications, Vol. 1, 1990, pp. 24-29.
-
(1990)
Proceedings of the 6th Conference on Artificial Intelligence Applications
, vol.1
, pp. 24-29
-
-
Teng, H.1
Chen, K.2
Lu, S.3
-
41
-
-
0033667059
-
Comparing local search with respect to genetic evolution to detect intrusion in computer networks
-
La Jolla, CA,IEEE Press, 16-19 July
-
Neri, F., "Comparing local search with respect to genetic evolution to detect intrusion in computer networks", In Proc. of the 2000 Congress on Evolutionary Computation CEC00, La Jolla, CA, pp. 238243. IEEE Press, 16-19 July, 2000.
-
(2000)
Proc. of the 2000 Congress on Evolutionary Computation CEC00
, pp. 238243
-
-
Neri, F.1
-
42
-
-
33847760783
-
Mining TCP/IP traffic for network intrusion detection
-
R. L. de M'antaras and E. Plaza (Eds.) Barcelona, Spain,Springer, May 31-June 2
-
Neri, F. "Mining TCP/IP traffic for network intrusion detection", In R. L. de M'antaras and E. Plaza (Eds.), Proc. of Machine Learning: ECML\2000, 11th European Conference on Machine Learning, Volume 1810of Lecture Notes in Computer Science, Barcelona, Spain, pp. 313322. Springer, May 31-June 2, 2000.
-
(2000)
Proc. of Machine Learning: ECML\2000, 11th European Conference on Machine Learning, Volume 1810of Lecture Notes in Computer Science
, pp. 313322
-
-
Neri, F.1
-
43
-
-
84955591263
-
An intelligent decision support system for intrusion detection and response
-
St. Petersburg. Springer-Verlag, 21-23 May
-
Dasgupta, D. and F. A. Gonzalez,"An intelligent decision support system for intrusion detection and response", In Proc. of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS), St. Petersburg. Springer-Verlag, 21-23 May, 2001
-
(2001)
Proc. of International Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (MMM-ACNS)
-
-
Dasgupta, D.1
Gonzalez, F.A.2
-
45
-
-
84934277641
-
Active defense of a computer system agents
-
Purdue Univ. West Lafayette, IN, 15 February
-
Crosbie, M. and E. H. Spafford,"Active defense of a computer system agents", Technical Report CSDTR-95-008, Purdue Univ. West Lafayette, IN, 15 February 1995.
-
(1995)
Technical Report CSDTR-95-008
-
-
Crosbie, M.1
Spafford, E.H.2
-
46
-
-
1642330574
-
Fuzzy arithmetic with requisite constraints
-
G. J. Klir,"Fuzzy arithmetic with requisite constraints", Fuzzy Sets and Systems, 91:165175, 1997 http://wenke. gtisc. gatech. edu/project/image004. gif
-
(1997)
Fuzzy Sets and Systems
, vol.91
, pp. 165175
-
-
Klir, G.J.1
-
48
-
-
1242321281
-
DDOS attacks and defense mechanisms: Classification and state-of-the-art
-
Christos Douligeris, Aikaterini Mitrokotsa, "DDoS attacks and defense mechanisms: classification and state-of-the-art",Computer Networks: The International Journal of Computer and Telecommunications Networking, Vol. 44, Issue 5, pp: 643-666, 2004.
-
(2004)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.44
, Issue.5
, pp. 643-666
-
-
Douligeris, C.1
Mitrokotsa, A.2
-
51
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
Madrid, Spain,ACM Press
-
Krugel, C., T. Toth, and E. Kirda, "Service specific anomaly detection for network intrusion detection", In Proc. of the 2002 ACM Symp. on Applied Computing (SAC2002), Madrid, Spain, pp. 201-208. ACM Press, 2002.
-
(2002)
Proc. of the 2002 ACM Symp. on Applied Computing (SAC2002)
, pp. 201-208
-
-
Krugel, C.1
Toth, T.2
Kirda, E.3
|