-
1
-
-
84915760589
-
Using response action with intelligent intrusion detection and prevention system against web application malware
-
Alazab A., Hobbs M., Abawajy J., Khraisat A., Alazab M. Using response action with intelligent intrusion detection and prevention system against web application malware Information Management & Computer Security 22 2014 431 449
-
(2014)
Information Management & Computer Security
, vol.22
, pp. 431-449
-
-
Alazab, A.1
Hobbs, M.2
Abawajy, J.3
Khraisat, A.4
Alazab, M.5
-
2
-
-
84958192512
-
Mining anomalies using traffic feature distributions
-
Philadelphia, Pennsylvania, USA ACM
-
Anukool L., Mark C., Christophe D. Mining anomalies using traffic feature distributions Proceedings of the 2005 conference on applications, technologies, architectures, and protocols for computer communications Philadelphia, Pennsylvania, USA 2005 ACM
-
(2005)
Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
-
-
Anukool, L.1
Mark, C.2
Christophe, D.3
-
5
-
-
84927924591
-
Decentralized detection of network attacks through P2P data clustering of SNMP data
-
Cerroni W., Moro G., Pasolini R., Ramilli M. Decentralized detection of network attacks through P2P data clustering of SNMP data Computers & Security 52 2015 1 16
-
(2015)
Computers & Security
, vol.52
, pp. 1-16
-
-
Cerroni, W.1
Moro, G.2
Pasolini, R.3
Ramilli, M.4
-
6
-
-
79951747896
-
Explanations of unsupervised learning clustering applied to data security analysis
-
Corral G., Armengol E., Fornells A., Golobardes E. Explanations of unsupervised learning clustering applied to data security analysis Neurocomputing 72 2009 2754 2762
-
(2009)
Neurocomputing
, vol.72
, pp. 2754-2762
-
-
Corral, G.1
Armengol, E.2
Fornells, A.3
Golobardes, E.4
-
7
-
-
84937429043
-
DDoS attack detection using fast entropy approach on flow- based network traffic
-
David J., Thomas C. DDoS attack detection using fast entropy approach on flow- based network traffic Procedia Computer Science 50 2015 30 36
-
(2015)
Procedia Computer Science
, vol.50
, pp. 30-36
-
-
David, J.1
Thomas, C.2
-
11
-
-
0003068867
-
The dynamics of collective sorting robot-like ants and ant-like robots
-
Paris, France MIT Press
-
Deneubourg J.L., Goss S., Franks N., Sendova-Franks A., Detrain C., Chrétien L. The dynamics of collective sorting robot-like ants and ant-like robots Proceedings of the first international conference on simulation of adaptive behavior on from animals to animals Paris, France 1990 MIT Press
-
(1990)
Proceedings of the First International Conference on Simulation of Adaptive Behavior on from Animals to Animals
-
-
Deneubourg, J.L.1
Goss, S.2
Franks, N.3
Sendova-Franks, A.4
Detrain, C.5
Chrétien, L.6
-
13
-
-
0015644825
-
A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters
-
Dunn J.C. A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters Journal of Cybernetics 3 1973 32 57
-
(1973)
Journal of Cybernetics
, vol.3
, pp. 32-57
-
-
Dunn, J.C.1
-
14
-
-
84923037662
-
Network traffic anomaly detection using adaptive density-based fuzzy clustering
-
Duo L., Chung-Horng L., Seddigh N., Nandy B. Network traffic anomaly detection using adaptive density-based fuzzy clustering Proceedings of the 13th international conference on trust, security and privacy in computing and communications (TrustCom), 2014 2014 823 830
-
(2014)
Proceedings of the 13th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2014
, pp. 823-830
-
-
Duo, L.1
Chung-Horng, L.2
Seddigh, N.3
Nandy, B.4
-
15
-
-
84906542953
-
On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems
-
Elhag S., Fernández A., Bawakid A., Alshomrani S., Herrera F. On the combination of genetic fuzzy systems and pairwise learning for improving detection rates on intrusion detection systems Expert Systems with Applications 42 2015 193 202
-
(2015)
Expert Systems with Applications
, vol.42
, pp. 193-202
-
-
Elhag, S.1
Fernández, A.2
Bawakid, A.3
Alshomrani, S.4
Herrera, F.5
-
18
-
-
84873857276
-
Means algorithms for clustering analysis with frequency sensitive discrepancy metrics
-
Fang C., Jin W., Ma J. Means algorithms for clustering analysis with frequency sensitive discrepancy metrics Pattern Recognition Letters 34 2013 580 586
-
(2013)
Pattern Recognition Letters
, vol.34
, pp. 580-586
-
-
Fang, C.1
Jin, W.2
Ma, J.3
-
19
-
-
84931269284
-
Autonomous profile-based anomaly detection system using principal component analysis and flow analysis
-
Fernandes G. Jr., Rodrigues J.J.P.C., Proença M.L. Jr. Autonomous profile-based anomaly detection system using principal component analysis and flow analysis Applied Soft Computing 34 2015 513 525
-
(2015)
Applied Soft Computing
, vol.34
, pp. 513-525
-
-
Fernandes, G.1
Rodrigues, J.J.P.C.2
Proença, M.L.3
-
20
-
-
84942342385
-
STONE: A streaming DDoS defense framework
-
Gulisano V., Callau-Zori M., Fu Z., Jiménez-Peris R., Papatriantafilou M., Patiño-Martínez M. STONE: A streaming DDoS defense framework Expert Systems with Applications 42 2015 9620 9633
-
(2015)
Expert Systems with Applications
, vol.42
, pp. 9620-9633
-
-
Gulisano, V.1
Callau-Zori, M.2
Fu, Z.3
Jiménez-Peris, R.4
Papatriantafilou, M.5
Patiño-Martínez, M.6
-
23
-
-
80053607468
-
An information entropy-based approach to outlier detection in rough sets
-
Jiang F., Sui Y., Cao C. An information entropy-based approach to outlier detection in rough sets Expert Systems with Applications 37 2010 6338 6344
-
(2010)
Expert Systems with Applications
, vol.37
, pp. 6338-6344
-
-
Jiang, F.1
Sui, Y.2
Cao, C.3
-
24
-
-
61349143044
-
FDF: Frequency detection-based filtering of scanning worms
-
Kim B., Kim H., Bahk S. FDF: Frequency detection-based filtering of scanning worms Computer Communications 32 2009 847 857
-
(2009)
Computer Communications
, vol.32
, pp. 847-857
-
-
Kim, B.1
Kim, H.2
Bahk, S.3
-
25
-
-
84888315965
-
A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
-
Kim G., Lee S., Kim S. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection Expert Systems with Applications 41 2014 1690 1700
-
(2014)
Expert Systems with Applications
, vol.41
, pp. 1690-1700
-
-
Kim, G.1
Lee, S.2
Kim, S.3
-
27
-
-
70849120982
-
-
John Wiley & Sons, Inc
-
Laurent A., Olivier F., Abdelkader L., Aiko P., rgen S., nw, lder Survey of SNMP performance analysis studies vol. 19 2009 John Wiley & Sons, Inc 527 548
-
(2009)
Survey of SNMP Performance Analysis Studies
, vol.19
, pp. 527-548
-
-
Laurent, A.1
Olivier, F.2
Abdelkader, L.3
Aiko, P.4
Rgen, S.5
Nw6
Lder7
-
28
-
-
80052025073
-
Self-adaptive and dynamic clustering for online anomaly detection
-
Lee S., Kim G., Kim S. Self-adaptive and dynamic clustering for online anomaly detection Expert Systems with Applications 38 2011 14891 14898
-
(2011)
Expert Systems with Applications
, vol.38
, pp. 14891-14898
-
-
Lee, S.1
Kim, G.2
Kim, S.3
-
29
-
-
82455199118
-
Improved competitive learning neural networks for network intrusion and fraud detection
-
Lei J.Z., Ghorbani A.A. Improved competitive learning neural networks for network intrusion and fraud detection Neurocomputing 75 2012 135 145
-
(2012)
Neurocomputing
, vol.75
, pp. 135-145
-
-
Lei, J.Z.1
Ghorbani, A.A.2
-
30
-
-
79551627252
-
Networking anomaly detection using DSNs and particle swarm optimization with re-clustering
-
Lima M.F., Sampaio L.D.H., Zarpelão B.B., Rodrigues J.J.P.C., Abrao T., Proença M.L. Networking anomaly detection using DSNs and particle swarm optimization with re-clustering Proceedings of the IEEE global telecommunications conference (GLOBECOM 2010), 2010 1 6
-
(2010)
Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM 2010)
, pp. 1-6
-
-
Lima, M.F.1
Sampaio, L.D.H.2
Zarpelão, B.B.3
Rodrigues, J.J.P.C.4
Abrao, T.5
Proença, M.L.6
-
31
-
-
84954107993
-
Opprentice: Towards practical and automatic anomaly detection through machine learning
-
Tokyo, Japan ACM
-
Liu D., Zhao Y., Xu H., Sun Y., Pei D., Luo J., Jing X., Feng M. Opprentice: Towards practical and automatic anomaly detection through machine learning Proceedings of the 2015 ACM conference on internet measurement conference Tokyo, Japan 2015 ACM 211 224
-
(2015)
Proceedings of the 2015 ACM Conference on Internet Measurement Conference
, pp. 211-224
-
-
Liu, D.1
Zhao, Y.2
Xu, H.3
Sun, Y.4
Pei, D.5
Luo, J.6
Jing, X.7
Feng, M.8
-
36
-
-
8344231659
-
InMon corporation's sFlow: A method for monitoring traffic in switched and routed networks
-
Phaal P., Panchen S., McKee N. InMon corporation's sFlow: A method for monitoring traffic in switched and routed networks RFC 3176 2001
-
(2001)
RFC 3176
-
-
Phaal, P.1
Panchen, S.2
McKee, N.3
-
37
-
-
0027332160
-
On the use of the normalized mean square error in evaluating dispersion model performance
-
Poli A.A., Cirillo M.C. On the use of the normalized mean square error in evaluating dispersion model performance Atmospheric Environment. Part A. General Topics 27 1993 2427 2434
-
(1993)
Atmospheric Environment. Part A. General Topics
, vol.27
, pp. 2427-2434
-
-
Poli, A.A.1
Cirillo, M.C.2
-
39
-
-
0023453329
-
Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
-
Rousseeuw P.J. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis Journal of Computational and Applied Mathematics 20 1987 53 65
-
(1987)
Journal of Computational and Applied Mathematics
, vol.20
, pp. 53-65
-
-
Rousseeuw, P.J.1
-
43
-
-
79951638326
-
A flow-based anomaly detection method using sketch and combinations of traffic features
-
Shuying C., Xuesong Q., Zhipeng G., Ke L., Feng Q. A flow-based anomaly detection method using sketch and combinations of traffic features Proceedings of the international conference on network and service management (CNSM), 2010 302 305
-
(2010)
Proceedings of the International Conference on Network and Service Management (CNSM)
, pp. 302-305
-
-
Shuying, C.1
Xuesong, Q.2
Zhipeng, G.3
Ke, L.4
Feng, Q.5
-
44
-
-
84940460812
-
An intrusion detection system using network traffic profiling and online sequential extreme learning machine
-
Singh R., Kumar H., Singla R.K. An intrusion detection system using network traffic profiling and online sequential extreme learning machine Expert Systems with Applications 42 2015 8609 8624
-
(2015)
Expert Systems with Applications
, vol.42
, pp. 8609-8624
-
-
Singh, R.1
Kumar, H.2
Singla, R.K.3
-
45
-
-
80052448813
-
Accurate network anomaly classification with generalized entropy metrics
-
Tellenbach B., Burkhart M., Schatzmann D., Gugelmann D., Sornette D. Accurate network anomaly classification with generalized entropy metrics Computer Networks 55 2011 3485 3502
-
(2011)
Computer Networks
, vol.55
, pp. 3485-3502
-
-
Tellenbach, B.1
Burkhart, M.2
Schatzmann, D.3
Gugelmann, D.4
Sornette, D.5
-
47
-
-
84910121499
-
Detecting subtle port scans through characteristics based on interactive visualization
-
Atlanta, Georgia, USA ACM
-
Wang W., Yang B., Chen Y.V. Detecting subtle port scans through characteristics based on interactive visualization Proceedings of the 3rd annual conference on Research in information technology Atlanta, Georgia, USA 2014 ACM 33 38
-
(2014)
Proceedings of the 3rd Annual Conference on Research in Information Technology
, pp. 33-38
-
-
Wang, W.1
Yang, B.2
Chen, Y.V.3
-
48
-
-
78650558761
-
Temporal data clustering via weighted clustering ensemble with different representations
-
Yun Y., Ke C. Temporal data clustering via weighted clustering ensemble with different representations IEEE Transactions on Knowledge and Data Engineering 23 2011 307 320
-
(2011)
IEEE Transactions on Knowledge and Data Engineering
, vol.23
, pp. 307-320
-
-
Yun, Y.1
Ke, C.2
-
49
-
-
34250755328
-
Anomaly detection aiming pro-active management of computer network based on digital signature of network segment
-
Zarpelão B.B., Mendes L.d.S., Proença L.M. Jr. Anomaly detection aiming pro-active management of computer network based on digital signature of network segment Journal of Network and Systems Management 15 2007 267 283
-
(2007)
Journal of Network and Systems Management
, vol.15
, pp. 267-283
-
-
Zarpelão, B.B.1
Mendes, L.D.S.2
Proença, L.M.3
-
50
-
-
84891816613
-
A system for denial-of-service attack detection based on multivariate correlation analysis
-
Zhiyuan T., Jamdagni A., Xiangjian H., Nanda P., Ren Ping L. A system for denial-of-service attack detection based on multivariate correlation analysis IEEE Transactions on Parallel and Distributed Systems, 25 2014 447 456
-
(2014)
IEEE Transactions on Parallel and Distributed Systems
, vol.25
, pp. 447-456
-
-
Zhiyuan, T.1
Jamdagni, A.2
Xiangjian, H.3
Nanda, P.4
Ren Ping, L.5
|