-
1
-
-
84945936408
-
A novel SVM-kNN-PSO ensemble method for intrusion detection system
-
Abdulla Amin Aburomman, and Mamun Bin Ibne Reaz A novel SVM-kNN-PSO ensemble method for intrusion detection system Appl. Soft Comput. 38 2016 360 372
-
(2016)
Appl. Soft Comput.
, vol.38
, pp. 360-372
-
-
Aburomman, A.A.1
Ibne Reaz, M.B.2
-
2
-
-
23944436897
-
Automatic subspace clustering of high dimensional data
-
Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopulos, and Prabhakar Raghavan Automatic subspace clustering of high dimensional data Data Min. Knowl. Discov. 11 1 2005 5 33
-
(2005)
Data Min. Knowl. Discov.
, vol.11
, Issue.1
, pp. 5-33
-
-
Agrawal, R.1
Gehrke, J.2
Gunopulos, D.3
Raghavan, P.4
-
3
-
-
77952286712
-
Accelerating the Local Outlier Factor algorithm on a GPU for intrusion detection systems
-
GPGPU-3, ACM, New York, NY, USA
-
Alshawabkeh, Malak, Jang, Byunghyun, Kaeli, David, 2010. Accelerating the Local Outlier Factor algorithm on a GPU for intrusion detection systems. In: Proceedings of the 3rd Workshop on General-Purpose Computation on Graphics Processing Units, GPGPU-3, ACM, New York, NY, USA, pp. 104-110.
-
(2010)
Proceedings of the 3rd Workshop on General-Purpose Computation on Graphics Processing Units
, pp. 104-110
-
-
Alshawabkeh, M.1
Jang, B.2
Kaeli, D.3
-
4
-
-
79956097533
-
Mutual information-based feature selection for intrusion detection systems
-
Fatemeh Amiri, Mohammad Mahdi Rezaei Yousefi, Caro Lucas, Azadeh Shakery, and Nasser Yazdani Mutual information-based feature selection for intrusion detection systems J. Netw. Comput. Appl. 34 4 2011 1184 1199
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.4
, pp. 1184-1199
-
-
Amiri, F.1
Yousefi, M.M.R.2
Lucas, C.3
Shakery, A.4
Yazdani, N.5
-
5
-
-
83455234551
-
HMMP ayl: An application of HMM to the analysis of the HTTP payload
-
Tom Diethe, Nello Cristianini, John Shawe-Taylor (Eds.) WAPA 2010, September 1-3, Cumberland Lodge, Windsor, UK
-
Ariu, Davide, Giacinto, Giorgio, 2010. HMMP ayl: an application of HMM to the analysis of the HTTP payload. In: Tom Diethe, Nello Cristianini, John Shawe-Taylor (Eds.), Proceedings of the First Workshop on Applications of Pattern Analysis, WAPA 2010, September 1-3, vol. 11. Cumberland Lodge, Windsor, UK, pp. 81-87.
-
(2010)
Proceedings of the First Workshop on Applications of Pattern Analysis
, vol.11
, pp. 81-87
-
-
Ariu, D.1
Giacinto, G.2
-
6
-
-
79955482186
-
HMMPayl: An intrusion detection system based on Hidden Markov Models
-
Davide Ariu, Roberto Tronci, and Giorgio Giacinto HMMPayl: an intrusion detection system based on Hidden Markov Models Comput. Secur. 30 4 2011 221 241
-
(2011)
Comput. Secur.
, vol.30
, Issue.4
, pp. 221-241
-
-
Ariu, D.1
Tronci, R.2
Giacinto, G.3
-
8
-
-
85119226435
-
A highly-efficient memory-compression scheme for GPU-accelerated intrusion detection systems
-
SIN 14. ACM, New York, NY, USA
-
Bellekens, Xavier J.A., Tachtatzis, Christos, Atkinson, Robert C., Renfrew, Craig, Kirkham, Tony, 2014. A highly-efficient memory-compression scheme for GPU-accelerated intrusion detection systems. In: Proceedings of the 7th International Conference on Security of Information and Networks, SIN 14. ACM, New York, NY, USA, pp. 302:302-302:309.
-
(2014)
Proceedings of the 7th International Conference on Security of Information and Networks
, pp. 302302-302309
-
-
Bellekens, X.J.A.1
Tachtatzis, C.2
Atkinson, R.C.3
Renfrew, C.4
Kirkham, T.5
-
10
-
-
84894646147
-
Network anomaly detection: Methods, systems and tools
-
First
-
M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita Network anomaly detection: methods, systems and tools IEEE Commun. Surv. Tutor. 16 1 2014 303 336 First
-
(2014)
IEEE Commun. Surv. Tutor.
, vol.16
, Issue.1
, pp. 303-336
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
11
-
-
79952932462
-
NADO: Network anomaly detection using outlier approach
-
ACM, New York, NY, USA
-
Bhuyan, Monowar H., Bhattacharyya, D.K., Kalita, J.K., 2011. NADO: network anomaly detection using outlier approach. In: Proceedings of the 2011 International Conference on Communication, Computing& Security, ICCCS '11. ACM, New York, NY, USA, pp. 531-536.
-
(2011)
Proceedings of the 2011 International Conference on Communication, Computing& Security, ICCCS '11
, pp. 531-536
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
12
-
-
80053510589
-
Surveying Port Scans and their detection methodologies
-
Monowar H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita Surveying Port Scans and their detection methodologies Comput. J. 54 October (10) 2011 1565 1581
-
(2011)
Comput. J.
, vol.54
, Issue.10 OCTOBER
, pp. 1565-1581
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
13
-
-
84866068108
-
An effective unsupervised network anomaly detection method
-
ACM, New York, NY, USA
-
Monowar H. Bhuyan, Bhattacharyya, D.K., Kalita, J.K., 2012. An effective unsupervised network anomaly detection method. In: Proceedings of the International Conference on Advances in Computing, Communications and Informatics, ICACCI '12. ACM, New York, NY, USA, pp. 533-539.
-
(2012)
Proceedings of the International Conference on Advances in Computing, Communications and Informatics, ICACCI '12
, pp. 533-539
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
14
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Burton H. Bloom Space/time trade-offs in hash coding with allowable errors Commun. ACM 13 7 1970 422 426
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
15
-
-
84857332705
-
Cross-domain collaborative anomaly detection: so far yet so close
-
Sommer, Robin, Balzarotti, Davide, Maier, Gregor (Eds.) Springer, Berlin, Heidelberg
-
Boggs, Nathaniel, Hiremagalore, Sharath, Stavrou, Angelos, Stolfo, J. Salvatore, 2011. Cross-domain collaborative anomaly detection: so far yet so close. In: Sommer, Robin, Balzarotti, Davide, Maier, Gregor (Eds.), Recent Advances in Intrusion Detection, Lecture Notes in Computer Science, vol. 6961. Springer, Berlin, Heidelberg, pp. 142-160.
-
(2011)
Recent Advances in Intrusion Detection, Lecture Notes in Computer Science
, vol.6961
, pp. 142-160
-
-
Boggs, N.1
Hiremagalore, S.2
Stavrou, A.3
Salvatore, S.J.4
-
16
-
-
38349006504
-
Combining heterogeneous classifiers for network intrusion detection
-
Cervesato, Iliano, (Ed.) Springer, Berlin, Heidelberg
-
Borji, Ali, 2007. Combining heterogeneous classifiers for network intrusion detection. In: Cervesato, Iliano, (Ed.), Advances in Computer Science - ASIAN 2007. Computer and Network Security, Lecture Notes in Computer Science, vol. 4846. Springer, Berlin, Heidelberg, pp. 254-260.
-
(2007)
Advances in Computer Science - ASIAN 2007. Computer and Network Security, Lecture Notes in Computer Science
, vol.4846
, pp. 254-260
-
-
Borji, A.1
-
17
-
-
84870326932
-
Anomaly based intrusion detection using meta ensemble classifier
-
ACM, New York, NY, USA
-
Boro, Debojit, Nongpoh, Bernard, Bhattacharyya, Dhruba K., 2012. Anomaly based intrusion detection using meta ensemble classifier. In: Proceedings of the Fifth International Conference on Security of Information and Networks, SIN '12. ACM, New York, NY, USA, pp. 143-147.
-
(2012)
Proceedings of the Fifth International Conference on Security of Information and Networks, SIN '12
, pp. 143-147
-
-
Boro, D.1
Nongpoh, B.2
Bhattacharyya, D.K.3
-
18
-
-
84255170687
-
Towards a multiagent-based distributed intrusion detection system using data mining approaches
-
Springer-Verlag, Berlin, Heidelberg, 2012
-
Brahmi, Imen, Yahia, Sadok Ben, Aouadi, Hamed, Poncelet, Pascal, 2012. Towards a multiagent-based distributed intrusion detection system using data mining approaches. In: Proceedings of the 7th International Conference on Agents and Data Mining Interaction, ADMI'11. Springer-Verlag, Berlin, Heidelberg, 2012, pp. 173-194.
-
(2012)
Proceedings of the 7th International Conference on Agents and Data Mining Interaction, ADMI'11
, pp. 173-194
-
-
Brahmi, I.1
Yahia, S.B.2
Aouadi, H.3
Poncelet, P.4
-
19
-
-
0035478854
-
Random forests
-
Leo Breiman Random forests Mach. Learn. 45 1 2001 5 32
-
(2001)
Mach. Learn.
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
20
-
-
79959436534
-
Comprehensive evolutionary approach for neural network ensemble automatic design
-
Barcelona, Spain, July
-
Bukhtoyarov, V.V., Semenkina, O.E., 2010. Comprehensive evolutionary approach for neural network ensemble automatic design. In: 2010 IEEE Congress on Evolutionary Computation (CEC), Barcelona, Spain, July, pp. 1-6.
-
(2010)
2010 IEEE Congress on Evolutionary Computation (CEC)
, pp. 1-6
-
-
Bukhtoyarov, V.V.1
Semenkina, O.E.2
-
21
-
-
84906351954
-
Ensemble-distributed approach in classification problem solution for intrusion detection systems
-
Corchado, Emilio, Lozano, José A., Quintián, Héctor, Yin, Hujun (Eds.) Springer International Publishing, Salamanca, Spain
-
Bukhtoyarov, Vladimir, Zhukov, Vadim, 2014. Ensemble-distributed approach in classification problem solution for intrusion detection systems. In: Corchado, Emilio, Lozano, José A., Quintián, Héctor, Yin, Hujun (Eds.), Intelligent Data Engineering and Automated Learning, IDEAL 2014, Lecture Notes in Computer Science, vol. 8669. Springer International Publishing, Salamanca, Spain, pp. 255-265.
-
(2014)
Intelligent Data Engineering and Automated Learning, IDEAL 2014, Lecture Notes in Computer Science
, vol.8669
, pp. 255-265
-
-
Bukhtoyarov, V.1
Zhukov, V.2
-
22
-
-
33847261658
-
Creation and deployment of data mining-based intrusion detection systems in Oracle Database 10g
-
Los Angeles, California, USA, December.
-
Campos, M.M., Milenova, B.L., 2005. Creation and deployment of data mining-based intrusion detection systems in Oracle Database 10g. In: Fourth International Conference on Machine Learning and Applications, 2005. Proceedings. IEEE Computer Society, Los Angeles, California, USA, December.
-
(2005)
Fourth International Conference on Machine Learning and Applications, 2005. Proceedings. IEEE Computer Society
-
-
Campos, M.M.1
Milenova, B.L.2
-
23
-
-
84858698273
-
Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
-
Pedro Casas, Johan Mazel, and Philippe Owezarski Unsupervised network intrusion detection systems: detecting the unknown without knowledge Comput. Commun. 35 7 2012 772 783
-
(2012)
Comput. Commun.
, vol.35
, Issue.7
, pp. 772-783
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
24
-
-
70449490765
-
HMM-Web: A framework for the detection of attacks against web applications
-
June
-
Corona, I., Ariu, D., Giacinto, G., 2009. HMM-Web: a framework for the detection of attacks against web applications. In: IEEE International Conference on Communications, 2009. ICC '09, June, pp. 1-6.
-
(2009)
IEEE International Conference on Communications, 2009. ICC '09
, pp. 1-6
-
-
Corona, I.1
Ariu, D.2
Giacinto, G.3
-
25
-
-
67349154442
-
Information fusion for computer security: State of the art and open issues
-
Special Issue on Information Fusion in Computer Security
-
Corona, Igino, Giacinto, Giorgio, Mazzariello, Claudio, Roli, Fabio, Sansone, Carlo, 2009. Information fusion for computer security: state of the art and open issues. Inf. Fusion, 10(4), 274-284, Special Issue on Information Fusion in Computer Security.
-
(2009)
Inf. Fusion
, vol.10
, Issue.4
, pp. 274-284
-
-
Corona, I.1
Giacinto, G.2
Mazzariello, C.3
Roli, F.4
Sansone, C.5
-
26
-
-
50249170401
-
Casting out demons: Sanitizing training data for anomaly sensors
-
SP 2008, May
-
Cretu, G.F., Stavrou, A., Locasto, M.E., Stolfo, S.J., Keromytis, A.D., 2008. Casting out demons: Sanitizing training data for anomaly sensors. In: IEEE Symposium on Security and Privacy, 2008. SP 2008, May, pp. 81-95.
-
(2008)
IEEE Symposium on Security and Privacy, 2008
, pp. 81-95
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
27
-
-
50249107477
-
Data sanitization: Improving the forensic utility of anomaly detection systems
-
Berkeley, CA, USA
-
Cretu, Gabriela F., Stavrou, Angelos, Stolfo, Salvatore J., Keromytis, Angelos D., 2007. Data sanitization: improving the forensic utility of anomaly detection systems. In: Proceedings of the 3rd Workshop on Hot Topics in System Dependability, HotDep'07, USENIX Association, Berkeley, CA, USA.
-
(2007)
Proceedings of the 3rd Workshop on Hot Topics in System Dependability, HotDep'07, USENIX Association
-
-
Cretu, G.F.1
Stavrou, A.2
Stolfo, S.J.3
Keromytis, A.D.4
-
28
-
-
76649108863
-
Adaptive anomaly detection via self-calibration and dynamic updating
-
Springer, Saint-Malo, France
-
Cretu-Ciocarlie, Gabriela F., Stavroum, Angelos, Locasto, Michael E., Stolfo, Salvatore J., 2009. Adaptive anomaly detection via self-calibration and dynamic updating. In: Recent Advances in Intrusion Detection, Springer, Saint-Malo, France, pp. 41-60.
-
(2009)
Recent Advances in Intrusion Detection
, pp. 41-60
-
-
Cretu-Ciocarlie, G.F.1
Stavroum, A.2
Locasto, M.E.3
Stolfo, S.J.4
-
29
-
-
0028911698
-
Gauging similarity with n-grams: Language-independent categorization of text
-
Marc Damashek Gauging similarity with n-grams: language-independent categorization of text Science 267 5199 1995 843 848
-
(1995)
Science
, vol.267
, Issue.5199
, pp. 843-848
-
-
Damashek, M.1
-
30
-
-
0242302742
-
Intrusion detection
-
Belur V. Dasarathy Intrusion detection Inf. Fusion 4 4 2003 243 245
-
(2003)
Inf. Fusion
, vol.4
, Issue.4
, pp. 243-245
-
-
Dasarathy, B.V.1
-
32
-
-
80051793908
-
Data preprocessing for anomaly based network intrusion detection: A review
-
Jonathan J. Davis, and Andrew J. Clark Data preprocessing for anomaly based network intrusion detection: a review Comput. Secur. 30 6-7 2011 353 375
-
(2011)
Comput. Secur.
, vol.30
, Issue.6-7
, pp. 353-375
-
-
Davis, J.J.1
Clark, A.J.2
-
33
-
-
2942723846
-
A divisive information theoretic feature clustering algorithm for text classification
-
Inderjit S. Dhillon, Subramanyam Mallela, and Rahul Kumar A divisive information theoretic feature clustering algorithm for text classification J. Mach. Learn. Res. 3 March 2003 1265 1287
-
(2003)
J. Mach. Learn. Res.
, vol.3
, Issue.MARCH
, pp. 1265-1287
-
-
Dhillon, I.S.1
Mallela, S.2
Kumar, R.3
-
36
-
-
84941155240
-
Well-separated clusters and optimal fuzzy partitions
-
J.C. Dunn Well-separated clusters and optimal fuzzy partitions J. Cybern. 4 1 1974 95 104
-
(1974)
J. Cybern.
, vol.4
, Issue.1
, pp. 95-104
-
-
Dunn, J.C.1
-
37
-
-
84887824664
-
A hybrid network intrusion detection framework based on random forests and weighted k-means
-
Reda M. Elbasiony, Elsayed A. Sallam, Tarek E. Eltobely, and Mahmoud M. Fahmy A hybrid network intrusion detection framework based on random forests and weighted k-means Ain Shams Eng. J. 4 4 2013 753 762
-
(2013)
Ain Shams Eng. J.
, vol.4
, Issue.4
, pp. 753-762
-
-
Elbasiony, R.M.1
Sallam, E.A.2
Eltobely, T.E.3
Fahmy, M.M.4
-
38
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection
-
Barbará, Daniel, Jajodia, Sushil (Eds.) Springer, US
-
Eskin, Eleazar, Arnold, Andrew, Prerau, Michael, Portnoy, Leonid, Stolfo, Salvatore J., 2002. A geometric framework for unsupervised anomaly detection. In: Barbará, Daniel, Jajodia, Sushil (Eds.), Applications of Data Mining in Computer Security, Advances in Information Security, vol. 6. Springer, US, pp. 77-101.
-
(2002)
Applications of Data Mining in Computer Security, Advances in Information Security
, vol.6
, pp. 77-101
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.J.5
-
39
-
-
85170282443
-
A density-based algorithm for discovering clusters in large spatial databases with noise
-
AAAI Press, Portland, OR, USA
-
Ester, Martin, Kriegel, Hans-Peter, Sander, Jörg, Xu, Xiaowei, 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96), vol. 96. AAAI Press, Portland, OR, USA, pp. 226-231.
-
(1996)
Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (KDD-96)
, vol.96
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Xu, X.4
-
40
-
-
77954816351
-
An ensemble-based evolutionary framework for coping with distributed intrusion detection
-
Gianluigi Folino, Clara Pizzuti, and Giandomenico Spezzano An ensemble-based evolutionary framework for coping with distributed intrusion detection Genet. Program. Evol. Mach. 11 June (2) 2010 131 146
-
(2010)
Genet. Program. Evol. Mach.
, vol.11
, Issue.2 JUNE
, pp. 131-146
-
-
Folino, G.1
Pizzuti, C.2
Spezzano, G.3
-
41
-
-
84925851578
-
Combining ensemble of classifiers by using genetic programming for cyber security applications
-
Springer International Publishing, Porto, Portugal
-
Folino, Gianluigi, Sabatino, Pietro, Pisani, Francesco S., 2016. Combining ensemble of classifiers by using genetic programming for cyber security applications. In: Applications of Evolutionary Computation - 19th European Conference, EvoApplications 2016, 30 March-1 April. Proceedings. Lecture Notes in Computer Science. Springer International Publishing, Porto, Portugal.
-
(2016)
Applications of Evolutionary Computation - 19th European Conference, EvoApplications 2016, 30 March-1 April. Proceedings. Lecture Notes in Computer Science
-
-
Folino, G.1
Sabatino, P.2
Pisani, F.S.3
-
43
-
-
21244468777
-
Combining multiple clusterings using evidence accumulation
-
Ana L.N. Fred, and Anil K. Jain Combining multiple clusterings using evidence accumulation IEEE Trans. Pattern Anal. Mach. Intell. 27 6 2005 835 850
-
(2005)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.27
, Issue.6
, pp. 835-850
-
-
Fred, A.L.N.1
Jain, A.K.2
-
44
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garcìa-Teodoro, J. Dìaz-Verdejo, G. Maciá-Fernández, and J. Vázquez Anomaly-based network intrusion detection: techniques, systems and challenges Comput. Secur. 28 1-2 2009 18 28
-
(2009)
Comput. Secur.
, vol.28
, Issue.1-2
, pp. 18-28
-
-
Garcìa-Teodoro, P.1
Dìaz-Verdejo, J.2
MacIá-Fernández, G.3
Vázquez, J.4
-
45
-
-
35348821822
-
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
-
Special Issue on Applications of Ensemble Methods
-
Giorgio Giacinto, Roberto Perdisci, Mauro Del Rio, and Fabio Roli Intrusion detection in computer networks by a modular ensemble of one-class classifiers Inf. Fusion 9 1 2008 69 82 Special Issue on Applications of Ensemble Methods
-
(2008)
Inf. Fusion
, vol.9
, Issue.1
, pp. 69-82
-
-
Giacinto, G.1
Perdisci, R.2
Del Rio, M.3
Roli, F.4
-
46
-
-
84896319063
-
Network attacks: Taxonomy, tools and systems
-
0
-
N. Hoque, Monowar H. Bhuyan, R.C. Baishya, D.K. Bhattacharyya, and J.K. Kalita Network attacks: taxonomy, tools and systems J. Netw. Comput. Appl. 40 0 2014 307 324
-
(2014)
J. Netw. Comput. Appl.
, vol.40
, pp. 307-324
-
-
Hoque, N.1
Bhuyan, M.H.2
Baishya, R.C.3
Bhattacharyya, D.K.4
Kalita, J.K.5
-
47
-
-
77956613687
-
A novel intrusion detection system based on hierarchical clustering and support vector machines
-
Shi-Jinn Horng, Ming-Yang Su, Yuan-Hsin Chen, Tzong-Wann Kao, Rong-Jian Chen, Jui-Lin Lai, and Citra Dwi Perkasa A novel intrusion detection system based on hierarchical clustering and support vector machines Expert Syst. Appl. 38 1 2011 306 313
-
(2011)
Expert Syst. Appl.
, vol.38
, Issue.1
, pp. 306-313
-
-
Horng, S.-J.1
Su, M.-Y.2
Chen, Y.-H.3
Kao, T.-W.4
Chen, R.-J.5
Lai, J.-L.6
Dwi Perkasa, C.7
-
48
-
-
84891062279
-
Online Adaboost-based parameterized methods for dynamic distributed network intrusion detection
-
Weiming Hu, Jun Gao, Yanguo Wang, Ou Wu, and S. Maybank Online Adaboost-based parameterized methods for dynamic distributed network intrusion detection IEEE Trans. Cybern. 44 January (1) 2014 66 82
-
(2014)
IEEE Trans. Cybern.
, vol.44
, Issue.1 JANUARY
, pp. 66-82
-
-
Hu, W.1
Gao, J.2
Wang, Y.3
Wu, O.4
Maybank, S.5
-
49
-
-
84940768710
-
Parallel ensemble of online sequential extreme learning machine based on MapReduce
-
Shan Huang, Botao Wang, Junhao Qiu, Jitao Yao, Guoren Wang, and Ge Yu Parallel ensemble of online sequential extreme learning machine based on MapReduce Neurocomputing 174 Part A 2016 352 367
-
(2016)
Neurocomputing
, vol.174
, pp. 352-367
-
-
Huang, S.1
Wang, B.2
Qiu, J.3
Yao, J.4
Wang, G.5
Yu, G.6
-
50
-
-
85004899658
-
Quadratic assignment as a general data analysis strategy
-
Lawrence Hubert, and James Schultz Quadratic assignment as a general data analysis strategy Br. J. Math. Stat. Psychol. 29 2 1976 190 241
-
(1976)
Br. J. Math. Stat. Psychol.
, vol.29
, Issue.2
, pp. 190-241
-
-
Hubert, L.1
Schultz, J.2
-
51
-
-
38149142569
-
Comparing anomaly detection techniques for HTTP
-
Kruegel, Christopher, Lippmann, Richard, Clark, Andrew (Eds.) Springer, Berlin, Heidelberg
-
Ingham, Kenneth L., Inoue, Hajime, 2007. Comparing anomaly detection techniques for HTTP. In: Kruegel, Christopher, Lippmann, Richard, Clark, Andrew (Eds.), Recent Advances in Intrusion Detection. Lecture Notes in Computer Science, vol. 4637. Springer, Berlin, Heidelberg, pp. 42-62.
-
(2007)
Recent Advances in Intrusion Detection. Lecture Notes in Computer Science
, vol.4637
, pp. 42-62
-
-
Ingham, K.L.1
Inoue, H.2
-
52
-
-
84869475315
-
Kargus: A highly-scalable software-based intrusion detection system
-
ACM, New York, NY, USA
-
Jamshed, Muhammad Asim., Lee, Jihyung, Moon, Sangwoo, Yun, Insu, Kim, Deokjin, Lee, Sungryoul, Yi, Yung, Park, Kyoung Soo, 2012. Kargus: a highly-scalable software-based intrusion detection system. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 12. ACM, New York, NY, USA, pp. 317-328.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 12
, pp. 317-328
-
-
Jamshed, M.A.1
Lee, J.M.2
Sangwoo, Y.I.3
Kim, D.4
Lee, S.5
Yi, Y.6
Park, K.S.7
-
53
-
-
0027601884
-
ANFIS: Adaptive-network-based fuzzy inference system
-
J.-S.R. Jang ANFIS: adaptive-network-based fuzzy inference system IEEE Trans. Syst. Man Cybern. 23 May (3) 1993 665 685
-
(1993)
IEEE Trans. Syst. Man Cybern.
, vol.23
, Issue.3 MAY
, pp. 665-685
-
-
Jang, J.-S.R.1
-
55
-
-
77956590229
-
Unsupervised anomaly detection based on clustering and multiple one-class SVM
-
Song Jungsuk, Hiroki Takakura, Yasuo Okabe, and Kwon Yongjin Unsupervised anomaly detection based on clustering and multiple one-class SVM IEICE Trans. Commun. 92 6 2009 1981 1990
-
(2009)
IEICE Trans. Commun.
, vol.92
, Issue.6
, pp. 1981-1990
-
-
Jungsuk, S.1
Takakura, H.2
Okabe, Y.3
Yongjin, K.4
-
56
-
-
84883271942
-
Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets
-
Kayacik Günes, H., Nur Zincir-Heywood, A., Heywood Malcolm, I., 2005. Selecting features for intrusion detection: a feature relevance analysis on KDD 99 intrusion detection datasets. In: Proceedings of the Third Annual Conference on Privacy, Security and Trust.
-
(2005)
Proceedings of the Third Annual Conference on Privacy, Security and Trust.
-
-
Kayacik, G.H.1
Nur, Z.-H.A.2
Heywood, M.I.3
-
57
-
-
0037002475
-
Intrusion detection: A brief history and overview
-
R.A. Kemmerer, and G. Vigna Intrusion detection: a brief history and overview Computer 35 April (4) 2002 27 30
-
(2002)
Computer
, vol.35
, Issue.4 APRIL
, pp. 27-30
-
-
Kemmerer, R.A.1
Vigna, G.2
-
58
-
-
0037253062
-
The vision of autonomic computing
-
Jeffrey O. Kephart, and David M. Chess The vision of autonomic computing Computer 36 January (1) 2003 41 50
-
(2003)
Computer
, vol.36
, Issue.1 JANUARY
, pp. 41-50
-
-
Kephart, J.O.1
Chess, D.M.2
-
59
-
-
49749119545
-
Control theoretic approach to intrusion detection using a distributed hidden Markov model
-
R. Khanna, and Huaping Liu Control theoretic approach to intrusion detection using a distributed hidden Markov model IEEE Wireless Commun. 15 August (4) 2008 24 33
-
(2008)
IEEE Wireless Commun.
, vol.15
, Issue.4 AUGUST
, pp. 24-33
-
-
Khanna, R.1
Liu, H.2
-
60
-
-
34247391599
-
System approach to intrusion detection using Hidden Markov Model
-
ACM, New York, NY, USA
-
Khanna, Rahul, Liu, Huaping, 2006. System approach to intrusion detection using Hidden Markov Model. In: Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, IWCMC '06. ACM, New York, NY, USA, pp. 349-354.
-
(2006)
Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, IWCMC '06
, pp. 349-354
-
-
Khanna, R.1
Liu, H.2
-
61
-
-
0001927585
-
On information and sufficiency
-
03
-
S. Kullback, and R.A. Leibler On information and sufficiency Ann. Math. Stat. 22 1 1951 79 86 03
-
(1951)
Ann. Math. Stat.
, vol.22
, Issue.1
, pp. 79-86
-
-
Kullback, S.1
Leibler, R.A.2
-
62
-
-
79957736179
-
Distributed denial of service attack detection using an ensemble of neural classifier
-
P.Arun Raj Kumar, and S. Selvakumar Distributed denial of service attack detection using an ensemble of neural classifier Comput. Commun. 34 11 2011 1328 1341
-
(2011)
Comput. Commun.
, vol.34
, Issue.11
, pp. 1328-1341
-
-
Kumar, P.A.R.1
Selvakumar, S.2
-
63
-
-
84872155077
-
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
-
P.Arun Raj Kumar, and S. Selvakumar Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Comput. Commun. 36 3 2013 303 319
-
(2013)
Comput. Commun.
, vol.36
, Issue.3
, pp. 303-319
-
-
Kumar, P.A.R.1
Selvakumar, S.2
-
65
-
-
33845474264
-
A parallel intrusion detection system for high-speed networks
-
Jakobsson, Markus, Yung, Moti, Zhou, Jianying (Eds.) Springer, Berlin, Heidelberg
-
Lai, Haiguang, Cai, Shengwen, Huang, Hao, Xie, Junyuan, Li, Hui, 2004. A parallel intrusion detection system for high-speed networks. In: Jakobsson, Markus, Yung, Moti, Zhou, Jianying (Eds.), Applied Cryptography and Network Security, Lecture Notes in Computer Science, vol. 3089. Springer, Berlin, Heidelberg, pp. 439-451.
-
(2004)
Applied Cryptography and Network Security, Lecture Notes in Computer Science
, vol.3089
, pp. 439-451
-
-
Lai, H.1
Cai, S.2
Huang, H.3
Xie, J.4
Li, H.5
-
66
-
-
0036161242
-
Text categorization with support vector machines. How to represent texts in input space
-
Edda Leopold, and Jörg Kindermann Text categorization with support vector machines. How to represent texts in input space Mach. Learn. 46 1-3 2002 423 444
-
(2002)
Mach. Learn.
, vol.46
, Issue.1-3
, pp. 423-444
-
-
Leopold, E.1
Kindermann, J.2
-
67
-
-
84868695480
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
Australian Computer Society, Inc., Darlinghurst, Australia
-
Leung, Kingsly, Leckie, Christopher, 2005. Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the Twenty-eighth Australasian Conference on Computer Science, ACSC '05, vol. 38. Australian Computer Society, Inc., Darlinghurst, Australia, pp. 333-342.
-
(2005)
Proceedings of the Twenty-eighth Australasian Conference on Computer Science, ACSC '05
, vol.38
, pp. 333-342
-
-
Leung, K.1
Leckie, C.2
-
68
-
-
0034247885
-
Sequential Karhunen-Loeve basis extraction and its application to images
-
A. Levey, and M. Lindenbaum Sequential Karhunen-Loeve basis extraction and its application to images IEEE Trans. Image Process. 9 August (8) 2000 1371 1374
-
(2000)
IEEE Trans. Image Process.
, vol.9
, Issue.8 AUGUST
, pp. 1371-1374
-
-
Levey, A.1
Lindenbaum, M.2
-
69
-
-
34047174077
-
A fast and accurate online sequential learning algorithm for feedforward networks
-
Nan-Ying Liang, Guang-Bin Huang, Paramasivan Saratchandran, and Narasimhan Sundararajan A fast and accurate online sequential learning algorithm for feedforward networks IEEE Trans. Neural Netw. 17 6 2006 1411 1423
-
(2006)
IEEE Trans. Neural Netw.
, vol.17
, Issue.6
, pp. 1411-1423
-
-
Liang, N.-Y.1
Huang, G.-B.2
Saratchandran, P.3
Sundararajan, N.4
-
70
-
-
35148838877
-
The weighted majority algorithm
-
Nick Littlestone, and Manfred K. Warmuth The weighted majority algorithm Inf. Comput. 108 February (2) 1994 212 261
-
(1994)
Inf. Comput.
, vol.108
, Issue.2 FEBRUARY
, pp. 212-261
-
-
Littlestone, N.1
Warmuth, M.K.2
-
71
-
-
33745469273
-
Towards collaborative security and p2p intrusion detection
-
IEEE, New York, USA
-
Locasto, E. Michael, Parekh, Janak J., Keromytis, Angelos D., Stolfo, Salvatore J., 2005. Towards collaborative security and p2p intrusion detection. In: Information Assurance Workshop, 2005. IAW'05. Proceedings from the Sixth Annual IEEE SMC. IEEE, New York, USA, pp. 333-339.
-
(2005)
Information Assurance Workshop, 2005. IAW'05 Proceedings from the Sixth Annual IEEE SMC.
, pp. 333-339
-
-
Locasto, E.M.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
72
-
-
34247342888
-
An analysis of distributed sensor data aggregation for network intrusion detection
-
Special Issue with selected papers from the 11th IEEE Symposium on Computers and Communications (ISCC'06).
-
McEachen, John C., Wai Kah, Cheng, 2007. An analysis of distributed sensor data aggregation for network intrusion detection. Microprocess. Microsyst. 31(4), 263-272. Special Issue with selected papers from the 11th IEEE Symposium on Computers and Communications (ISCC'06).
-
(2007)
Microprocess. Microsyst.
, vol.31
, Issue.4
, pp. 263-272
-
-
McEachen, J.C.1
Cheng, W.K.2
-
73
-
-
1542492748
-
Identifying significant features for network forensic analysis using artificial intelligent techniques
-
Srinivas Mukkamala, and Andrew H. Sung Identifying significant features for network forensic analysis using artificial intelligent techniques Int. J. Digit. Evid. 1 4 2003 1 17
-
(2003)
Int. J. Digit. Evid.
, vol.1
, Issue.4
, pp. 1-17
-
-
Mukkamala, S.1
Sung, A.H.2
-
74
-
-
84949487685
-
A scalable parallel subspace clustering algorithm for massive data sets
-
IEEE, Toronto, Canada
-
Nagesh, H.S., Goil, S., Choudhary, A., 2000. A scalable parallel subspace clustering algorithm for massive data sets. In: 2000 International Conference on Parallel Processing, 2000. Proceedings. IEEE, Toronto, Canada, pp. 477-484.
-
(2000)
2000 International Conference on Parallel Processing, 2000. Proceedings
, pp. 477-484
-
-
Nagesh, H.S.1
Goil, S.2
Choudhary, A.3
-
75
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
May
-
Newsome, J., Karp, B., Song, D., 2005. Polygraph: automatically generating signatures for polymorphic worms. In: 2005 IEEE Symposium on Security and Privacy, May, pp. 226-241.
-
(2005)
2005 IEEE Symposium on Security and Privacy
, pp. 226-241
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
76
-
-
84855314334
-
An efficient local region and clustering-based ensemble system for intrusion detection
-
ACM, New York, NY, USA
-
Nguyen, Hoa Huu, Harbi, Nouria, Darmont, Jérôme, 2011. An efficient local region and clustering-based ensemble system for intrusion detection. In: Proceedings of the 15th Symposium on International Database Engineering & Applications, IDEAS ' 11, ACM, New York, NY, USA, pp. 185-191.
-
(2011)
Proceedings of the 15th Symposium on International Database Engineering & Applications, IDEAS ' 11
, pp. 185-191
-
-
Nguyen, H.H.1
Harbi, N.2
Darmont, J.3
-
77
-
-
84962165638
-
Machine learning based research for network intrusion detection: A state-of-the-art
-
Kanubhai Patel, and Bharat V. Buddhadev Machine learning based research for network intrusion detection: a state-of-the-art Int. J. Inf. Netw. Secur. 3 3 2014
-
(2014)
Int. J. Inf. Netw. Secur.
, vol.3
, Issue.3
-
-
Patel, K.1
Buddhadev, B.V.2
-
78
-
-
61749083929
-
McPAD: A multiple classifier system for accurate payload-based anomaly detection
-
Roberto Perdisci, Davide Ariu, Prahlad Fogla, Giorgio Giacinto, and Wenke Lee McPAD: a multiple classifier system for accurate payload-based anomaly detection Comput. Netw. 53 6 2009 864 881
-
(2009)
Comput. Netw.
, vol.53
, Issue.6
, pp. 864-881
-
-
Perdisci, R.1
Ariu, D.2
Fogla, P.3
Giacinto, G.4
Lee, W.5
-
79
-
-
84875216992
-
Scalable fine-grained behavioral clustering of http-based malware
-
Roberto Perdisci, Davide Ariu, and Davide Giacinto Scalable fine-grained behavioral clustering of http-based malware Comput. Netw. 57 2 2013 487 500
-
(2013)
Comput. Netw.
, vol.57
, Issue.2
, pp. 487-500
-
-
Perdisci, R.1
Ariu, D.2
Giacinto, D.3
-
80
-
-
85076751448
-
Behavioral clustering of http-based malware and signature generation using malicious network traces
-
USENIX Association, Berkeley, CA, USA
-
Perdisci, Roberto, Lee, Wenke, Feamster, Nick, 2010. Behavioral clustering of http-based malware and signature generation using malicious network traces. In: Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10, USENIX Association, Berkeley, CA, USA, pp. 26-26.
-
(2010)
Proceedings of the 7th USENIX Conference on Networked Systems Design and Implementation, NSDI'10
, pp. 26
-
-
Perdisci, R.1
Lee, W.2
Feamster, N.3
-
81
-
-
84962139445
-
Anomaly based intrusion detection - A review
-
Abhinav S. Raut, and Kavita R. Singh Anomaly based intrusion detection - a review Int. J. Netw. Secur. 5 2014
-
(2014)
Int. J. Netw. Secur.
, vol.5
-
-
Raut, A.S.1
Singh, K.R.2
-
82
-
-
84943274699
-
A direct adaptive method for faster backpropagation learning: The RPROP algorithm
-
Riedmiller, M., Braun, H., 1993. A direct adaptive method for faster backpropagation learning: the RPROP algorithm. In: IEEE International Conference on Neural Networks, vol. 1, pp. 586-591.
-
(1993)
IEEE International Conference on Neural Networks
, vol.1
, pp. 586-591
-
-
Riedmiller, M.1
Braun, H.2
-
83
-
-
0023453329
-
Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
-
0
-
Peter J. Rousseeuw Silhouettes: a graphical aid to the interpretation and validation of cluster analysis J. Comput. Appl. Math. 20 0 1987 53 65
-
(1987)
J. Comput. Appl. Math.
, vol.20
, pp. 53-65
-
-
Rousseeuw, P.J.1
-
84
-
-
33244461339
-
SPANIDS: A scalable network intrusion detection loadbalancer
-
ACM, New York, NY, USA, 2005
-
Schaelicke, Lambert, Wheeler, Kyle, Freeland, Curt, 2005. SPANIDS: a scalable network intrusion detection loadbalancer. In: Proceedings of the Second Conference on Computing Frontiers, CF'05. ACM, New York, NY, USA, 2005, pp. 315-322.
-
(2005)
Proceedings of the Second Conference on Computing Frontiers, CF'05
, pp. 315-322
-
-
Schaelicke, L.1
Wheeler, K.2
Freeland, C.3
-
85
-
-
0025448521
-
The strength of weak learnability
-
R.E. Schapire The strength of weak learnability Mach. Learn. 5 2 1990 197 227
-
(1990)
Mach. Learn.
, vol.5
, Issue.2
, pp. 197-227
-
-
Schapire, R.E.1
-
86
-
-
58149321460
-
Boosting a weak learning by majority
-
R.E. Schapire Boosting a weak learning by majority Inf. Comput. 121 2 1995 256 285
-
(1995)
Inf. Comput.
, vol.121
, Issue.2
, pp. 256-285
-
-
Schapire, R.E.1
-
87
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Bernhard Schölkopf, John C. Platt, John C. Shawe-Taylor, Alex J. Smola, and Robert C. Williamson Estimating the support of a high-dimensional distribution Neural Comput. 13 July (7) 2001 1443 1471
-
(2001)
Neural Comput.
, vol.13
, Issue.7 JULY
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.C.3
Smola, A.J.4
Williamson, R.C.5
-
88
-
-
27744553952
-
A Neyman-Pearson approach to statistical learning
-
C. Scott, and R. Nowak A Neyman-Pearson approach to statistical learning IEEE Trans. Inf. Theory 51 November (11) 2005 3806 3819
-
(2005)
IEEE Trans. Inf. Theory
, vol.51
, Issue.11 NOVEMBER
, pp. 3806-3819
-
-
Scott, C.1
Nowak, R.2
-
89
-
-
81855221688
-
Decision tree based light weight intrusion detection using a wrapper approach
-
Siva S. Sivatha Sindhu, S. Geetha, and A. Kannan Decision tree based light weight intrusion detection using a wrapper approach Expert Syst. Appl. 39 1 2012 129 141
-
(2012)
Expert Syst. Appl.
, vol.39
, Issue.1
, pp. 129-141
-
-
Sivatha Sindhu, S.S.1
Geetha, S.2
Kannan, A.3
-
90
-
-
84940460812
-
An intrusion detection system using network traffic profiling and online sequential extreme learning machine
-
Raman Singh, Harish Kumar, and R.K. Singla An intrusion detection system using network traffic profiling and online sequential extreme learning machine Expert Syst. Appl. 42 22 2015 8609 8624
-
(2015)
Expert Syst. Appl.
, vol.42
, Issue.22
, pp. 8609-8624
-
-
Singh, R.1
Kumar, H.2
Singla, R.K.3
-
91
-
-
84874114774
-
Toward a more practical unsupervised anomaly detection system
-
0 Data Mining for Information Security
-
Jungsuk Song, Hiroki Takakura, Yasuo Okabe, and Koji Nakao Toward a more practical unsupervised anomaly detection system Inf. Sci. 231 0 2013 4 14 Data Mining for Information Security
-
(2013)
Inf. Sci.
, vol.231
, pp. 4-14
-
-
Song, J.1
Takakura, H.2
Okabe, Y.3
Nakao, K.4
-
92
-
-
85180633963
-
Spectrogram: A mixture-of-Markov-chains model for anomaly detection in web traffic
-
February 8-11, Internet Society, San Diego, CA
-
Song, Yingbo, Keromytis, Angelos D., Stolfo, Salvatore, 2009. Spectrogram: a mixture-of-Markov-chains model for anomaly detection in web traffic. In: Network and Distributed System Security Symposium 2009. Proceedings, February 8-11, Internet Society, San Diego, CA, pp. 121-135.
-
(2009)
Network and Distributed System Security Symposium 2009. Proceedings
, pp. 121-135
-
-
Song, Y.1
Keromytis, A.D.2
Stolfo, S.3
-
93
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
Third
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller An overview of IP flow-based intrusion detection Commun. Surv. Tutor. IEEE 12 3 2010 343 356 Third
-
(2010)
Commun. Surv. Tutor. IEEE
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
94
-
-
80755187805
-
Sotiris Ioannidis. MIDe A: A multi-parallel intrusion detection architecture
-
ACM, New York, NY, USA
-
Vasiliadis, Giorgos, Polychronakis, Michalis, 2011. Sotiris Ioannidis. MIDe A: a multi-parallel intrusion detection architecture. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, ACM, New York, NY, USA, pp. 297-308.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 297-308
-
-
Vasiliadis, G.1
Polychronakis, M.2
-
95
-
-
84930153452
-
Taxonomy and survey of collaborative intrusion detection
-
Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, and Mathias Fischer Taxonomy and survey of collaborative intrusion detection ACM Comput. Surv. 47 May (4) 2015 55:1 55:33
-
(2015)
ACM Comput. Surv.
, vol.47
, Issue.4 MAY
, pp. 551-5533
-
-
Vasilomanolakis, E.1
Karuppayah, S.2
Mühlhäuser, M.3
Fischer, M.4
-
96
-
-
84889637856
-
A distributed network intrusion detection system architecture based on computer stations using GPGPU
-
June
-
Vokorokos, L., Ennert, M., Cajkovsky, M., Turinska, A., 2013. A distributed network intrusion detection system architecture based on computer stations using GPGPU. In: 2013 IEEE 17th International Conference on Intelligent Engineering Systems (INES), June, pp. 323-326.
-
2013 IEEE 17th International Conference on Intelligent Engineering Systems (INES)
, pp. 323-326
-
-
Vokorokos, L.1
Ennert, M.2
Cajkovsky, M.3
Turinska, A.4
-
97
-
-
84962141197
-
A survey of parallel intrusion detection on graphical processors
-
Liberios Vokorokos, Michal Ennert, Marek Čajkovský, and Ján Raduǒvský A survey of parallel intrusion detection on graphical processors Central Eur. J. Comput. Sci. 4 4 2014 222 230
-
(2014)
Central Eur. J. Comput. Sci.
, vol.4
, Issue.4
, pp. 222-230
-
-
Vokorokos, L.1
Ennert, M.2
Čajkovský, M.3
Raduǒvský, J.4
-
98
-
-
33745641552
-
Anomalous payload-based worm detection and signature generation
-
Valdes Alfonso, Zamboni Diego (Eds.) Springer, Berlin, Heidelberg, 2006
-
Wang, Ke, Cretu, Gabriela, Stolfo Salvatore J., 2006. Anomalous payload-based worm detection and signature generation. In: Valdes Alfonso, Zamboni Diego (Eds.), Recent Advances in Intrusion Detection. Lecture Notes in Computer Science, vol. 3858. Springer, Berlin, Heidelberg, 2006. pp. 227-246.
-
(2006)
Recent Advances in Intrusion Detection. Lecture Notes in Computer Science
, vol.3858
, pp. 227-246
-
-
Wang, K.1
Cretu, G.2
Stolfo, S.J.3
-
99
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
Springer, Hamburg, Germany
-
Wang, Ke, Parekh, Janak J, Stolfo, Salvatore J., 2006. Anagram: a content anomaly detector resistant to mimicry attack. In: Recent Advances in Intrusion Detection. Springer, Hamburg, Germany, pp. 226-248.
-
(2006)
Recent Advances in Intrusion Detection
, pp. 226-248
-
-
Wang, K.1
Parekh, J.J.2
Stolfo, S.J.3
-
100
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Erland, Jonsson, Alfonso, Valdes, Magnus, Almgren, (Eds.) Springer, Berlin, Heidelberg
-
Wang, Ke, Stolfo, Salvatore J., 2004. Anomalous payload-based network intrusion detection. In: Erland, Jonsson, Alfonso, Valdes, Magnus, Almgren, (Eds.), Recent Advances in Intrusion Detection. Lecture Notes in Computer Science, vol. 3224. Springer, Berlin, Heidelberg, pp. 203-222.
-
(2004)
Recent Advances in Intrusion Detection. Lecture Notes in Computer Science
, vol.3224
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
101
-
-
84908477169
-
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
-
Wei Wang, Thomas Guyet, René Quiniou, and Marie-Odile Cordier Autonomic intrusion detection: adaptively detecting anomalies over unlabeled audit data streams in computer networks Knowledge-Based Syst. 70 0 2014 103 117
-
(2014)
Knowledge-Based Syst.
, vol.70
, pp. 103-117
-
-
Wang, W.1
Guyet, T.2
Quiniou, R.3
Cordier, M.-O.4
-
102
-
-
84861334189
-
Data Mining: Practical Machine Learning Tools and Techniques: Practical Machine Learning Tools and Techniques
-
Elsevier Science.
-
Witten, I.H., Frank, E., Hall, M.A., 1991. Data Mining: Practical Machine Learning Tools and Techniques: Practical Machine Learning Tools and Techniques. The Morgan Kaufmann Series in Data Management Systems. Elsevier Science.
-
(1991)
The Morgan Kaufmann Series in Data Management Systems
-
-
Witten, I.H.1
Frank, E.2
Hall, M.A.3
-
103
-
-
0026204245
-
A validity measure for fuzzy clustering
-
Xuanli Lisa Xie, and G. Beni A validity measure for fuzzy clustering IEEE Trans. Pattern Anal. Mach. Intell. 13 August (8) 1991 841 847
-
(1991)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.13
, Issue.8 AUGUST
, pp. 841-847
-
-
Xie, X.L.1
Beni, G.2
-
104
-
-
42549142161
-
Anomaly based network intrusion detection with unsupervised outlier detection
-
June
-
Zhang, Jiong, Zulkernine, M., 2006. Anomaly based network intrusion detection with unsupervised outlier detection. In: ICC'06. IEEE International Conference on Communications, vol. 5, June, pp. 2388-2393.
-
(2006)
ICC'06. IEEE International Conference on Communications
, vol.5
, pp. 2388-2393
-
-
Zhang, J.1
Zulkernine, M.2
-
106
-
-
0030157145
-
Birch: An efficient data clustering method for very large databases
-
ACM
-
Zhang, Tian, Ramakrishnan, Raghu, Livny, Miron, 1996. Birch: an efficient data clustering method for very large databases. In: ACM SIGMOD Record, vol. 25. ACM, pp. 103-114.
-
(1996)
ACM SIGMOD Record
, vol.25
, pp. 103-114
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
-
107
-
-
84928829713
-
Algorithms to speedup pattern matching for network intrusion detection systems
-
Kai Zheng, Zhiping Cai, Xin Zhang, Zhijun Wang, and Baohua Yang Algorithms to speedup pattern matching for network intrusion detection systems Computer Communications, Elsevier Science Publishers 62 2015 47 58
-
(2015)
Computer Communications, Elsevier Science Publishers
, vol.62
, pp. 47-58
-
-
Zheng, K.1
Cai, Z.2
Zhang, X.3
Wang, Z.4
Yang, B.5
-
108
-
-
67649509485
-
Decentralized multi-dimensional alert correlation for collaborative intrusion detection
-
Chenfeng Vincent Zhou, Christopher Leckie, and Shanika Karunasekera Decentralized multi-dimensional alert correlation for collaborative intrusion detection J. Netw. Comput. Appl. 32 5 2009 1106 1123
-
(2009)
J. Netw. Comput. Appl.
, vol.32
, Issue.5
, pp. 1106-1123
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
109
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
Chenfeng Vincent Zhou, Christopher Leckie, and Shanika Karunasekera A survey of coordinated attacks and collaborative intrusion detection Comput. Secur. 29 1 2010 124 140
-
(2010)
Comput. Secur.
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
|