-
1
-
-
80052169144
-
Persistent threats and how to monitor and deter them
-
C. Tankard, "Persistent threats and how to monitor and deter them," Network security, vol. 2011, no. 8, pp. 16-19, 2011.
-
(2011)
Network Security
, vol.2011
, Issue.8
, pp. 16-19
-
-
Tankard, C.1
-
2
-
-
80051793908
-
Data preprocessing for anomaly based network intrusion detection: A review
-
J. Davis and A. Clarck, "Data preprocessing for anomaly based network intrusion detection: A review," Computers & Security, vol. 30, pp. 353-375, 2011.
-
(2011)
Computers & Security
, vol.30
, pp. 353-375
-
-
Davis, J.1
Clarck, A.2
-
3
-
-
84920171739
-
Anomaly detection in computer networks: A state-of-the-art review
-
S. Baddar, A. Merlo and M. Migliardi, "Anomaly Detection in Computer Networks: A State-of-the-Art Review" Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 5, No. 4, pp. 29-64, 2014.
-
(2014)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
, vol.5
, Issue.4
, pp. 29-64
-
-
Baddar, S.1
Merlo, A.2
Migliardi, M.3
-
4
-
-
84964932649
-
Reducing false negatives in intelligent intrusion detection decision response system
-
H. Kai, Y. Liu and L. Zhou, "Reducing false negatives in intelligent intrusion detection decision response system," Sanya, 2012.
-
(2012)
Sanya
-
-
Kai, H.1
Liu, Y.2
Zhou, L.3
-
5
-
-
33846696048
-
A new taxonomy for comparing intrusion detection systems
-
C. Tucker, S. Furnell, B. Ghita and P. Brooke, "A new taxonomy for comparing intrusion detection systems," Internet Research, vol. 17, pp. 88-98, 2007.
-
(2007)
Internet Research
, vol.17
, pp. 88-98
-
-
Tucker, C.1
Furnell, S.2
Ghita, B.3
Brooke, P.4
-
6
-
-
84884206484
-
Probabilistic spatio-temporal inference for motion event understanding
-
Dec.
-
C. Choi, J. Choi, E. Lee, I. You, and P. Kim, "Probabilistic Spatio-Temporal Inference for Motion Event Understanding", Journal of Neurocomputing, vol. 122, pp. 24-32, Dec. 2013.
-
(2013)
Journal of Neurocomputing
, vol.122
, pp. 24-32
-
-
Choi, C.1
Choi, J.2
Lee, E.3
You, I.4
Kim, P.5
-
7
-
-
84954095514
-
Visual analytics of E-mail sociolinguistics for user behavioural analysis
-
P. Legg, O. Buckley, M. Goldsmith and S. Creese, "Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis," Journal of Internet Services and Information Security (JISIS), Vol. 4(4), pp. 1-13, 2014.
-
(2014)
Journal of Internet Services and Information Security (JISIS)
, vol.4
, Issue.4
, pp. 1-13
-
-
Legg, P.1
Buckley, O.2
Goldsmith, M.3
Creese, S.4
-
8
-
-
84907261113
-
Evaluation of computer network security based on attack graphs and security event processing
-
I. Kotenko and E. Doynikova, "Evaluation of Computer Network Security based on Attack Graphs and Security Event Processing," Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), Vol. 5, No. 3, pp. 14-29, 2014.
-
(2014)
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)
, vol.5
, Issue.3
, pp. 14-29
-
-
Kotenko, I.1
Doynikova, E.2
-
10
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
S. Wu and W. Banzhaf, "The use of computational intelligence in intrusion detection systems: A review," Applied Soft Computing, vol. 10, pp. 1-35, 2010.
-
(2010)
Applied Soft Computing
, vol.10
, pp. 1-35
-
-
Wu, S.1
Banzhaf, W.2
-
11
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Oakland
-
R. Sommer and V. Paxson, "Outside the Closed World: On Using Machine Learning for Network Intrusion Detection," in 2010 IEEE Symposium on Security and Privacy, Oakland, 2010.
-
(2010)
2010 IEEE Symposium on Security and Privacy
-
-
Sommer, R.1
Paxson, V.2
-
13
-
-
71749107086
-
A survey of coordinated attacks an collaborative intrusion detection
-
C. Zhou, C. Leckie and S. Karunasekera, "A survey of coordinated attacks an collaborative intrusion detection," Computers & Security, vol. 29, pp. 124-140, 2010.
-
(2010)
Computers & Security
, vol.29
, pp. 124-140
-
-
Zhou, C.1
Leckie, C.2
Karunasekera, S.3
-
14
-
-
84862684188
-
Security threats and security policy in wireless sensor networks
-
Z. Shen, S. Liu, "Security Threats and Security Policy In Wireless Sensor Networks", AISS, Vol. 4, No. 10, pp. 166-173, 2012.
-
(2012)
AISS
, vol.4
, Issue.10
, pp. 166-173
-
-
Shen, Z.1
Liu, S.2
-
15
-
-
84886888628
-
An unknown trojan detection method based on software network behavior
-
Y. Liang, G. Peng, H. Zhang, and Y. Wang, "An unknown trojan detection method based on software network behavior," Wuhan University Journal of Natural Sciences, Vol. 18, pp. 369-376, 2013.
-
(2013)
Wuhan University Journal of Natural Sciences
, vol.18
, pp. 369-376
-
-
Liang, Y.1
Peng, G.2
Zhang, H.3
Wang, Y.4
-
16
-
-
84893264720
-
A host-based anomaly detection approach by representing system calls as states of kernel modules
-
Mario Couture
-
S. S. Murtaza, et al., Mario Couture, "A host-based anomaly detection approach by representing system calls as states of kernel modules," Proc. of 24th Intl. Symposium on Software Reliability Engineering(ISSRE), pp. 431-440, 2013.
-
(2013)
Proc. of 24th Intl. Symposium on Software Reliability Engineering(ISSRE)
, pp. 431-440
-
-
Murtaza, S.S.1
-
17
-
-
84938889930
-
Host based anomaly detection using Fuzzy Genetic Approach (FGA)
-
H. Kaur and N. Gill, "Host based Anomaly Detection using Fuzzy Genetic Approach (FGA)," International Journal of Computer Applications, Vol. 74, No. 20, pp.5-9, 2013.
-
(2013)
International Journal of Computer Applications
, vol.74
, Issue.20
, pp. 5-9
-
-
Kaur, H.1
Gill, N.2
|