-
3
-
-
84900856383
-
Enhancing SVM performance in intrusion detection using optimal feature subset selection based on genetic principal components
-
I. Ahmad, M. Hussain, A. Alghamdi, and A. Alelaiwi. Enhancing svm performance in intrusion detection using optimal feature subset selection based on genetic principal components. Neural Computing and Applications, 24(7-8):1671-1682, 2014.
-
(2014)
Neural Computing and Applications
, vol.24
, Issue.7-8
, pp. 1671-1682
-
-
Ahmad, I.1
Hussain, M.2
Alghamdi, A.3
Alelaiwi, A.4
-
4
-
-
84963694944
-
Network intrusion detection system using neural network classification of attack behavior
-
O. Al-Jarrah and A. Arafat. Network intrusion detection system using neural network classification of attack behavior. Journal of Advances in Information Technology Vol, 6(1), 2015.
-
(2015)
Journal of Advances in Information Technology
, vol.6
, Issue.1
-
-
Al-Jarrah, O.1
Arafat, A.2
-
6
-
-
0035478854
-
Random forests
-
L. Breiman. Random forests. Machine learning, 45(1):5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
7
-
-
79956009493
-
Attacks against process control systems: Risk assessment, detection, and response
-
ACM
-
A. A. Cárdenas, S. Amin, Z.-S. Lin, Y.-L. Huang, C.-Y. Huang, and S. Sastry. Attacks against process control systems: risk assessment, detection, and response. In Proceedings of the 6th ACM symposium on information, computer and communications security, pages 355-366. ACM, 2011.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 355-366
-
-
Cárdenas, A.A.1
Amin, S.2
Lin, Z.-S.3
Huang, Y.-L.4
Huang, C.-Y.5
Sastry, S.6
-
8
-
-
70350634504
-
-
S. Cheung, B. Dutertre, M. Fong, U. Lindqvist, K. Skinner, and A. Valdes. Using model-based intrusion detection for scada networks.
-
Using Model-based Intrusion Detection for Scada Networks
-
-
Cheung, S.1
Dutertre, B.2
Fong, M.3
Lindqvist, U.4
Skinner, K.5
Valdes, A.6
-
10
-
-
0031276011
-
Bayesian network classifiers
-
N. Friedman, D. Geiger, and M. Goldszmidt. Bayesian network classifiers. Machine learning, 29(2-3):131-163, 1997.
-
(1997)
Machine Learning
, vol.29
, Issue.2-3
, pp. 131-163
-
-
Friedman, N.1
Geiger, D.2
Goldszmidt, M.3
-
12
-
-
79952527986
-
On scada control system command and response injection and intrusion detection
-
IEEE
-
W. Gao, T. Morris, B. Reaves, and D. Richey. On scada control system command and response injection and intrusion detection. In Proceedings of the 5th Annual Anti-Phishing Working Group eCrime Researchers Summit (eCrime), pages 1-9. IEEE, 2010.
-
(2010)
Proceedings of the 5th Annual Anti-Phishing Working Group ECrime Researchers Summit (eCrime)
, pp. 1-9
-
-
Gao, W.1
Morris, T.2
Reaves, B.3
Richey, D.4
-
13
-
-
84963704036
-
On cyber attacks and signature based intrusion detection for modbus based industrial control systems
-
W. Gao and T. H. Morris. On cyber attacks and signature based intrusion detection for modbus based industrial control systems. Journal of Digital Forensics, Security and Law, 9(1):37-56, 2014.
-
(2014)
Journal of Digital Forensics, Security and Law
, vol.9
, Issue.1
, pp. 37-56
-
-
Gao, W.1
Morris, T.H.2
-
14
-
-
84922111387
-
Support vector machine and random forest modeling for intrusion detection systems
-
M. A. M. Hasan, M. Nasser, B. Pal, and S. Ahmad. Support vector machine and random forest modeling for intrusion detection systems. Journal of Intelligent Learning Systems and Applications, 2014, 2014.
-
Journal of Intelligent Learning Systems and Applications
, vol.2014
, pp. 2014
-
-
Hasan, M.A.M.1
Nasser, M.2
Pal, B.3
Ahmad, S.4
-
16
-
-
84865209539
-
A network intrusion detection system based on a hidden naïve bayes multiclass classifier
-
L. Koc, T. A. Mazzuchi, and S. Sarkani. A network intrusion detection system based on a hidden naïve bayes multiclass classifier. Expert Systems with Applications, 39(18):13492-13500, 2012.
-
(2012)
Expert Systems with Applications
, vol.39
, Issue.18
, pp. 13492-13500
-
-
Koc, L.1
Mazzuchi, T.A.2
Sarkani, S.3
-
18
-
-
84875967976
-
Adapting bro into scada: Building a specification-based intrusion detection system for the dnp3 protocol
-
ACM
-
H. Lin, A. Slagell, C. Di Martino, Z. Kalbarczyk, and R. K. Iyer. Adapting bro into scada: building a specification-based intrusion detection system for the dnp3 protocol. In Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop, page 5. ACM, 2013.
-
(2013)
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
, pp. 5
-
-
Lin, H.1
Slagell, A.2
Di Martino, C.3
Kalbarczyk, Z.4
Iyer, R.K.5
-
19
-
-
70449371464
-
Neural network based intrusion detection system for critical infrastructures
-
IJCNN 2009. International Joint Conference on IEEE
-
O. Linda, T. Vollmer, and M. Manic. Neural network based intrusion detection system for critical infrastructures. In Neural Networks, 2009. IJCNN 2009. International Joint Conference on, pages 1827-1834. IEEE, 2009.
-
(2009)
Neural Networks, 2009
, pp. 1827-1834
-
-
Linda, O.1
Vollmer, T.2
Manic, M.3
-
20
-
-
84909595154
-
Intrusion detection in scada systems using machine learning techniques
-
Aug
-
L. Maglaras and J. Jiang. Intrusion detection in scada systems using machine learning techniques. In Science and Information Conference (SAI), 2014, pages 626-631, Aug 2014.
-
(2014)
Science and Information Conference (SAI), 2014
, pp. 626-631
-
-
Maglaras, L.1
Jiang, J.2
-
21
-
-
84921327876
-
Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems
-
R. Mitchell and I.-R. Chen. Behavior rule specification-based intrusion detection for safety critical medical cyber physical systems. Dependable and Secure Computing, IEEE Transactions on, 12(1):16-30, 2015.
-
(2015)
Dependable and Secure Computing, IEEE Transactions On
, vol.12
, Issue.1
, pp. 16-30
-
-
Mitchell, R.1
Chen, I.-R.2
-
22
-
-
80052094240
-
A control system testbed to validate critical infrastructure protection concepts
-
T. Morris, A. Srivastava, B. Reaves, W. Gao, K. Pavurapu, and R. Reddi. A control system testbed to validate critical infrastructure protection concepts. International Journal of Critical Infrastructure Protection, 4(2):88-103, 2011.
-
(2011)
International Journal of Critical Infrastructure Protection
, vol.4
, Issue.2
, pp. 88-103
-
-
Morris, T.1
Srivastava, A.2
Reaves, B.3
Gao, W.4
Pavurapu, K.5
Reddi, R.6
-
23
-
-
80052996993
-
Intrusion detection based on k-means clustering and naïve bayes classification
-
IEEE
-
Z. Muda, W. Yassin, M. Sulaiman, and N. Udzir. Intrusion detection based on k-means clustering and naïve bayes classification. In Information Technology in Asia (CITA 11), 2011 7th International Conference on, pages 1-6. IEEE, 2011.
-
(2011)
Information Technology in Asia (CITA 11), 2011 7th International Conference On
, pp. 1-6
-
-
Muda, Z.1
Yassin, W.2
Sulaiman, M.3
Udzir, N.4
-
24
-
-
84910094055
-
Norms in one-class classification for intrusion detection in scada systems
-
P. Nader, P. Honeine, and P. Beauseroy. -norms in one-class classification for intrusion detection in scada systems. Industrial Informatics, IEEE Transactions on, 10(4):2308-2317, 2014.
-
(2014)
Industrial Informatics, IEEE Transactions On
, vol.10
, Issue.4
, pp. 2308-2317
-
-
Nader, P.1
Honeine, P.2
Beauseroy, P.3
-
25
-
-
84912557794
-
Mahalanobis-based one-class classification
-
P. Nader, P. Honeine, and P. Beauseroy. Mahalanobis-based one-class classification. In Machine Learning for Signal Processing (MLSP), 2014 IEEE International Workshop on, pages 1-6, 2014.
-
(2014)
Machine Learning for Signal Processing (MLSP), 2014 IEEE International Workshop On
, pp. 1-6
-
-
Nader, P.1
Honeine, P.2
Beauseroy, P.3
-
26
-
-
84978923893
-
Intrusion detection system: A hybrid approach for cyber-physical environments
-
J. M. B. Palácios, J. R. B. Garay, A. M. Oliveira, and S. T. Kofuji. Intrusion detection system: A hybrid approach for cyber-physical environments. Technology, 39:193-204, 2013.
-
(2013)
Technology
, vol.39
, pp. 193-204
-
-
Palácios, J.M.B.1
Garay, J.R.B.2
Oliveira, A.M.3
Kofuji, S.T.4
-
31
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C.-F. Tsai, Y.-F. Hsu, C.-Y. Lin, and W.-Y. Lin. Intrusion detection by machine learning: A review. Expert Systems with Applications, 36(10):11994-12000, 2009.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsai, C.-F.1
Hsu, Y.-F.2
Lin, C.-Y.3
Lin, W.-Y.4
-
32
-
-
34247636165
-
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
C.-H. Tsang, S. Kwong, and H. Wang. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognition, 40(9):2373-2391, 2007.
-
(2007)
Pattern Recognition
, vol.40
, Issue.9
, pp. 2373-2391
-
-
Tsang, C.-H.1
Kwong, S.2
Wang, H.3
-
33
-
-
81155132587
-
Classifying network attack types with machine learning approach
-
Sept
-
N. Wattanapongsakorn, P. Sangkatsanee, S. Srakaew, and C. Charnsripinyo. Classifying network attack types with machine learning approach. In Networked Computing (INC), 2011 The 7th International Conference on, pages 98-102, Sept 2011.
-
(2011)
Networked Computing (INC), 2011 the 7th International Conference On
, pp. 98-102
-
-
Wattanapongsakorn, N.1
Sangkatsanee, P.2
Srakaew, S.3
Charnsripinyo, C.4
-
34
-
-
84931097715
-
Bayesian model averaging of Bayesian network classifiers for intrusion detection
-
IEEE
-
L. Xiao, Y. Chen, and C. K. Chang. Bayesian model averaging of bayesian network classifiers for intrusion detection. In Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International, pages 128-133. IEEE, 2014.
-
(2014)
Computer Software and Applications Conference Workshops (COMPSACW), 2014 IEEE 38th International
, pp. 128-133
-
-
Xiao, L.1
Chen, Y.2
Chang, C.K.3
-
35
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
N. Ye, S. M. Emran, Q. Chen, and S. Vilbert. Multivariate statistical analysis of audit trails for host-based intrusion detection. Computers, IEEE Transactions on, 51(7):810-820, 2002.
-
(2002)
Computers, IEEE Transactions On
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
36
-
-
82155167665
-
Distributed intrusion detection system in a multi-layer network architecture of smart grids
-
Y. Zhang, L. Wang, W. Sun, R. C. Green, M. Alam, et al Distributed intrusion detection system in a multi-layer network architecture of smart grids. Smart Grid, IEEE Transactions on, 2(4):796-808, 2011.
-
(2011)
Smart Grid, IEEE Transactions On
, vol.2
, Issue.4
, pp. 796-808
-
-
Zhang, Y.1
Wang, L.2
Sun, W.3
Green, R.C.4
Alam, M.5
|