-
1
-
-
85191939549
-
-
fail2ban 6 Nov. [Accessed 25 Mar. 2015]
-
Fail2ban, "fail2ban, " 6 Nov. 2014. [Online]. Available: http://www. fail2ban. org/wiki/index. php/Main-page. [Accessed 25 Mar. 2015].
-
(2014)
-
-
-
2
-
-
85192019316
-
Moving towards an adaptive enterprise intrusion detection and prevention system
-
Las Vegas, NV
-
T. C. Amick, L. R. Soles and D. H. Snider, "Moving Towards an Adaptive Enterprise Intrusion Detection and Prevention System, " in Proceedings of the 2015 International Conference on Artificial Intelligence (ICAI'15), Las Vegas, NV, 2015.
-
(2015)
Proceedings of the 2015 International Conference on Artificial Intelligence (ICAI'15)
-
-
Amick, T.C.1
Soles, L.R.2
Snider, D.H.3
-
3
-
-
33750528950
-
Intrusion detection using a fuzzy genetics-based learning algorithm
-
M. S. Abadeh, J. Habibi and C. Lucas, "Intrusion Detection Using a Fuzzy Genetics-based Learning Algorithm, " Journal of Network and Computer Applications, vol. 30, pp. 414-428, 2007.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, pp. 414-428
-
-
Abadeh, M.S.1
Habibi, J.2
Lucas, C.3
-
4
-
-
25844491810
-
An intelligent intrusion detection system for anomaly and misuse detection in computer networks
-
O. Depren, M. Topallar, E. Anarim and M. K. Ciliz, "An Intelligent Intrusion Detection System for Anomaly and Misuse Detection in Computer Networks, " Expert Systems with Applications, vol. 29, pp. 713-722, 2005.
-
(2005)
Expert Systems with Applications
, vol.29
, pp. 713-722
-
-
Depren, O.1
Topallar, M.2
Anarim, E.3
Ciliz, M.K.4
-
5
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
S. Peddabachigari, A. Abraham, C. Grosnan and J. Thomas, "Modeling Intrusion Detection System Using Hybrid Intelligent Systems, " Journal of Network and Computer Applications, vol. 30, pp. 114-132, 2007.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosnan, C.3
Thomas, J.4
-
6
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
DMSA-2001, Philadelphia, PA
-
L. Portnoy, E. Eskin and S. Stolfo, "Intrusion detection with unlabeled data using clustering, " in Proceedings of ACM CSS Workshop on Data Mining Applied to Security 2001, DMSA-2001, Philadelphia, PA, 2001.
-
(2001)
Proceedings of ACM CSS Workshop on Data Mining Applied to Security 2001
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
7
-
-
77954651309
-
Intelligent intrusion detection system framework using mobile agents
-
N. Jaisankar, R. Saravanan and K. D. Swamy, "Intelligent Intrusion Detection System Framework Using Mobile Agents, " International Journal of Network Security and Its Applications, vol. 1, no. 2, pp. 72-88, 2009.
-
(2009)
International Journal of Network Security and Its Applications
, vol.1
, Issue.2
, pp. 72-88
-
-
Jaisankar, N.1
Saravanan, R.2
Swamy, K.D.3
-
8
-
-
84980026382
-
-
McAfee, Inc. [Accessed 27 Feb 2015]
-
McAfee, Inc., "Intrusion Prevention System-Network Security Platform, " 2014. [Online]. Available: http://www. mcafee. com/us/products/network-security-platform. Aspx. [Accessed 27 Feb 2015].
-
(2014)
Intrusion Prevention System-Network Security Platform
-
-
-
9
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fernandez and E. Vazquez, "Anomaly-based Network Intrusion Detection: Techniques, Systems and Challenges, " Computers & Security, vol. 28, pp. 18-28, 2009.
-
(2009)
Computers & Security
, vol.28
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
Macia-Fernandez, G.3
Vazquez, E.4
-
10
-
-
85192026581
-
-
PyCharm. [Accessed 15 Sep. 2015]
-
JetBrains, "PyCharm, " [Online]. Available: https://www. jetbrains. com/pycharm/. [Accessed 15 Sep. 2015].
-
-
-
-
13
-
-
85191946767
-
-
Snort. org, Snort. org 24 Jan. [Accessed 28 Feb. 2015]
-
Snort. org, "Snort. org, " 24 Jan. 2015. [Online]. Available: www. snort. org. [Accessed 28 Feb. 2015].
-
(2015)
-
-
|