-
1
-
-
80955142722
-
Swarm intel-ligence in intrusion detection: A survey
-
C. Kolias, G. Kambourakis, and M. Maragoudakis, "Swarm intel-ligence in intrusion detection: A survey," Comput. Secur., vol.30, no.8, pp.625-642, 2011.
-
(2011)
Comput. Secur.
, vol.30
, Issue.8
, pp. 625-642
-
-
Kolias, C.1
Kambourakis, G.2
Maragoudakis, M.3
-
2
-
-
33745163595
-
Learning intrusion detection: Supervised or unsupervised
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
P. Laskov, P. Düssel, C. Schäfer, and K. Rieck, "Learning intrusion detection: Supervised or unsupervised," Image Analysis and Pro-cessing, ICIAP 2005, Lecture Notes in Computer Science, vol.3617, pp.50-57, Springer Berlin Heidelberg, Berlin, Heidelberg, 2005.
-
(2005)
Image Analysis and Pro-cessing, ICIAP 2005, Lecture Notes in Computer Science
, vol.3617
, pp. 50-57
-
-
Laskov, P.1
Düssel, P.2
Schäfer, C.3
Rieck, K.4
-
4
-
-
33846318873
-
Ant colony clustering and feature ex-traction for anomaly intrusion detection
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
C.-H. Tsang and S. Kwong, "Ant colony clustering and feature ex-traction for anomaly intrusion detection," SwarmIntelligence in Data Mining, Studies in Computational Intelligence, vol.34, pp.101-123, Springer Berlin Heidelberg, Berlin, Heidelberg, 2006.
-
(2006)
SwarmIntelligence in Data Mining, Studies in Computational Intelligence
, vol.34
, pp. 101-123
-
-
Tsang, C.-H.1
Kwong, S.2
-
5
-
-
84912115872
-
A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks
-
A. Karami and M. Guerrero-Zapata, "A fuzzy anomaly detection system based on hybrid PSO-Kmeans algorithm in content-centric networks," Neurocomputing, vol.149, pp.1253-1269, 2015.
-
(2015)
Neurocomputing
, vol.149
, pp. 1253-1269
-
-
Karami, A.1
Guerrero-Zapata, M.2
-
6
-
-
85008350590
-
Artificial immune system based intrusion detection: Innate immunity using an unsupervised learning approach
-
F. Hosseinpour,V.P. Amoli, F. Frahnakian, J. Plosila, and T. Hämäläi-nen, "Artificial immune system based intrusion detection: Innate immunity using an unsupervised learning approach," International Journal of Digital Content Technology and its Applications, vol.8, no.5, pp.1-12, 2014.
-
(2014)
International Journal of Digital Content Technology and Its Applications
, vol.8
, Issue.5
, pp. 1-12
-
-
Hosseinpour, F.1
Amoli, V.P.2
Frahnakian, F.3
Plosila, J.4
Hämäläi-Nen, T.5
-
7
-
-
84867489044
-
A parallel cellular ant colony algo-rithm for clustering and sorting
-
Springer Berlin Hei-delberg, Berlin, Heidelberg
-
P. Albuquerque and A. Dupuis, "A parallel cellular ant colony algo-rithm for clustering and sorting," Cellular Automata, Lecture Notes in Computer Science, vol.2493, pp.220-230, Springer Berlin Hei-delberg, Berlin, Heidelberg, 2002.
-
(2002)
Cellular Automata, Lecture Notes in Computer Science
, vol.2493
, pp. 220-230
-
-
Albuquerque, P.1
Dupuis, A.2
-
8
-
-
0008568526
-
Antclass: Discovery of clusters in numeric data by a hybridization of an ant colony with the k-means algorithm
-
N. Monmarché, M. Slimane, and G. Venturini, "Antclass: Discovery of clusters in numeric data by a hybridization of an ant colony with the k-means algorithm," Internal Report, no.213, pp.1-21, 1999.
-
(1999)
Internal Report
, Issue.213
, pp. 1-21
-
-
Monmarché, N.1
Slimane, M.2
Venturini, G.3
-
9
-
-
84949817605
-
Data visualization method for growing self-organizing networks with ant clustering algorithm
-
Springer Berlin Heidelberg, Berlin, Heidelberg
-
T. Mikami and M. Wada, "Data visualization method for growing self-organizing networks with ant clustering algorithm," Advances in Artificial Life, Lecture Notes in Computer Science, vol.2159, pp.623-626, Springer Berlin Heidelberg, Berlin, Heidelberg, 2001.
-
(2001)
Advances in Artificial Life, Lecture Notes in Computer Science
, vol.2159
, pp. 623-626
-
-
Mikami, T.1
Wada, M.2
-
11
-
-
80955163766
-
A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection
-
M.S. Abadeh and J. Habibi, "A hybridization of evolutionary fuzzy systems and ant colony optimization for intrusion detection," ISC Int'l Journal of Information Security, vol.2, pp.33-46, 2010.
-
(2010)
ISC Int'l Journal of Information Security
, vol.2
, pp. 33-46
-
-
Abadeh, M.S.1
Habibi, J.2
-
12
-
-
58149104386
-
Guide to intrusion detection and prevention systems (IDPS)
-
K. Scarfone and P. Mell, "Guide to intrusion detection and prevention systems (IDPS)," NIST, Special Publication 800-94, 2007.
-
(2007)
NIST, Special Publication
, pp. 800-894
-
-
Scarfone, K.1
Mell, P.2
-
13
-
-
24744465266
-
Towards improving clustering ants: An adaptive ant clustering algorithm
-
A.L. Vizine, L.N. de Castro, and E. Hrusch, "Towards improving clustering ants: An adaptive ant clustering algorithm," J. Informatica, vol.29, no.2, pp.143-154, 2005.
-
(2005)
J. Informatica
, vol.29
, Issue.2
, pp. 143-154
-
-
Vizine, A.L.1
De Castro, L.N.2
Hrusch, E.3
-
14
-
-
84888431725
-
Agreement-based fuzzy C-means for clustering data with blocks of features
-
H. Izakian and W. Pedrycz, "Agreement-based fuzzy C-means for clustering data with blocks of features," Neurocomputing, vol.127, pp.266-280, 2014.
-
(2014)
Neurocomputing
, vol.127
, pp. 266-280
-
-
Izakian, H.1
Pedrycz, W.2
-
15
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
M. Tavallaee, E. Bagheri, W. Lu, and A.A. Ghorbani, "A detailed analysis of the KDD CUP 99 data set," Proc. IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp.1-6, 2009.
-
(2009)
Proc. IEEE Symposium on Computational Intelligence for Security and Defense Applications
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
16
-
-
84871859918
-
An intelligent intrusion detection system using genetic algorithms and features selection
-
H.M. Shirazi, "An intelligent intrusion detection system using genetic algorithms and features selection," Majlesi Journal of Electrical En-gineering, vol.4, no.1, 2010.
-
(2010)
Majlesi Journal of Electrical En-gineering
, vol.4
, Issue.1
-
-
Shirazi, H.M.1
-
17
-
-
85008312861
-
Design of an intrusion detection system for unknown-attacks based on bio-inspired algorithms
-
K. Kim, H. Kim, and K. Kim, "Design of an intrusion detection system for unknown-attacks based on bio-inspired algorithms," Proc. Computer Security Symposium 2015 (CSS 2015), pp.64-70, 2015.
-
(2015)
Proc. Computer Security Symposium 2015 (CSS 2015)
, pp. 64-70
-
-
Kim, K.1
Kim, H.2
Kim, K.3
|