-
1
-
-
85034572289
-
-
Snort, "https://www.snort.org/..
-
Snort
-
-
-
2
-
-
84884203185
-
Network anomaly detection with the restricted boltzmann machine
-
U. Fiore, F. Palmieri, A. Castiglione, and A. De Santis, "Network Anomaly Detection with the Restricted Boltzmann Machine, " Neurocomput., vol. 122, pp. 13{23, 2013.
-
(2013)
Neurocomput.
, vol.122
, pp. 13-23
-
-
Fiore, U.1
Palmieri, F.2
Castiglione, A.3
De Santis, A.4
-
3
-
-
69249230890
-
Intrusion detection by machine learning: A review
-
C. F. Tsai, Y. F. Hsu, C. Y. Lin, and W. Y. Lin, "Intrusion Detection by Machine Learning: A Review, " Expert Systems with Applications, vol. 36, no. 10, pp. 11994 { 12000, 2009.
-
(2009)
Expert Systems with Applications
, vol.36
, Issue.10
, pp. 11994-12000
-
-
Tsai, C.F.1
Hsu, Y.F.2
Lin, C.Y.3
Lin, W.Y.4
-
4
-
-
34547971961
-
Self-Taught learning: Transfer learning from unlabeled data
-
(New York, NY, USA)
-
R. Raina, A. Battle, H. Lee, B. Packer, and A. Y. Ng, "Self-Taught Learning: Transfer Learning from Unlabeled Data, " in Proceedings of the 24th International Conference on Machine Learning, ICML '07, (New York, NY, USA), pp. 759{766, 2007.
-
(2007)
Proceedings of the 24th International Conference on Machine Learning, ICML '07
, pp. 759-766
-
-
Raina, R.1
Battle, A.2
Lee, H.3
Packer, B.4
Ng, A.Y.5
-
5
-
-
84867781089
-
Hybrid intelligent intrusion detection scheme
-
Springer
-
M. A. Salama, H. F. Eid, R. A. Ramadan, A. Darwish, and A. E. Hassanien, "Hybrid Intelligent Intrusion Detection Scheme, " in Soft computing in industrial applications, pp. 293{303, Springer, 2011.
-
(2011)
Soft Computing in Industrial Applications
, pp. 293-303
-
-
Salama, M.A.1
Eid, H.F.2
Ramadan, R.A.3
Darwish, A.4
Hassanien, A.E.5
-
6
-
-
84915825422
-
An enhanced resilient backpropagation artificial neural network for intrusion detection system
-
R. S. Naoum, N. A. Abid, and Z. N. Al-Sultani, "An Enhanced Resilient Backpropagation Artificial Neural Network for Intrusion Detection System, " International Journal of Computer Science and Network Security, vol. 12, no. 3, pp. 11{16, 2012.
-
(2012)
International Journal of Computer Science and Network Security
, vol.12
, Issue.3
, pp. 11-16
-
-
Naoum, R.S.1
Abid, N.A.2
Al-Sultani, Z.N.3
-
7
-
-
84921698228
-
Feature selection for intrusion detection using NSL-KDD
-
H. S. Chae, B. O. Jo, S. H. Choi, and T. K. Park, "Feature Selection for Intrusion Detection using NSL-KDD, " Recent Advances in Computer Science, pp. 184{187, 2013.
-
(2013)
Recent Advances in Computer Science
, pp. 184-187
-
-
Chae, H.S.1
Jo, B.O.2
Choi, S.H.3
Park, T.K.4
-
8
-
-
84876765564
-
An analysis of supervised tree based classifiers for intrusion detection system
-
IEEE
-
S. Thaseen and C. A. Kumar, "An Analysis of Supervised Tree based Classi-ers for Intrusion Detection System, " in Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013 International Conference on, pp. 294{299, IEEE, 2013.
-
(2013)
Pattern Recognition, Informatics and Mobile Engineering (PRIME), 2013 International Conference on
, pp. 294-299
-
-
Thaseen, S.1
Kumar, C.A.2
-
9
-
-
78349267223
-
Discriminative multinomial naive bayes for network intrusion detection
-
IEEE
-
M. Panda, A. Abraham, and M. R. Patra, "Discriminative Multinomial Naive Bayes for Network Intrusion Detection, " in Information Assurance and Security (IAS), 2010 Sixth International Conference on, pp. 5{10, IEEE, 2010.
-
(2010)
Information Assurance and Security (IAS), 2010 Sixth International Conference on
, pp. 5-10
-
-
Panda, M.1
Abraham, A.2
Patra, M.R.3
-
10
-
-
84859059506
-
A hybrid intelligent approach for network intrusion detection
-
M. Panda, A. Abraham, and M. R. Patra, "A Hybrid Intelligent Approach for Network Intrusion Detection, " Procedia Engineering, vol. 30, pp. 1{9, 2012.
-
(2012)
Procedia Engineering
, vol.30
, pp. 1-9
-
-
Panda, M.1
Abraham, A.2
Patra, M.R.3
-
11
-
-
79851506468
-
Principle components analysis and support vector machine based intrusion detection system
-
IEEE
-
H. F. Eid, A. Darwish, A. E. Hassanien, and A. Abraham, "Principle Components Analysis and Support Vector Machine based Intrusion Detection System, " in Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on, pp. 363{367, IEEE, 2010.
-
(2010)
Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on
, pp. 363-367
-
-
Eid, H.F.1
Darwish, A.2
Hassanien, A.E.3
Abraham, A.4
-
12
-
-
84855369803
-
Bi-layer behavioral-based feature selection approach for network intrusion classification
-
Springer
-
H. F. Eid, M. A. Salama, A. E. Hassanien, and T. H. Kim, "Bi-layer Behavioral-based Feature Selection Approach for Network Intrusion Classification, " in Security Technology, pp. 195{203, Springer, 2011.
-
(2011)
Security Technology
, pp. 195-203
-
-
Eid, H.F.1
Salama, M.A.2
Hassanien, A.E.3
Kim, T.H.4
-
13
-
-
83755173595
-
Fuzzy classification by evolutionary algorithms
-
IEEE
-
P. Kromer, J. Platos, V. Snaael, and A. Abraham, "Fuzzy Classification by Evolutionary Algorithms, " in Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on, pp. 313{318, IEEE, 2011.
-
(2011)
Systems, Man, and Cybernetics (SMC), 2011 IEEE International Conference on
, pp. 313-318
-
-
Kromer, P.1
Platos, J.2
Snaael, V.3
Abraham, A.4
-
14
-
-
84930358040
-
Unsupervised clustering approach for network anomaly detection
-
Springer
-
I. Syarif, A. Prugel-Bennett, and G. Wills, "Unsupervised Clustering Approach for Network Anomaly Detection, " in Networked Digital Technologies, pp. 135{145, Springer, 2012.
-
(2012)
Networked Digital Technologies
, pp. 135-145
-
-
Syarif, I.1
Prugel-Bennett, A.2
Wills, G.3
-
15
-
-
84868286263
-
Packet and flow based network intrusion dataset
-
Springer
-
P. Gogoi, M. H. Bhuyan, D. Bhattacharyya, and J. K. Kalita, "Packet and Flow based Network Intrusion Dataset, " in Contemporary Computing, pp. 322{334, Springer, 2012.
-
(2012)
Contemporary Computing
, pp. 322-334
-
-
Gogoi, P.1
Bhuyan, M.H.2
Bhattacharyya, D.3
Kalita, J.K.4
-
16
-
-
84864563699
-
An optimum-path forest framework for intrusion detection in computer networks
-
C. R. Pereira, R. Y. Nakamura, K. A. Costa, and J. P. Papa, "An Optimum-Path Forest Framework for Intrusion Detection in Computer Networks, " Engineering Applications of Artificial Intelligence, vol. 25, no. 6, pp. 1226{1234, 2012.
-
(2012)
Engineering Applications of Artificial Intelligence
, vol.25
, Issue.6
, pp. 1226-1234
-
-
Pereira, C.R.1
Nakamura, R.Y.2
Costa, K.A.3
Papa, J.P.4
-
19
-
-
84862283411
-
An analysis of single-layer networks in unsupervised feature learning
-
A. Coates, A. Y. Ng, and H. Lee, "An Analysis of Single-layer Networks in Unsupervised Feature Learning, " in International conference on artificial intelligence and statistics, pp. 215{223, 2011.
-
(2011)
International Conference on Artificial Intelligence and Statistics
, pp. 215-223
-
-
Coates, A.1
Ng, A.Y.2
Lee, H.3
-
20
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
July
-
M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, "A Detailed Analysis of the KDD CUP 99 Data Set, " in Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on, pp. 1{6, July 2009.
-
(2009)
Computational Intelligence for Security and Defense Applications, 2009. CISDA 2009. IEEE Symposium on
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.4
-
21
-
-
85034611931
-
-
Soft-Max Regression, "http://udl.stanford.edu/wiki/index.php/softmaxregression..
-
Soft-Max Regression
-
-
-
22
-
-
85034607356
-
-
KDD Cup 99, "http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html..
-
KDD Cup 99
-
-
|