-
1
-
-
85053977192
-
-
http://www.softpanorama.org/security/intrusion detection.shtml.
-
-
-
-
2
-
-
84867858473
-
RT-MOVICAB-IDS: Addressing real-time intrusion detection
-
January
-
A. H. Navarro, M., Corchado, E., and Julin, V. RT-MOVICAB-IDS: Addressing real-time intrusion detection. Future Generation Computer Systems 29, 1 (January 2013), 250–261.
-
(2013)
Future Generation Computer Systems
, vol.29
, Issue.1
, pp. 250-261
-
-
Navarro, A.H.M.1
Corchado, E.2
Julin, V.3
-
3
-
-
85053974435
-
-
MATLAB
-
Adam Pocock. MIToolbox, 2012. MATLAB, http://mloss.org/software/view/325/.
-
(2012)
Mitoolbox
-
-
-
4
-
-
0347718066
-
Fast algorithms for projected clustering
-
New York, USA, ACM
-
Aggarwal, C., Wolf, J. L., Yu, P. S., and Procopiue, C. M. Fast algorithms for projected clustering. In ACM SIG-MOD’99 (New York, USA, 1999), ACM, pp. 61–72.
-
(1999)
ACM SIG-MOD’99
, pp. 61-72
-
-
Aggarwal, C.1
Wolf, J.L.2
Yu, P.S.3
Procopiue, C.M.4
-
5
-
-
0039253822
-
Finding generalized projected clusters in high dimensional spaces
-
ACM
-
Aggarwal, C., and Yu, P. S. Finding generalized projected clusters in high dimensional spaces. In ACM SIGMOD Record (2000), vol. 29, ACM, pp. 70–81.
-
(2000)
ACM SIGMOD Record
, vol.29
, pp. 70-81
-
-
Aggarwal, C.1
Yu, P.S.2
-
6
-
-
0032090765
-
Automatic subspace clustering of high dimensional data for data mining applications
-
Seattle, ACM
-
Agrawal, R., Gehrke, J., Gunopulos, D., and Raghavan, P. Automatic subspace clustering of high dimensional data for data mining applications. In ACM SIGMOD (Seattle, 1998), ACM, pp. 94–105.
-
(1998)
ACM SIGMOD
, pp. 94-105
-
-
Agrawal, R.1
Gehrke, J.2
Gunopulos, D.3
Raghavan, P.4
-
7
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
ACM
-
Agrawal, R., Imieliński, T., and Swami, A. Mining association rules between sets of items in large databases. In ACM SIGMOD Record (1993), vol. 22, ACM, pp. 207–216.
-
(1993)
ACM SIGMOD Record
, vol.22
, pp. 207-216
-
-
Agrawal, R.1
Imieliński, T.2
Swami, A.3
-
8
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
(Washington, DC, USA, May, ACM, pp
-
Agrawal, R., Imielinski, T., and Swami, A. Mining association rules between sets of items in large databases. In Proc. of the ACM SIGMOD Conference (Washington, DC, USA, May 1993), ACM, pp. 207–216.
-
(1993)
Proc. of the ACM SIGMOD Conference
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
9
-
-
0029212693
-
Mining sequential patterns
-
USA, IEEE CS
-
Agrawal, R., and Srikant, R. Mining sequential patterns. In Proc. of the 11th International Conference on Data Engineering (USA, 1995), IEEE CS, pp. 3–14.
-
(1995)
Proc. of the 11Th International Conference on Data Engineering
, pp. 3-14
-
-
Agrawal, R.1
Srikant, R.2
-
10
-
-
47949100550
-
A comprehensive survey of numeric and symbolic outlier mining techniques
-
Agyemang, M., Barker, K., and Alhajj, R. A comprehensive survey of numeric and symbolic outlier mining techniques. Intelligence Data Analysis 10, 6 (2006), 521–538.
-
(2006)
Intelligence Data Analysis
, vol.10
, Issue.6
, pp. 521-538
-
-
Agyemang, M.1
Barker, K.2
Alhajj, R.3
-
11
-
-
85053957509
-
Anomaly detection by naive Bayes & RBF network
-
Ahirwar, D. K., Saxena, S. K., and Sisodia, M. S. Anomaly detection by naive Bayes & RBF network. International Journal of Advanced Research in Computer Science and Electronics Engineering 1, 1 (2012), 14–18.
-
(2012)
International Journal of Advanced Research in Computer Science and Electronics Engineering
, vol.1
, Issue.1
, pp. 14-18
-
-
Ahirwar, D.K.1
Saxena, S.K.2
Sisodia, M.S.3
-
12
-
-
79960352377
-
Network Intrusion Detection and Prevention: Concepts and Techniques
-
Springer, October
-
Ali, A. G., Lu, W., and Tavallaee, M. Network Intrusion Detection and Prevention: Concepts and Techniques. Advances in Information Security. Springer, October 2009.
-
(2009)
Advances in Information Security
-
-
Ali, A.G.1
Lu, W.2
Tavallaee, M.3
-
14
-
-
33748100382
-
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
-
Amini, M., Jalili, R., and Shahriari, H. R. RT-UNNID: a practical solution to real-time network-based intrusion detection using unsupervised neural networks. Computers & Security 25, 6 (2006), 459–468.
-
(2006)
Computers & Security
, vol.25
, Issue.6
, pp. 459-468
-
-
Amini, M.1
Jalili, R.2
Shahriari, H.R.3
-
15
-
-
79956097533
-
Mutual information-based feature selection for intrusion detection systems
-
Amiri, F., Yousefi, M. M. R., Lucas, C., Shakery, A., and Yazdani, N. Mutual information-based feature selection for intrusion detection systems. Journal of Network and Computer Applications 34, 4 (2011), 1184–1199.
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.4
, pp. 1184-1199
-
-
Amiri, F.1
Yousefi, M.M.R.2
Lucas, C.3
Shakery, A.4
Yazdani, N.5
-
16
-
-
2442424268
-
Naive Bayes vs. Decision trees in intrusion detection systems
-
Nicosia, Cyprus, March 14–17, ACM
-
Amor, N. B., Benferhat, S., and Elouedi, Z. Naive Bayes vs. decision trees in intrusion detection systems. In Proc. of the ACM Symposium on Applied Computing (SAC’04) (Nicosia, Cyprus, March 14–17 2004), ACM, pp. 420–424.
-
(2004)
Proc. of the ACM Symposium on Applied Computing (SAC’04)
, pp. 420-424
-
-
Amor, N.B.1
Benferhat, S.2
Elouedi, Z.3
-
17
-
-
0037986866
-
Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (Nides)
-
SRI International, USA
-
Anderson, D., Lunt, T. F., Javitz, H., Tamaru, A., and Valdes, A. Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (nides). Tech. Rep. SRIO-CSL-95-06, Computer Science Laboratory, SRI International, USA, 1995.
-
(1995)
Tech. Rep. SRIO-CSL-95-06, Computer Science Laboratory
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
18
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P Anderson Co, Fort Washington, P. A., April
-
Anderson, J. P. Computer security threat monitoring and surveillance. Tech. rep., James P Anderson Co, Fort Washington, P. A., April 1980.
-
(1980)
Tech. Rep.
-
-
Anderson, J.P.1
-
19
-
-
0347172110
-
Optics: Ordering points to identify the clustering structure
-
ACM
-
Ankerest, M., Breuing, M. M., Kriegel, H. P., and Sander, J. Optics: Ordering points to identify the clustering structure. In ACM SIGMOD (1999), ACM, pp. 49–60.
-
(1999)
ACM SIGMOD
, pp. 49-60
-
-
Ankerest, M.1
Breuing, M.M.2
Kriegel, H.P.3
Sander, J.4
-
20
-
-
0012959922
-
Decomposition of heterogeneous classification problems
-
Apte, C., Hong, S. J., Hosking, J., Lepre, J., Pednault, E., and Rosen, B. Decomposition of heterogeneous classification problems. Intelligent Data Analysis 2, 1 (1998), 81–96.
-
(1998)
Intelligent Data Analysis
, vol.2
, Issue.1
, pp. 81-96
-
-
Apte, C.1
Hong, S.J.2
Hosking, J.3
Lepre, J.4
Pednault, E.5
Rosen, B.6
-
21
-
-
0004112236
-
Lagrange multipliers
-
3rd ed (Orlando, 1985), Academic Press
-
Arfken, G. Lagrange multipliers. In Mathematical Methods for Physicists 3rd ed (Orlando, 1985), Academic Press, pp. 945–950.
-
Mathematical Methods for Physicists
, pp. 945-950
-
-
Arfken, G.1
-
22
-
-
79955482186
-
HMMPayl: An intrusion detection system based on hidden Markov models
-
Ariu, D., Tronci, R., and Giacinto, G. HMMPayl: An intrusion detection system based on hidden Markov models. Computers & Security 30, 4 (2011), 221–241.
-
(2011)
Computers & Security
, vol.30
, Issue.4
, pp. 221-241
-
-
Ariu, D.1
Tronci, R.2
Giacinto, G.3
-
23
-
-
79954587377
-
Implementation of two-class classifiers for hybrid intrusion detection
-
December
-
Arumugam, M., Thangaraj, P., Sivakumar, P., and Pradeepkumar, P. Implementation of two-class classifiers for hybrid intrusion detection. In Proc. of the International Conference on Communication and Computational Intelligence (December 2010), pp. 486–490.
-
(2010)
Proc. of the International Conference on Communication and Computational Intelligence
, pp. 486-490
-
-
Arumugam, M.1
Thangaraj, P.2
Sivakumar, P.3
Pradeepkumar, P.4
-
24
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
New York, NY, USA, ACM
-
Axelsson, S. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proc. of the 6th ACM Conference on Computer and Communications Security (New York, NY, USA, 1999), ACM, pp. 1–7.
-
(1999)
Proc. of the 6Th ACM Conference on Computer and Communications Security
, pp. 1-7
-
-
Axelsson, S.1
-
25
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
August
-
Axelsson, S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security 3, 3 (August 2000), 186–205.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
26
-
-
35248893423
-
Finding natural clusters using multi-cluster combiner based shared nearest neighbours
-
Berlin, Heidelberg, Springer Verlag
-
Ayad, H., and Kamel, M. Finding natural clusters using multi-cluster combiner based shared nearest neighbours. In Proc of Multi-classifier systems (Berlin, Heidelberg, 2003), Springer Verlag, pp. 166–175.
-
(2003)
Proc of Multi-Classifier Systems
, pp. 166-175
-
-
Ayad, H.1
Kamel, M.2
-
27
-
-
57849141227
-
Anomaly intrusion detection system ssing Gaussian mixture model
-
Tehran, November 11–13, IEEE Computer Society
-
Bahrololum, M., and Khaleghi, M. Anomaly intrusion detection system ssing Gaussian mixture model. In Proc. of the 3rd International Conference on Convergence and Hybrid Information Technology (Tehran, November 11–13 2008), vol. 1, IEEE Computer Society, pp. 1162–1167.
-
(2008)
Proc. of the 3Rd International Conference on Convergence and Hybrid Information Technology
, vol.1
, pp. 1162-1167
-
-
Bahrololum, M.1
Khaleghi, M.2
-
28
-
-
84978810597
-
Anomaly intrusion detection design using hybrid of unsupervised and supervised neural networks
-
July
-
Bahrololum, M., Salahi, E., and Khaleghi, M. Anomaly intrusion detection design using hybrid of unsupervised and supervised neural networks. International Journal of Computer Networks & Communications (IJCNC) 1, 2 (July 2009), 26–33.
-
(2009)
International Journal of Computer Networks & Communications (IJCNC)
, vol.1
, Issue.2
, pp. 26-33
-
-
Bahrololum, M.1
Salahi, E.2
Khaleghi, M.3
-
29
-
-
42749099167
-
A comparative study for outlier detection techniques in data mining
-
Bakar, Z., Mohemad, R., Ahmad, A., and Andderis, M. A comparative study for outlier detection techniques in data mining. In Proc. of the IEEE Conference on Cybernetics and Intelligent Systems (2006), pp. 1–6.
-
(2006)
Proc. of the IEEE Conference on Cybernetics and Intelligent Systems
, pp. 1-6
-
-
Bakar, Z.1
Mohemad, R.2
Ahmad, A.3
Andderis, M.4
-
30
-
-
0035879674
-
Intrusion detection through learning behavior model
-
July
-
Balajinath, B., and Raghavan, S. V. Intrusion detection through learning behavior model. Computer Communications 24, 12 (July 2001), 1202–1212.
-
(2001)
Computer Communications
, vol.24
, Issue.12
, pp. 1202-1212
-
-
Balajinath, B.1
Raghavan, S.V.2
-
31
-
-
34247466658
-
Multiobjective genetic clustering for pixel classification in remote sensing imagery
-
Bandyopadhyay, S., Maulik, U., and Mukhopadhyay, A. Multiobjective genetic clustering for pixel classification in remote sensing imagery. IEEE Transactions on Geoscience and Remote Sensing 45, 2 (2007), 1506–1511.
-
(2007)
IEEE Transactions on Geoscience and Remote Sensing
, vol.45
, Issue.2
, pp. 1506-1511
-
-
Bandyopadhyay, S.1
Maulik, U.2
Mukhopadhyay, A.3
-
32
-
-
0035248083
-
Pixel classification using variable string genetic algorithms with chromosomal differentiation
-
Bandyopadhyay, S., and Pal, S. K. Pixel classification using variable string genetic algorithms with chromosomal differentiation. IEEE Transactions on Geoscience and Remote Sensing 39, 2 (2001), 303–308.
-
(2001)
IEEE Transactions on Geoscience and Remote Sensing
, vol.39
, Issue.2
, pp. 303-308
-
-
Bandyopadhyay, S.1
Pal, S.K.2
-
34
-
-
0009011405
-
Detecting novel network intrusions using Bayes estimators
-
Barbara, D., Couto, J., Jajodia, S., and Wu, N. Detecting novel network intrusions using Bayes estimators. In Proc. of the 1st SIAM International Conference on Data Mining (2001).
-
(2001)
Proc. of the 1St SIAM International Conference on Data Mining
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Wu, N.4
-
37
-
-
0032645080
-
An empirical comparison of voting classification algorithms: Bagging, boosting, and variants
-
Bauer, E., and Kohavi, R. An empirical comparison of voting classification algorithms: Bagging, boosting, and variants. Machine learning 36, 1 (1999), 105–139.
-
(1999)
Machine Learning
, vol.36
, Issue.1
, pp. 105-139
-
-
Bauer, E.1
Kohavi, R.2
-
38
-
-
0001185873
-
An essay towards solving a problem in the doctrine of chances
-
Bayes, T. An essay towards solving a problem in the doctrine of chances. Philosophical Transactions of the Royal Society of London 53, 6 (1763), 370–418.
-
(1763)
Philosophical Transactions of the Royal Society of London
, vol.53
, Issue.6
, pp. 370-418
-
-
Bayes, T.1
-
39
-
-
0020752112
-
Outliers
-
Beckman, R. J., and Cook, R. D. Outliers. Technometrics 25, 2 (1983), 119–149.
-
(1983)
Technometrics
, vol.25
, Issue.2
, pp. 119-149
-
-
Beckman, R.J.1
Cook, R.D.2
-
40
-
-
0032728081
-
Clustering gene expression patterns
-
Ben-Dor, A., Shamir, R., and Yakhini, Z. Clustering gene expression patterns. Journal of Computational Biology 6, 3-4 (1999), 281–297.
-
(1999)
Journal of Computational Biology
, vol.6
, Issue.3-4
, pp. 281-297
-
-
Ben-Dor, A.1
Shamir, R.2
Yakhini, Z.3
-
41
-
-
85053973024
-
Pyml-machine learning in python, 2009
-
Ben-Hur, A. Pyml-machine learning in python, 2009. Software available at http://pyml.sourceforge.net.
-
Software
-
-
Ben-Hur, A.1
-
43
-
-
0003775062
-
-
IEEE Press, New York
-
Bezdek, J., and Pal, S. Fuzzy Models for Pattern Recognition, vol. 23. IEEE Press, New York, 1992.
-
(1992)
Fuzzy Models for Pattern Recognition
, vol.23
-
-
Bezdek, J.1
Pal, S.2
-
44
-
-
84856748550
-
A hybrid model for network security systems: Integrating intrusion detection system with survivability
-
Bhaskar, T., Kamath, B. N., and Moitra, S. D. A hybrid model for network security systems: Integrating intrusion detection system with survivability. International Journal of Network Security 7, 2 (2008), 249–260.
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 249-260
-
-
Bhaskar, T.1
Kamath, B.N.2
Moitra, S.D.3
-
45
-
-
80053510589
-
Surveying port scans and their detection methodologies
-
April
-
Bhuyan, M. H., Bhattacharyya, D. K., and Kalita, J. K. Surveying port scans and their detection methodologies. The Computer Journal 54, 4 (April 2011), 1–17.
-
(2011)
The Computer Journal
, vol.54
, Issue.4
, pp. 1-17
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
46
-
-
0003857778
-
A gentle tutorial on the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models
-
Bilmes, J. A gentle tutorial on the EM algorithm and its application to parameter estimation for Gaussian mixture and hidden Markov models. Tech. Rep. ICSI-TR-97-021, University of Berkeley, 1997.
-
(1997)
Tech. Rep. ICSI-TR-97-021, University of Berkeley
-
-
Bilmes, J.1
-
47
-
-
47649084785
-
A parallelization of density based clustering technique on distributed memory multi-computer
-
Ahmedabad
-
Borah, B., and Bhattacharyya, D. K. A parallelization of density based clustering technique on distributed memory multi-computer. In ADCOM’04 (Ahmedabad, 2004), pp. 536–541.
-
(2004)
ADCOM’04
, pp. 536-541
-
-
Borah, B.1
Bhattacharyya, D.K.2
-
48
-
-
52649136576
-
Similarity measures for categorical data: A comparative evaluation
-
Boriah, S., Chandola, V., and Kumar, V. Similarity measures for categorical data: A comparative evaluation. In Proc. of the 8th SIAM International Conference on Data Mining (2008), pp. 243–254.
-
(2008)
Proc. of the 8Th SIAM International Conference on Data Mining
, pp. 243-254
-
-
Boriah, S.1
Chandola, V.2
Kumar, V.3
-
51
-
-
0035478854
-
Random forests
-
Breiman, L. Random forests. Machine Learning 45, 1 (2001), 5–32.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
52
-
-
0003802343
-
-
Chapman and Hall
-
Breiman, L., Freidman, J. H., Olshen, R. A., and Stone, C. J. Classification and Regression Trees. Chapman and Hall, 1984.
-
(1984)
Classification and Regression Trees
-
-
Breiman, L.1
Freidman, J.H.2
Olshen, R.A.3
Stone, C.J.4
-
53
-
-
0039253819
-
LOF: Identifying density-based local outliers
-
June
-
Breunig, M. M., Kriegel, H. P., Ng, R. T., and Sander, J. LOF: Identifying density-based local outliers. ACM SIGMOD 29, 2 (June 2000), 93–104.
-
(2000)
ACM SIGMOD
, vol.29
, Issue.2
, pp. 93-104
-
-
Breunig, M.M.1
Kriegel, H.P.2
Ng, R.T.3
Sander, J.4
-
54
-
-
0031162961
-
Dynamic itemset counting and implication rules for market basket data
-
Brin, S., Motwani, R., Ullman, J. D., and Tsur, S. Dynamic itemset counting and implication rules for market basket data. vol. 26, Proc. of ACM SIGMOD’97, pp. 255–268.
-
Proc. of ACM SIGMOD’97
, vol.26
, pp. 255-268
-
-
Brin, S.1
Motwani, R.2
Ullman, J.D.3
Tsur, S.4
-
56
-
-
84863403768
-
Conditional likelihood maximisation: A unifying framework for information theoretic feature selection
-
Brown, G., Pocock, A., Zhao, M., and Luján, M. Conditional likelihood maximisation: A unifying framework for information theoretic feature selection. The Journal of Machine Learning Research 13 (2012), 27–66.
-
(2012)
The Journal of Machine Learning Research
, vol.13
, pp. 27-66
-
-
Brown, G.1
Pocock, A.2
Zhao, M.3
Luján, M.4
-
57
-
-
24944591774
-
ADWICE — Anomaly detection with real-time incremental clustering
-
Berlin, Germany, May, Springer
-
Burbeck, K., and Nadjm-Tehrani, S. ADWICE — Anomaly detection with real-time incremental clustering. In Proc. of Information Security and Cryptology —ICISC 2004 (Berlin, Germany, May 2005), vol. 3506/2005, Springer, pp. 407–424.
-
(2005)
Proc. of Information Security and Cryptology —ICISC 2004
, vol.3506-2005
, pp. 407-424
-
-
Burbeck, K.1
Nadjm-Tehrani, S.2
-
58
-
-
0242289557
-
A rough set theory based method for anomaly intrusion detection in computer network systems
-
November
-
Cai, Z., Guan, X., Shao, P., Peng, Q., and Sun, G. A rough set theory based method for anomaly intrusion detection in computer network systems. Expert Systems 20, 5 (November 2003), 251–259.
-
(2003)
Expert Systems
, vol.20
, Issue.5
, pp. 251-259
-
-
Cai, Z.1
Guan, X.2
Shao, P.3
Peng, Q.4
Sun, G.5
-
60
-
-
79956035662
-
UNADA: Unsupervised network anomaly detection using sub-space outliers ranking
-
(Networking’11) (Heidelberg, Springer Verlag Berlin
-
Casas, P., Mazel, J., and Owezarski, P. UNADA: Unsupervised network anomaly detection using sub-space outliers ranking. In Proc. of the 10th Int’nl IFIP TC 6 Conference on Networking — Volume Part I (Networking’11) (Heidelberg, 2011), Springer Verlag Berlin, pp. 40–51.
-
(2011)
Proc. of the 10Th Int’nl IFIP TC 6 Conference on Networking
, vol.Part I
, pp. 40-51
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
61
-
-
70349266356
-
Comprehensive survey on distance/similarity measures between probability density functions
-
Cha, S. H. Comprehensive survey on distance/similarity measures between probability density functions. International Journal of Mathematical Models and Methods in Applied Science 1, 4 (November 2007), 300–307.
-
(2007)
International Journal of Mathematical Models and Methods in Applied Science
, vol.1
, Issue.4
, pp. 300-307
-
-
Cha, S.H.1
-
62
-
-
84872384093
-
Arshad, M. H. A machine learning approach to anomaly detection
-
Chan, P. K., Mahoney, M. V., and Arshad, M. H. A machine learning approach to anomaly detection. Tech. Rep. CS-2003-06, Department of Computer Science, Florida Institute of Technology, 2003.
-
(2003)
Tech. Rep. CS-2003-06, Department of Computer Science, Florida Institute of Technology
-
-
Chan, P.K.1
Mahoney, M.V.2
-
63
-
-
68049121093
-
Anomaly detection: A survey
-
September
-
Chandola, V., Banerjee, A., and Kumar, V. Anomaly detection: A survey. ACM Computing Surveys 41, 3 (September 2009), 15:1–15:58.
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.3
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
64
-
-
47049121757
-
Data fusion algorithms for network anomaly detection: Classification and evaluation
-
Greece, IEEE CS
-
Chatzigiannakis, V., Androulidakis, G., Pelechrinis, K., Papavassiliou, S., and Maglaris, V. Data fusion algorithms for network anomaly detection: Classification and evaluation. In Proc. of the 3rd Int’nl Conference on Networking and Services (Greece, 2007), IEEE CS, pp. 50–57.
-
(2007)
Proc. of the 3Rd Int’nl Conference on Networking and Services
, pp. 50-57
-
-
Chatzigiannakis, V.1
Androulidakis, G.2
Pelechrinis, K.3
Papavassiliou, S.4
Maglaris, V.5
-
65
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Chebrolu, S., Abraham, A., and Thomas, J. P. Feature deduction and ensemble design of intrusion detection systems. Computers & Security 24, 4 (2005), 295–307.
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
66
-
-
84943175777
-
AutoClass: A Bayesian classification system
-
Morgan Kaufmann
-
Cheeseman, P., Kelly, J., Self, M., Stutz, J., Taylor, W., and Freeman, D. AutoClass: A Bayesian classification system. In Proc. of the Fifth International Conference on Machine Learning (ML’88) (1988), vol. 27, Morgan Kaufmann, pp. 54–64.
-
(1988)
Proc. of the Fifth International Conference on Machine Learning (ML’88
, vol.27
, pp. 54-64
-
-
Cheeseman, P.1
Kelly, J.2
Self, M.3
Stutz, J.4
Taylor, W.5
Freeman, D.6
-
67
-
-
70449111492
-
Using rough set and support vector machine for network intrusion detection system
-
IEEE Computer Society
-
Chen, R. C., Cheng, K. F., Chen, Y. H., and Hsieh, C. F. Using rough set and support vector machine for network intrusion detection system. In Proc. of the First Asian Conference on Intelligent Information and Database Systems (2009), IEEE Computer Society, pp. 465–470.
-
(2009)
Proc. of the First Asian Conference on Intelligent Information and Database Systems
, pp. 465-470
-
-
Chen, R.C.1
Cheng, K.F.2
Chen, Y.H.3
Hsieh, C.F.4
-
68
-
-
13544269338
-
Application of SVM and ANN for intrusion detection
-
Chen, W. H., Hsu, S. H., and Shen, H. P. Application of SVM and ANN for intrusion detection. vol. 32, Computers & Operations Research, Elsevier, pp. 2617–2634.
-
Computers & Operations Research, Elsevier
, vol.32
, pp. 2617-2634
-
-
Chen, W.H.1
Hsu, S.H.2
Shen, H.P.3
-
69
-
-
36348929372
-
Collaborative Detection of DDoS Attacks over Multiple Network Domains
-
Chen, Y., Hwang, K., and Ku., W.-S. Collaborative Detection of DDoS Attacks over Multiple Network Domains. IEEE Transactions on Parallel Distrib. Syst. 18, 12 (December 2007), 1649–1662.
-
(2007)
IEEE Transactions on Parallel Distrib. Syst
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
70
-
-
33845998197
-
Survey and taxonomy of feature selection algorithms in intrusion detection system
-
Springer
-
Chen, Y., Li, Y., Cheng, X., and Guo, L. Survey and taxonomy of feature selection algorithms in intrusion detection system. In Information Security and Cryptology (2006), Springer, pp. 153–167.
-
(2006)
Information Security and Cryptology
, pp. 153-167
-
-
Chen, Y.1
Li, Y.2
Cheng, X.3
Guo, L.4
-
71
-
-
0002646822
-
Entropy based subspace clustering for mining numerical data
-
New York, USA
-
Cheng, C., Fu, A. W., and Zhang, Y. Entropy based subspace clustering for mining numerical data. In SIGKDD’99 (New York, USA, 1999), vol. 3916, pp. 84–93.
-
(1999)
SIGKDD’99
, vol.3916
, pp. 84-93
-
-
Cheng, C.1
Fu, A.W.2
Zhang, Y.3
-
72
-
-
0036039291
-
A new cell based clustering method for large, high dimensional data in data mining applications
-
New York, USA, ACM
-
Cheng, J. C., and Jin, D. S. A new cell based clustering method for large, high dimensional data in data mining applications. In ACM Symposium on Applied Computing (New York, USA, 2002), ACM, pp. 503–507.
-
(2002)
ACM Symposium on Applied Computing
, pp. 503-507
-
-
Cheng, J.C.1
Jin, D.S.2
-
73
-
-
78650494269
-
Distributed spatial anomaly detection
-
Chhabra, P., Scott, C., Kolaczyk, E. D., and Crovella, M. Distributed spatial anomaly detection. In Proc. of the 27th IEEE International Conference on Computer Communications (2008), pp. 1705–1713.
-
(2008)
Proc. of the 27Th IEEE International Conference on Computer Communications
, pp. 1705-1713
-
-
Chhabra, P.1
Scott, C.2
Kolaczyk, E.D.3
Crovella, M.4
-
74
-
-
46749138185
-
Unsupervised clustering methods for identifying rare events in anomaly detection
-
Stankin, Moscow, October, WASET
-
Chimphlee, W., Abdullah, A. H., Noor, M., Sap, M., Chimphlee, S., and Srinoy, S. Unsupervised clustering methods for identifying rare events in anomaly detection. In Proc. of World Academy of Science, Engineering and Technology (PWASET) (Stankin, Moscow, October 2005), vol. 8, WASET, pp. 253–258.
-
(2005)
Proc. of World Academy of Science, Engineering and Technology (PWASET)
, vol.8
, pp. 253-258
-
-
Chimphlee, W.1
Abdullah, A.H.2
Noor, M.3
Sap, M.4
Chimphlee, S.5
Srinoy, S.6
-
75
-
-
34247263845
-
Anomaly-based intrusion detection using fuzzy rough clustering
-
Washington, DC, USA, IEEE Computer Society
-
Chimphlee, W., Abdullah, A. H., Noor, M. S. M., Srinoy, S., and Chimphlee, S. Anomaly-based intrusion detection using fuzzy rough clustering. In Proc. of the International Conference on Hybrid Information Technology (Washington, DC, USA, 2006), vol. 01, IEEE Computer Society, pp. 329–334.
-
(2006)
Proc. of the International Conference on Hybrid Information Technology
, vol.1
, pp. 329-334
-
-
Chimphlee, W.1
Abdullah, A.H.2
Noor, M.S.M.3
Srinoy, S.4
Chimphlee, S.5
-
77
-
-
27544433210
-
Semantics-aware malware detection
-
Washing-ton, DC, USA, SP ’05, IEEE Computer Society
-
Christodorescu, M., Jha, S., Seshia, S. A., Song, D., and Bryant, R. E. Semantics-aware malware detection. In Proc. of the 2005 IEEE Symposium on Security and Privacy (Washing-ton, DC, USA, 2005), SP ’05, IEEE Computer Society, pp. 32–46.
-
(2005)
Proc. of the 2005 IEEE Symposium on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
81
-
-
79955637024
-
Knowledge based systems that have some idea of their limits
-
Compton, P., Preston, P., Edwards, G., and B, K. Knowledge based systems that have some idea of their limits. In Tenth Knowledge Acquisition for Knowledge Based Systems Workshop (1996).
-
(1996)
Tenth Knowledge Acquisition for Knowledge Based Systems Workshop
-
-
Compton, P.1
Preston, P.2
Edwards, G.3
-
82
-
-
13844275287
-
Microarray data mining with visual programming
-
Feb
-
Curk, T., Demar, J., Xu, Q., Leban, G., Petrovic, U., Bratko, I., Shaulsky, G., and Zupan, B. Microarray data mining with visual programming. Bioinformatics 21 (Feb. 2005), 396–398.
-
(2005)
Bioinformatics
, vol.21
, pp. 396-398
-
-
Curk, T.1
Demar, J.2
Xu, Q.3
Leban, G.4
Petrovic, U.5
Bratko, I.6
Shaulsky, G.7
Zupan, B.8
-
83
-
-
0142253852
-
ADAM: A testbed for exploring the use of data mining in intrusion detection
-
Daniel, B., Julia, C., Sushil, J., and Ningning, W. ADAM: A testbed for exploring the use of data mining in intrusion detection. ACM SIGMOD Record 30, 4 (2001), 15–24.
-
(2001)
ACM SIGMOD Record
, vol.30
, Issue.4
, pp. 15-24
-
-
Daniel, B.1
Julia, C.2
Sushil, J.3
Ningning, W.4
-
86
-
-
65449143380
-
Anomaly pattern detection in categorical datasets
-
USA, ACM
-
Das, K., Schneider, J., and Neill, D. B. Anomaly pattern detection in categorical datasets. In Proc. of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (USA, 2008), ACM, pp. 169–176.
-
(2008)
Proc. of the 14Th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 169-176
-
-
Das, K.1
Schneider, J.2
Neill, D.B.3
-
87
-
-
0010739663
-
Filters, wrappers and a boosting-based hybrid methods for feature selection
-
Citeseer
-
Das, S. Filters, wrappers and a boosting-based hybrid methods for feature selection. In Machine Learning— Int’nl Workshop (2001), Citeseer, pp. 74–81.
-
(2001)
Machine Learning— Int’nl Workshop
, pp. 74-81
-
-
Das, S.1
-
89
-
-
0013326060
-
Feature selection for classification
-
Dash, M., and Liu, H. Feature selection for classification. Intelligent Data Analysis 1, 1-4 (1997), 131–156.
-
(1997)
Intelligent Data Analysis
, vol.1
, Issue.1-4
, pp. 131-156
-
-
Dash, M.1
Liu, H.2
-
90
-
-
0242302657
-
Consistency-based search in feature selection
-
Dash, M., and Liu, H. Consistency-based search in feature selection. Artificial Intelligence 151, 1 (2003), 155–176.
-
(2003)
Artificial Intelligence
, vol.151
, Issue.1
, pp. 155-176
-
-
Dash, M.1
Liu, H.2
-
91
-
-
0017953820
-
A cluster separation measure
-
Davies, D. L., and Bouldin, D. W. A cluster separation measure. IEEE Transactions on Pattern Analysis and Machine 1, 2 (1979), 224–227.
-
(1979)
IEEE Transactions on Pattern Analysis and Machine
, vol.1
, Issue.2
, pp. 224-227
-
-
Davies, D.L.1
Bouldin, D.W.2
-
93
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
Debar, H., Dacier, M., and Wespi, A. Towards a taxonomy of intrusion-detection systems. Computer Networks: Elsevier, pp. 805–822.
-
Computer Networks: Elsevier
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
94
-
-
0002629270
-
Maximum likelihood from incomplete data via the EM algorithm
-
Dempster, A., Laird, N., and Rubin, D. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society 39, 1 (1977), 1–38.
-
(1977)
Journal of the Royal Statistical Society
, vol.39
, Issue.1
, pp. 1-38
-
-
Dempster, A.1
Laird, N.2
Rubin, D.3
-
95
-
-
0000516376
-
Upper and lower probabilities induced by a multivalued mapping
-
Dempster, A. P. Upper and lower probabilities induced by a multivalued mapping. Ann. Math. Stat. 38 (1967), 325–339.
-
(1967)
Ann. Math. Stat.
, vol.38
, pp. 325-339
-
-
Dempster, A.P.1
-
96
-
-
0003893616
-
Requirements and model for IDES, a real-time intrusion detection system
-
Denning, D. E., and Neumann, P. G. Requirements and model for IDES, a real-time intrusion detection system. Tech. Rep. 83F83-01-00, Computer Science Laboratory, SRI International, USA, 1985.
-
(1985)
Tech. Rep. 83F83-01-00, Computer Science Laboratory, SRI International, USA
-
-
Denning, D.E.1
Neumann, P.G.2
-
97
-
-
0343586025
-
A data clustering algorithm on distributed memory multi-processors
-
San Diego, USA,)
-
Dhilon, I. S., and Modha, D. S. A data clustering algorithm on distributed memory multi-processors. In SIGKDD’99 (San Diego, USA, 1999), vol. 3916.
-
(1999)
SIGKDD’99
, vol.3916
-
-
Dhilon, I.S.1
Modha, D.S.2
-
99
-
-
0034250160
-
An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization
-
Dietterich, T. G. An experimental comparison of three methods for constructing ensembles of decision trees: Bagging, boosting, and randomization. Machine Learning 40, 2 (2000), 139–157.
-
(2000)
Machine Learning
, vol.40
, Issue.2
, pp. 139-157
-
-
Dietterich, T.G.1
-
100
-
-
17644384367
-
Minimum redundancy feature selection from microarray gene expression data
-
Ding, C., and Peng, H. Minimum redundancy feature selection from microarray gene expression data. Journal of Bioinformatics and Computational Biology 3, 2 (2005), 185–205.
-
(2005)
Journal of Bioinformatics and Computational Biology
, vol.3
, Issue.2
, pp. 185-205
-
-
Ding, C.1
Peng, H.2
-
101
-
-
2942640996
-
Data mining for network intrusion detection
-
November
-
Dokas, P., Ertoz, L., Lazarevic, A., Srivastava, J., and Tan, P. N. Data mining for network intrusion detection. In Proc. of the NSF Workshop on Next Generation Data Mining (November 2002).
-
(2002)
Proc. of the NSF Workshop on Next Generation Data Mining
-
-
Dokas, P.1
Ertoz, L.2
Lazarevic, A.3
Srivastava, J.4
Tan, P.N.5
-
102
-
-
77953236621
-
A survey on network coordinates systems, design, and security
-
October
-
Donnet, B., Gueye, B., and Kaafar, M. A. A survey on network coordinates systems, design, and security. IEEE Communication Surveys & Tutorials 12, 4 (October 2010), 488–503.
-
(2010)
IEEE Communication Surveys & Tutorials
, vol.12
, Issue.4
, pp. 488-503
-
-
Donnet, B.1
Gueye, B.2
Kaafar, M.A.3
-
103
-
-
0004061426
-
-
Politecnico di Milano, Italy
-
Dorigo, M., Maniezzo, V., and Colorni, A. Positive feedback as a search strategy. Tech. rep., Departmento di Elettronica, Politecnico di Milano, Italy, 1992.
-
(1992)
Positive Feedback as a Search Strategy. Tech. Rep., Departmento Di Elettronica
-
-
Dorigo, M.1
Maniezzo, V.2
Colorni, A.3
-
104
-
-
0030082551
-
Ant system: Optimization by a colony of cooperating agents
-
Dorigo, M., Maniezzo, V., and Colorni, A. Ant system: Optimization by a colony of cooperating agents. IEEE Transactions on Systems, Man and Cybernetics, Part B 26, 1 (1996), 29–41.
-
(1996)
IEEE Transactions on Systems, Man and Cybernetics, Part B
, vol.26
, Issue.1
, pp. 29-41
-
-
Dorigo, M.1
Maniezzo, V.2
Colorni, A.3
-
106
-
-
70349687064
-
Rule-based anomaly detection on IP flows
-
Rio de Janeiro, Brazil, IEEE press
-
Duffield, N. G., Haffner, P., Krishnamurthy, B., and Ringberg, H. Rule-based anomaly detection on IP flows. In Proc. of the 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies (Rio de Janeiro, Brazil, 2009), IEEE press, pp. 424–432.
-
(2009)
Proc. of the 28Th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies
, pp. 424-432
-
-
Duffield, N.G.1
Haffner, P.2
Krishnamurthy, B.3
Ringberg, H.4
-
107
-
-
84941155240
-
Well separated clusters and optimal fuzzy partitions
-
Dunn, J. Well separated clusters and optimal fuzzy partitions. Journal of Cybernetics 4 (1974), 95–104.
-
(1974)
Journal of Cybernetics
, vol.4
, pp. 95-104
-
-
Dunn, J.1
-
108
-
-
84881108454
-
-
Free Software Foundation
-
Eaton, J., et al. Gnu Octave. Free Software Foundation, 1997.
-
(1997)
Gnu Octave
-
-
Eaton, J.1
-
109
-
-
70349687675
-
On discordant observations
-
Edgeworth, F. Y. On discordant observations. Philosophy Magazine 23, 5 (1887), 364–375.
-
(1887)
Philosophy Magazine
, vol.23
, Issue.5
, pp. 364-375
-
-
Edgeworth, F.Y.1
-
110
-
-
33745441630
-
-
Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Kumar, V., and Srivastava, J. MINDS — Minnesota Intrusion Detection System, 2004.
-
(2004)
MINDS — Minnesota Intrusion Detection System
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.4
Kumar, V.5
Srivastava, J.6
-
111
-
-
84874730558
-
Finding clusters of different sizes, shapes and densities in noisy high dimensional data
-
Ertoz, L., Stainbach, M., and Kumar, V. Finding clusters of different sizes, shapes and densities in noisy high dimensional data. In SIAM’03 (2003).
-
(2003)
SIAM’03
-
-
Ertoz, L.1
Stainbach, M.2
Kumar, V.3
-
112
-
-
0009900351
-
Anomaly detection over noisy data using learned probability distributions
-
Morgan Kaufmann Publishers Inc
-
Eskin, E. Anomaly detection over noisy data using learned probability distributions. In Proc. of the 7th Int’nl Conference on Machine Learning (2000), Morgan Kaufmann Publishers Inc., pp. 255–262.
-
(2000)
Proc. of the 7Th Int’nl Conference on Machine Learning
, pp. 255-262
-
-
Eskin, E.1
-
113
-
-
84964540406
-
Modeling system call for intrusion detection using dynamic window sizes
-
Anaheim, CA, 12 – 14 June, IEEE Computer Society
-
Eskin, E., Stolfo, S. J., and Lee, W. Modeling system call for intrusion detection using dynamic window sizes. In Proc. of DARPA Information Survivability Conference and Exposition (DISCEX II’01) (Anaheim, CA, 12 – 14 June 2001), vol. 1, IEEE Computer Society.
-
(2001)
Proc. of DARPA Information Survivability Conference and Exposition (DISCEX II’01)
, vol.1
-
-
Eskin, E.1
Stolfo, S.J.2
Lee, W.3
-
114
-
-
85170282443
-
A density-based algorithm for discovering clusters in large spatial databases with noise
-
Portland, Aug., AAAI Press
-
Ester, M., and Kriegel, H. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proc. 2nd Int’nl Conf. on Knowledge Discovery and Data Mining, Portland (Portland, Aug. 1996), AAAI Press, pp. 226–231.
-
(1996)
Proc. 2Nd Int’nl Conf. on Knowledge Discovery and Data Mining, Portland
, pp. 226-231
-
-
Ester, M.1
Kriegel, H.2
-
115
-
-
0001899154
-
An incremental clustering for mining in a data warehousing environment
-
New York, USA
-
Ester, M., Kriegel, H. P., Sander, J., Wimmer, M., and Xu, X. An incremental clustering for mining in a data warehousing environment. In Proc. of VLDB98 (New York, USA, 1998).
-
(1998)
Proc. of VLDB98
-
-
Ester, M.1
Kriegel, H.P.2
Sander, J.3
Wimmer, M.4
Xu, X.5
-
116
-
-
84942247408
-
Tochastic protocol modeling for anomaly based network intrusion detection
-
IEEE CS
-
Estevez-Tapiador, J. M., Garca-Teodoro, P., and Daz-Verdejo, J. E. Stochastic protocol modeling for anomaly based network intrusion detection. In Proc. of the 1st International Workshop on Information Assurance (2003), IEEE CS, pp. 3– 12.
-
(2003)
Proc. of the 1St International Workshop on Information Assurance
, pp. 3-12
-
-
Estevez-Tapiador, J.M.1
Garca-Teodoro, P.2
Daz-Verdejo, J.E.3
-
117
-
-
4344659702
-
Anomaly detection methods in wired networks: A survey and taxonomy
-
Estevez-Tapiador, J. M., Garcia-Teodoro, P., and Diaz-Verdejo, J. E. Anomaly detection methods in wired networks: A survey and taxonomy. Computers & Security 27 (2004), 1569–1584.
-
(2004)
Computers & Security
, vol.27
, pp. 1569-1584
-
-
Estevez-Tapiador, J.M.1
Garcia-Teodoro, P.2
Diaz-Verdejo, J.E.3
-
118
-
-
34250188502
-
Alert fusion for a computer host based intrusion detection system
-
USA, IEEE CS
-
Feng, C., Peng, J., Qiao, H., and Rozenblit, J. W. Alert fusion for a computer host based intrusion detection system. In Proc. of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (USA, 2007), IEEE CS, pp. 433–440.
-
(2007)
Proc. of the 14Th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems
, pp. 433-440
-
-
Feng, C.1
Peng, J.2
Qiao, H.3
Rozenblit, J.W.4
-
119
-
-
33645690579
-
Fast binary feature selection with conditional mutual information
-
Fleuret, F. Fast binary feature selection with conditional mutual information. The Journal of Machine Learning Research 5 (2004), 1531–1555.
-
(2004)
The Journal of Machine Learning Research
, vol.5
, pp. 1531-1555
-
-
Fleuret, F.1
-
120
-
-
77954816351
-
An ensemble-based evolutionary framework for coping with distributed intrusion detection
-
June
-
Folino, G., Pizzuti, C., and Spezzano, G. An ensemble-based evolutionary framework for coping with distributed intrusion detection. Genetic Programming and Evolvable Machines 11, 2 (June 2010), 131–146.
-
(2010)
Genetic Programming and Evolvable Machines
, vol.11
, Issue.2
, pp. 131-146
-
-
Folino, G.1
Pizzuti, C.2
Spezzano, G.3
-
121
-
-
33845229615
-
Data clustering using evidence accumulation
-
Washington, DC, USA, IEEE Press
-
Fred, A. L. N., and Jain, A. Data clustering using evidence accumulation. In Proc of ICPR’02 (Washington, DC, USA, 2002), IEEE Press, pp. 276–280.
-
(2002)
Proc of ICPR’02
, pp. 276-280
-
-
Fred, A.L.N.1
Jain, A.2
-
123
-
-
0035470889
-
Greedy function approximation: A gradient boosting machine (English summary)
-
Friedman, J. Greedy function approximation: a gradient boosting machine (English summary). The Annals of Statistics 29, 5 (2001), 1189–1232.
-
(2001)
The Annals of Statistics
, vol.29
, Issue.5
, pp. 1189-1232
-
-
Friedman, J.1
-
125
-
-
32344449062
-
An approach to spacecraft anomaly detection problem using kernel feature space
-
USA, ACM
-
Fujimaki, R., Yairi, T., and Machida, K. An approach to spacecraft anomaly detection problem using kernel feature space. In Proc. of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (USA, 2005), ACM, pp. 401–410.
-
(2005)
Proc. of the 11Th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining
, pp. 401-410
-
-
Fujimaki, R.1
Yairi, T.2
Machida, K.3
-
126
-
-
33847704184
-
K-Means+ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods
-
Mar
-
Gaddam, S. R., Phoha, V. V., and Balagani, K. S. K-Means+ID3: A novel method for supervised anomaly detection by cascading k-means clustering and ID3 decision tree learning methods. IEEE Transactions on Knowledge and Data Engineering 19, 3 (Mar 2007), 345–354.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.3
, pp. 345-354
-
-
Gaddam, S.R.1
Phoha, V.V.2
Balagani, K.S.3
-
127
-
-
41949141213
-
-
Gan, G., Ma, C., and Wu, J. Data Clustering – Theory, Algorithms and Applications. SIAM, 2007.
-
(2007)
Data Clustering – Theory, Algorithms and Applications. SIAM
-
-
Gan, G.1
Ma, C.2
Wu, J.3
-
128
-
-
0032665257
-
Clustering large datasets in arbitrary metric spaces
-
Ganti, V., Ramakrishnan, R., and Gehrke, J. Clustering large datasets in arbitrary metric spaces. In Fifteenth Int’nl Conference on Data Engineering (1998), pp. 502–511.
-
(1998)
Fifteenth Int’nl Conference on Data Engineering
, pp. 502-511
-
-
Ganti, V.1
Ramakrishnan, R.2
Gehrke, J.3
-
129
-
-
28444441282
-
Ant colony optimization based network intrusion feature selection and detection
-
August
-
Gao, H. H., Yang, H. H., and Wang, X. Y. Ant colony optimization based network intrusion feature selection and detection. In Proc. of the International Conference on Machine Learning and Cybernetics (August 2005), vol. 6, pp. 3871–3875.
-
(2005)
Proc. of the International Conference on Machine Learning and Cybernetics
, vol.6
, pp. 3871-3875
-
-
Gao, H.H.1
Yang, H.H.2
Wang, X.Y.3
-
130
-
-
0001762549
-
Kernels for non-parametric curve estimation
-
Gasser, T., Muller, H., and Mammitzsch, V. Kernels for non-parametric curve estimation. Journal of the Royal Statistical Society Series B (Methodological) (1985), 238–252.
-
(1985)
Journal of the Royal Statistical Society Series B (Methodological)
, pp. 238-252
-
-
Gasser, T.1
Muller, H.2
Mammitzsch, V.3
-
131
-
-
36749023984
-
Dealing with software viruses: A biological paradigm
-
Gelenbe, E. Dealing with software viruses: A biological paradigm. Information Security Technical Report 12(4) (2007), 242–250.
-
(2007)
Information Security Technical Report
, vol.12
, Issue.4
, pp. 242-250
-
-
Gelenbe, E.1
-
132
-
-
77949285151
-
A novel intrusion detection scheme for network-attached storage based on multisource information fusion
-
Washington, DC, USA, IEEE Computer Society
-
Geng, L., and Jia, H. A novel intrusion detection scheme for network-attached storage based on multisource information fusion. In Proc. of the International Conference on Computational Intelligence and Security (Washington, DC, USA, 2009), IEEE Computer Society, pp. 469–473.
-
(2009)
Proc. of the International Conference on Computational Intelligence and Security
, pp. 469-473
-
-
Geng, L.1
Jia, H.2
-
134
-
-
19544370003
-
Loaded: Link-based outlier and anomaly detection in evolving data sets
-
Brighton, UK, IEEE Computer Society
-
Ghoting, A., Otey, M. E., and Parthasarathy, S. Loaded: Link-based outlier and anomaly detection in evolving data sets. In Proc. of the 4th IEEE Int’nl Conference on Data Mining (Brighton, UK, Nov. 2004), IEEE Computer Society, pp. 387– 390.
-
(2004)
Proc. of the 4Th IEEE Int’nl Conference on Data Mining
, pp. 387-390
-
-
Ghoting, A.1
Otey, M.E.2
Parthasarathy, S.3
-
135
-
-
35348821822
-
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
-
January
-
Giacinto, G., Perdisci, R., Rio, M. D., and Roli, F. Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Information Fusion 9, 1 (January 2008), 69–82.
-
(2008)
Information Fusion
, vol.9
, Issue.1
, pp. 69-82
-
-
Giacinto, G.1
Perdisci, R.2
Rio, M.D.3
Roli, F.4
-
136
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
August
-
Giacinto, G., Roli, F., and Didaci, L. Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24, 12 (August 2003), 1795–1803.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.12
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
137
-
-
0000190711
-
Pioneer maps of health and disease in England
-
Gilbert, E. Pioneer maps of health and disease in England. Geographical Journal 124 (1958), 172–183.
-
(1958)
Geographical Journal
, vol.124
, pp. 172-183
-
-
Gilbert, E.1
-
139
-
-
79953811849
-
A survey of outlier detection methods in network anomaly identification
-
Gogoi, P., Bhattacharyya, D. K., Borah, B., and Kalita, J. K. A survey of outlier detection methods in network anomaly identification. The Computer Journal 54, 4 (2011), 570–588.
-
(2011)
The Computer Journal
, vol.54
, Issue.4
, pp. 570-588
-
-
Gogoi, P.1
Bhattacharyya, D.K.2
Borah, B.3
Kalita, J.K.4
-
140
-
-
84868286263
-
Packet and flow based network intrusion dataset
-
vol. 306 of CCIS, Springer
-
Gogoi, P., Bhuyan, M. H., Bhattacharyya, D. K., and Kalita, J. K. Packet and flow based network intrusion dataset. In Proc. of the 5th Int’nl Conference on Contemporary Computing (IC3-2012) (August 6–8 2012), vol. 306 of CCIS, Springer, pp. 322–334.
-
(2012)
Proc. of the 5Th Int’nl Conference on Contemporary Computing (IC3-2012)
, pp. 322-334
-
-
Gogoi, P.1
Bhuyan, M.H.2
Bhattacharyya, D.K.3
Kalita, J.K.4
-
141
-
-
78651547976
-
Anomaly detection analysis of intrusion data using supervised and unsupervised approach
-
Feb
-
Gogoi, P., Borah, B., and Bhattacharyya, D. K. Anomaly detection analysis of intrusion data using supervised and unsupervised approach. Journal of Convergence Information Technology 5, 1 (Feb. 2010), 95–110.
-
(2010)
Journal of Convergence Information Technology
, vol.5
, Issue.1
, pp. 95-110
-
-
Gogoi, P.1
Borah, B.2
Bhattacharyya, D.K.3
-
142
-
-
84868283151
-
Network anomaly detection using unsupervised model
-
(Dec.)
-
Gogoi, P., Borah, B., and Bhattacharyya, D. K. Network anomaly detection using unsupervised model. Int’nl Journal of Computer Applications (Special Issue on Network Security and Cryptography) NSC, 1 (Dec. 2011), 19–30.
-
(2011)
Int’nl Journal of Computer Applications (Special Issue on Network Security and Cryptography) NSC
, vol.1
, pp. 19-30
-
-
Gogoi, P.1
Borah, B.2
Bhattacharyya, D.K.3
-
143
-
-
0242387333
-
-
Northwestern University
-
Goil, S., Nagesh, H., and Choudhary, A. Mafia: Efficient and scalable subspace clustering for very large data sets. Tech. rep., Northwestern University, 1999.
-
(1999)
Mafia: Efficient and Scalable Subspace Clustering for Very Large Data Sets. Tech. Rep
-
-
Goil, S.1
Nagesh, H.2
Choudhary, A.3
-
146
-
-
77952556572
-
Design of a Snort based Hybrid Intrusion Detection System
-
Springer
-
Gómez, J., Gil, C., Padilla, N., Baños, R., and Jiménez, C. Design of a Snort based Hybrid Intrusion Detection System. In Proc of 10th Int’nl Work-Conference on Artificial Neural Networks: Part II: (2009), Springer, pp. 515–522.
-
(2009)
Proc of 10Th Int’nl Work-Conference on Artificial Neural Networks: Part II
, pp. 515-522
-
-
Gómez, J.1
Gil, C.2
Padilla, N.3
Baños, R.4
Jiménez, C.5
-
147
-
-
77956445601
-
A neural network based intrusion detection data fusion model
-
Proc. of the, USA, IEEE CS
-
Gong, W., Fu, W., and Cai, L. A neural network based intrusion detection data fusion model. In Proc. of the 3rd Int’nl Joint Conference on Computational Science and Optimization-Volume 2 (USA, 2010), IEEE CS, pp. 410–414.
-
(2010)
3Rd Int’nl Joint Conference on Computational Science and Optimization
, vol.2
, pp. 410-414
-
-
Gong, W.1
Fu, W.2
Cai, L.3
-
148
-
-
0032091595
-
Cure: An efficient clustering algorithm for large databases
-
ACM
-
Guha, S., Rastogi, R., and Shim, K. Cure: An efficient clustering algorithm for large databases. In SIGMOD 1998 (1998), vol. 27, ACM, pp. 73–84.
-
(1998)
SIGMOD 1998
, vol.27
, pp. 73-84
-
-
Guha, S.1
Rastogi, R.2
Shim, K.3
-
149
-
-
0032652570
-
Rock: A robust clustering algorithm for categorical attributes
-
Guha, S., Rastogi, R., and Shim, K. Rock: A robust clustering algorithm for categorical attributes. In Int’nl Conference on Data Engineering (1999), pp. 512–521.
-
(1999)
Int’nl Conference on Data Engineering
, pp. 512-521
-
-
Guha, S.1
Rastogi, R.2
Shim, K.3
-
151
-
-
0036161259
-
Gene selection for cancer classification using support vector machines
-
Guyon, I., Weston, J., Barnhill, S., and Vapnik, V. Gene selection for cancer classification using support vector machines. Machine Learning 46, 1 (2002), 389–422.
-
(2002)
Machine Learning
, vol.46
, Issue.1
, pp. 389-422
-
-
Guyon, I.1
Weston, J.2
Barnhill, S.3
Vapnik, V.4
-
152
-
-
19544382513
-
Detection of significant sets of episodes in event sequences
-
Washington, DC, USA, IEEE Computer Society
-
Gwadera, R., Atallah, M. J., and Szpankowski, W. Detection of significant sets of episodes in event sequences. In Proc. of the 4th IEEE International Conference on Data Mining (Washington, DC, USA, 2004), IEEE Computer Society, pp. 3– 10.
-
(2004)
Proc. of the 4Th IEEE International Conference on Data Mining
, pp. 3-10
-
-
Gwadera, R.1
Atallah, M.J.2
Szpankowski, W.3
-
153
-
-
23844441860
-
Reliable detection of episodes in event sequences
-
Gwadera, R., Atallah, M. J., and Szpankowski, W. Reliable detection of episodes in event sequences. Knowledge and Information Systems 7, 4 (2005), 415–437.
-
(2005)
Knowledge and Information Systems
, vol.7
, Issue.4
, pp. 415-437
-
-
Gwadera, R.1
Atallah, M.J.2
Szpankowski, W.3
-
154
-
-
84882994448
-
-
Haag, P. Nfdump & nfsen. http://nfdump.sourceforge.net/, September, 2010.
-
(2010)
Nfdump & Nfsen
-
-
Haag, P.1
-
157
-
-
2442449952
-
Mining frequent patterns without candidate generation: A frequent-pattern tree approach
-
Han, J., Pei, J., Yin, Y., and Mao, R. Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Mining and Knowledge Discovery, vol 8, pp. 53– 87.
-
Data Mining and Knowledge Discovery
, vol.8
, pp. 53-87
-
-
Han, J.1
Pei, J.2
Yin, Y.3
Mao, R.4
-
158
-
-
33947227459
-
An evolutionary approach to multi-objective clustering
-
Handl, J., and Knowles, J. An evolutionary approach to multi-objective clustering. IEEE Transactions on Evolutionary Computing 11, 1 (2007), 56–76.
-
(2007)
IEEE Transactions on Evolutionary Computing
, vol.11
, Issue.1
, pp. 56-76
-
-
Handl, J.1
Knowles, J.2
-
159
-
-
25144456056
-
Computational cluster validation in post-genomic data analysis
-
Handl, J., Knowles, J., and Kell, D. B. Computational cluster validation in post-genomic data analysis. Bioinformatics 21 (2005), 3201–3212.
-
(2005)
Bioinformatics
, vol.21
, pp. 3201-3212
-
-
Handl, J.1
Knowles, J.2
Kell, D.B.3
-
161
-
-
15744370034
-
A taxonomy of network and computer attacks
-
Hansman, S., and Hunt, R. A taxonomy of network and computer attacks. Computers & Security 24, 1 (September 2005), 31–43.
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
162
-
-
0001138328
-
Algorithm AS 136: A k-means clustering algorithm
-
Hartigan, J. A., and Wong, M. A. Algorithm AS 136: A k-means clustering algorithm. Applied Statistics 28, 1 (1979), 100–108.
-
(1979)
Applied Statistics
, vol.28
, Issue.1
, pp. 100-108
-
-
Hartigan, J.A.1
Wong, M.A.2
-
164
-
-
84864859588
-
Outlier detection using replicator neural networks
-
London, UK, Sep, Springer Verlag
-
Hawkins, S., He, H., Williams, G., and Baxter, R. Outlier detection using replicator neural networks. In Proc. of the 4th Int’nl Conference on Data Warehousing and Knowledge Discovery (London, UK, Sep. 2002), Springer Verlag, pp. 170–180.
-
(2002)
Proc. of the 4Th Int’nl Conference on Data Warehousing and Knowledge Discovery
, pp. 170-180
-
-
Hawkins, S.1
He, H.2
Williams, G.3
Baxter, R.4
-
167
-
-
85140527321
-
An efficient approach to clustering in large multimedia databases with noise
-
AAAI Press
-
Hinneburg, A., Er, H., and Keim, D. A. An efficient approach to clustering in large multimedia databases with noise. In Proc. of Knowledge Discovery and Data Mining (1998), AAAI Press, pp. 58–65.
-
(1998)
Proc. of Knowledge Discovery and Data Mining
, pp. 58-65
-
-
Hinneburg, A.1
Er, H.2
Keim, D.A.3
-
168
-
-
0002784345
-
Algorithms for association rule mining — A general survey and comparison
-
Boston, MA, USA, ACM
-
Hipp, J., Guntzer, U., and Nakhaeizadeh, G. Algorithms for association rule mining — A general survey and comparison. In Proc. of the ACM SIGKDD Int’nl Conference on Knowledge Discovery and Data Mining (Boston, MA, USA, 2000), ACM, pp. 58–64.
-
(2000)
Proc. of the ACM SIGKDD Int’nl Conference on Knowledge Discovery and Data Mining
, pp. 58-64
-
-
Hipp, J.1
Guntzer, U.2
Nakhaeizadeh, G.3
-
169
-
-
7544223741
-
A survey of outlier detection methodologies
-
Hodge, V., and Austin, J. A survey of outlier detection methodologies. Artificial Intellligence Review 22, 2 (2004), 85– 126.
-
(2004)
Artificial Intellligence Review
, vol.22
, Issue.2
, pp. 85-126
-
-
Hodge, V.1
Austin, J.2
-
170
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S. A., Forrest, S., and Somayaji, A. Intrusion detection using sequences of system calls. Journal of Computer Security 6, 3 (1998), 151–180.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
172
-
-
0028737912
-
Weka: A machine learning workbench
-
IEEE
-
Holmes, G., Donkin, A., and Witten, I. Weka: A machine learning workbench. In Intelligent Information Systems, 1994 (1994), IEEE, pp. 357–361.
-
(1994)
Intelligent Information Systems
, vol.1994
, pp. 357-361
-
-
Holmes, G.1
Donkin, A.2
Witten, I.3
-
173
-
-
0031224390
-
Use of contextual information for feature ranking and discretization
-
Hong, S. Use of contextual information for feature ranking and discretization. IEEE Transactions on Knowledge and Data Engineering 9, 5 (1997), 718–730.
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.5
, pp. 718-730
-
-
Hong, S.1
-
174
-
-
0029224819
-
Set oriented mining for association rules in relational databases
-
Houtsma, M., and Swami, A. Set oriented mining for association rules in relational databases. IEEE Conference on Data Engineering, pp. 25–34.
-
IEEE Conference on Data Engineering
, pp. 25-34
-
-
Houtsma, M.1
Swami, A.2
-
175
-
-
85053982946
-
A survey of evolutionary algorithms for clustering
-
Hruschka, E. R., Campello, R. J., Freitas, A. A., and Carvalho, A. C. A survey of evolutionary algorithms for clustering. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews 29 (1999), 433–439.
-
(1999)
IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews
, vol.29
, pp. 433-439
-
-
Hruschka, E.R.1
Campello, R.J.2
Freitas, A.A.3
Carvalho, A.C.4
-
176
-
-
63049111403
-
A survey of evolutionary algorithms for clustering
-
Hruschka, E. R., Campello, R. J., Freitas, A. A., and Carvalho, A. C. A survey of evolutionary algorithms for clustering. IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews 39, 2 (2009).
-
(2009)
IEEE Transactions on Systems, Man and Cybernetics, Part C: Applications and Reviews
, vol.39
, Issue.2
-
-
Hruschka, E.R.1
Campello, R.J.2
Freitas, A.A.3
Carvalho, A.C.4
-
177
-
-
4944228528
-
-
University of Freiburg, July
-
Hsu, C. W., Chang, C. C., and Lin, C. J. A practical guide to support vector classification. Tech. rep., University of Freiburg, July 2003.
-
(2003)
A Practical Guide to Support Vector Classification. Tech. Rep.
-
-
Hsu, C.W.1
Chang, C.C.2
Lin, C.J.3
-
178
-
-
46749140199
-
Neighborhood rough set based heterogeneous feature subset selection
-
Hu, Q., Yu, D., Liu, J., and Wu, C. Neighborhood rough set based heterogeneous feature subset selection. Information Sciences 178, 18 (2008), 3577–3594.
-
(2008)
Information Sciences
, vol.178
, Issue.18
, pp. 3577-3594
-
-
Hu, Q.1
Yu, D.2
Liu, J.3
Wu, C.4
-
181
-
-
35449003730
-
A user-oriented ontology-based approach for network intrusion detection
-
January
-
Hung, S. S., and Liu, D. S. M. A user-oriented ontology-based approach for network intrusion detection. Computer Standards & Interfaces 30, 1–2 (January 2008), 78–88.
-
(2008)
Computer Standards & Interfaces
, vol.30
, Issue.1-2
, pp. 78-88
-
-
Hung, S.S.1
Liu, D.S.M.2
-
182
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Ilgun, K., Kemmerer, R., and Porras, P. State transition analysis: A rule-based intrusion detection approach. IEEE Transactions on Software Engineering 21, 3 (1995), 181–199.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.3
-
185
-
-
84893405732
-
Data clustering: A review
-
Jain, A. K., Murty, M. N., and Flynn, P. J. Data clustering: A review. ACM Computing Survey 31, 3 (1999), 264–323.
-
(1999)
ACM Computing Survey
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
186
-
-
34547483900
-
Towards effective and efficient distributed clustering
-
Melbourne, FL
-
Januzaj, E., Kriegel, H. P., and Pfeifle, M. Towards effective and efficient distributed clustering. In ICDM’03 (Melbourne, FL, 2003), pp. 49–58.
-
(2003)
ICDM’03
, pp. 49-58
-
-
Januzaj, E.1
Kriegel, H.P.2
Pfeifle, M.3
-
187
-
-
34748870795
-
-
IEEE
-
Jemili, F., Zaghdoud, M., and Ahmed, M. B. A framework for an adaptive intrusion detection system using Bayesian network. IEEE, pp. 66–70.
-
A Framework for an Adaptive Intrusion Detection System Using Bayesian Network
, pp. 66-70
-
-
Jemili, F.1
Zaghdoud, M.2
Ahmed, M.B.3
-
189
-
-
33745243253
-
Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies
-
Jiang, J., and Papavassiliou, S. Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies. Computer Communications 29, 10 (June 2006), 1627–1638.
-
(2006)
Computer Communications
, vol.29
, Issue.10
, pp. 1627-1638
-
-
Jiang, J.1
Papavassiliou, S.2
-
190
-
-
50549085033
-
A rough set approach to outlier detection
-
Jiangab, F., Suia, Y., and Caoa, C. A rough set approach to outlier detection. International Journal of General Systems 37, 5 (Oct. 2008), 519–536.
-
(2008)
International Journal of General Systems
, vol.37
, Issue.5
, pp. 519-536
-
-
Jiangab, F.1
Suia, Y.2
Caoa, C.3
-
191
-
-
0034825778
-
Mining Needle in a Haystack: Classifying Rare Classes via Two-phase Rule Induction
-
ACM
-
Joshi, M. V., Agarwal, R. C., and Kumar, V. Mining Needle in a Haystack: Classifying Rare Classes via Two-phase Rule Induction. In Proc. of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2001), ACM, pp. 293–298.
-
(2001)
Proc. of the 7Th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 293-298
-
-
Joshi, M.V.1
Agarwal, R.C.2
Kumar, V.3
-
192
-
-
0032686723
-
Chameleon: A hierarchical clustering algorithm using dynamic modeling
-
Karypsis, G. and Han H. and Kumar V. Chameleon: A hierarchical clustering algorithm using dynamic modeling. IEEE Computer 32, 8 (1999), 68–75.
-
(1999)
IEEE Computer
, vol.32
, Issue.8
, pp. 68-75
-
-
Karypsis, G.1
Han, H.2
Kumar, V.3
-
193
-
-
19544388080
-
Distributed hybrid agent based intrusion detection and real time response system
-
USA, IEEE CS
-
Kasarekar, V., and Ramamurthy, B. Distributed hybrid agent based intrusion detection and real time response system. In Proc. of the 1st International Conference on Broadband Networks (USA, 2004), IEEE CS, pp. 739–741.
-
(2004)
Proc. of the 1St International Conference on Broadband Networks
, pp. 739-741
-
-
Kasarekar, V.1
Ramamurthy, B.2
-
194
-
-
85053942632
-
Clustering by Means of Medoids. Reports of the Faculty of Mathematics and Informatics. Delft University of
-
Kaufman, L., and Rousseeuw, P. Clustering by Means of Medoids. Reports of the Faculty of Mathematics and Informatics. Delft University of Technology, 1987.
-
(1987)
Technology
-
-
Kaufman, L.1
Rousseeuw, P.2
-
196
-
-
36049030250
-
A new intrusion detection system using support vector machines and hierarchical clustering
-
October
-
Khan, L., Awad, M., and Thuraisingham, B. A new intrusion detection system using support vector machines and hierarchical clustering. The VLDB Journal 16, 4 (October 2007), 507–521.
-
(2007)
The VLDB Journal
, vol.16
, Issue.4
, pp. 507-521
-
-
Khan, L.1
Awad, M.2
Thuraisingham, B.3
-
197
-
-
84871879955
-
Rule based network intrusion detection using genetic algorithm
-
March
-
Khan, M. S. A. Rule based network intrusion detection using genetic algorithm. International Journal of Computer Applications 18, 8 (March 2011), 26–29.
-
(2011)
International Journal of Computer Applications
, vol.18
, Issue.8
, pp. 26-29
-
-
Khan, M.S.A.1
-
198
-
-
49749119545
-
Control theoretic approach to intrusion detection using a distributed hidden Markov model
-
August
-
Khanna, R., and Liu, H. Control theoretic approach to intrusion detection using a distributed hidden Markov model. IEEE Wireless Communications 15, 4 (August 2008), 24–33.
-
(2008)
IEEE Wireless Communications
, vol.15
, Issue.4
, pp. 24-33
-
-
Khanna, R.1
Liu, H.2
-
199
-
-
70349509437
-
A feature selection approach for network intrusion detection
-
April
-
Khor, K.-C., Ting, C.-Y., and Amnuaisuk, S.-P. A feature selection approach for network intrusion detection. In Proc. on Information Management and Engineering, ICIME’09 (April 2009), pp. 133–137.
-
(2009)
Proc. on Information Management and Engineering, ICIME’09
, pp. 133-137
-
-
Khor, K.-C.1
Ting, C.-Y.2
Amnuaisuk, S.-P.3
-
200
-
-
40949101349
-
A non-parametric multi-chart CUSUM test for rapid detection of DoS attacks in computer networks
-
December
-
Kim, H., Rozovskii, B. L., and Tartakovsky, A. G. A non-parametric multi-chart CUSUM test for rapid detection of DoS attacks in computer networks. International Journal of Computing and Information Sciences 2, 3 (December 2004), 149–158.
-
(2004)
International Journal of Computing and Information Sciences
, vol.2
, Issue.3
, pp. 149-158
-
-
Kim, H.1
Rozovskii, B.L.2
Tartakovsky, A.G.3
-
201
-
-
0027002164
-
The feature selection problem: Traditional methods and a new algorithm
-
John Wiley & Sons Ltd
-
Kira, K., and Rendell, L. The feature selection problem: Traditional methods and a new algorithm. In Proc. of the National Conference on Artificial Intelligence (1992), John Wiley & Sons Ltd., pp. 129–129.
-
(1992)
Proc. of the National Conference on Artificial Intelligence
, pp. 129
-
-
Kira, K.1
Rendell, L.2
-
202
-
-
0002948319
-
Algorithms for mining distance-based outliers in large datasets
-
New York, USA, Sep, Morgan Kaufmann
-
Knorr, E. M., and Ng, R. T. Algorithms for mining distance-based outliers in large datasets. In Proc. of the 24th Int. Conf. on Very Large Databases (New York, USA, Sep. 1998), Morgan Kaufmann, pp. 392–403.
-
(1998)
Proc. of the 24Th Int. Conf. on Very Large Databases
, pp. 392-403
-
-
Knorr, E.M.1
Ng, R.T.2
-
203
-
-
0012905555
-
Finding intentional knowledge of distance-based outliers
-
Edinburgh, Scotland, UK, Sep, Morgan Kaufmann
-
Knorr, E. M., and Ng, R. T. Finding intentional knowledge of distance-based outliers. In Proc. of the 25th International Conference on Very Large Data Bases (Edinburgh, Scotland, UK, Sep. 1999), Morgan Kaufmann, pp. 211–222.
-
(1999)
Proc. of the 25Th International Conference on Very Large Data Bases
, pp. 211-222
-
-
Knorr, E.M.1
Ng, R.T.2
-
204
-
-
0031381525
-
Wrappers for feature subset selection
-
Kohavi, R., and John, G. Wrappers for feature subset selection. Artificial Intelligence 97, 1 (1997), 273–324.
-
(1997)
Artificial Intelligence
, vol.97
, Issue.1
, pp. 273-324
-
-
Kohavi, R.1
John, G.2
-
206
-
-
77649275031
-
A fast outlier detection strategy for distributed high-dimensional data sets with mixed attributes
-
Mar
-
Koufakou, A., and Georgiopoulos, M. A fast outlier detection strategy for distributed high-dimensional data sets with mixed attributes. Data Mining and Knowledge Discovery 20, 2 (Mar. 2010), 259–289.
-
(2010)
Data Mining and Knowledge Discovery
, vol.20
, Issue.2
, pp. 259-289
-
-
Koufakou, A.1
Georgiopoulos, M.2
-
207
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Kruegel, C., Mutz, D., Robertson, W., and Valeur, F. Bayesian event classification for intrusion detection. In Proc. of the 19th Annual Computer Security Applications Conference (2003).
-
(2003)
Proc. of the 19Th Annual Computer Security Applications Conference
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
208
-
-
49049103451
-
-
Ontario, Canada, September
-
Kuang, L. V. DNIDS: A dependable network intrusion detection system using the CSI-KNN algorithm. Master’s thesis, Queen’s University, Kingston, Ontario, Canada, September 2007.
-
(2007)
DNIDS: A Dependable Network Intrusion Detection System Using the CSI-KNN Algorithm. Master’s Thesis, Queen’s University, Kingston
-
-
Kuang, L.V.1
-
209
-
-
56249113343
-
Building predictive models in R using the caret package
-
Kuhn, M. Building predictive models in R using the caret package. Journal of Statistical Software 28, 5 (2008), 1–26.
-
(2008)
Journal of Statistical Software
, vol.28
, Issue.5
, pp. 1-26
-
-
Kuhn, M.1
-
211
-
-
24644455253
-
-
Springer
-
Kumar, V., Srivastava, J., and Lazarevic, A. Managing Cyber Threats—Issues, Approaches and Challenges, vol. 5. Springer, June 7, 2006.
-
(2006)
Managing Cyber Threats—Issues, Approaches and Challenges
, vol.5
-
-
Kumar, V.1
Srivastava, J.2
Lazarevic, A.3
-
212
-
-
84857459505
-
Combining pattern classifiers: Methods and algorithms
-
Kuncheva, L. Combining pattern classifiers: Methods and algorithms. IEEE Transactions on Neural Networks 18, 3 (2007), 964–964.
-
(2007)
IEEE Transactions on Neural Networks
, vol.18
, Issue.3
, pp. 964
-
-
Kuncheva, L.1
-
213
-
-
37249077843
-
Classifier ensembles with a random linear oracle
-
April
-
Kuncheva, L. I., and Rodriguez, J. J. Classifier ensembles with a random linear oracle. IEEE Transactions on Knowledge and Data Engineering 19, 4 (April 2007), 500–508.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.4
, pp. 500-508
-
-
Kuncheva, L.I.1
Rodriguez, J.J.2
-
214
-
-
77958158373
-
Feature selection with the boruta package
-
September
-
Kursa, M. B., and Rudnicki, W. R. Feature selection with the boruta package. Journal of Statistical Software 36, 11 (September 2010), 1–13.
-
(2010)
Journal of Statistical Software
, vol.36
, Issue.11
, pp. 1-13
-
-
Kursa, M.B.1
Rudnicki, W.R.2
-
216
-
-
0026992322
-
An analysis of Bayesian classifiers
-
AAAI Press
-
Langley, P., Iba, W., and Thomas, K. An analysis of Bayesian classifiers. In Proc. of the Tenth National Conference of Artificial Intelligence (1992), AAAI Press, pp. 223–228.
-
(1992)
Proc. of the Tenth National Conference of Artificial Intelligence
, pp. 223-228
-
-
Langley, P.1
Iba, W.2
Thomas, K.3
-
217
-
-
26844582131
-
Defending against spoofed DDoS attacks with path fingerprint
-
Lee, F.-Y., and Shieh, S.-P. Defending against spoofed DDoS attacks with path fingerprint. Computers & Security 24 (2005), 571–586.
-
(2005)
Computers & Security
, vol.24
, pp. 571-586
-
-
Lee, F.-Y.1
Shieh, S.-P.2
-
218
-
-
0035359279
-
An efficient fuzzy classifier with feature selection based on fuzzy entropy
-
Lee, H., Chen, C., Chen, J., and Jou, Y. An efficient fuzzy classifier with feature selection based on fuzzy entropy. IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics 31, 3 (2001), 426–432.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
, vol.31
, Issue.3
, pp. 426-432
-
-
Lee, H.1
Chen, C.2
Chen, J.3
Jou, Y.4
-
220
-
-
0035402096
-
Training a neural-network based intrusion detector to recognize novel attacks
-
Lee, S. C., and Heinbuch, D. V. Training a neural-network based intrusion detector to recognize novel attacks. IEEE Trans actions on Systems, Man, and Cybernetics: Part A 31, 4 (2001), 294–299.
-
(2001)
IEEE Trans Actions on Systems, Man, and Cybernetics: Part A
, vol.31
, Issue.4
, pp. 294-299
-
-
Lee, S.C.1
Heinbuch, D.V.2
-
221
-
-
85084163349
-
Data mining approaches for intrusion detection
-
USA, USENIX Association
-
Lee, W., and Stolfo, S. J. Data mining approaches for intrusion detection. In Proc. of the 7th USENIX Security Symposium (USA, 1998), vol. 7, USENIX Association, pp. 79–94.
-
(1998)
Proc. of the 7Th USENIX Security Symposium
, vol.7
, pp. 79-94
-
-
Lee, W.1
Stolfo, S.J.2
-
222
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
Oakland, CA, USA, IEEE
-
Lee, W., Stolfo, S. J., and Mok, K. W. A data mining framework for building intrusion detection models. In Proc. of the IEEE Symposium on Security and Privacy (Oakland, CA, USA, 1999), IEEE, pp. 120–132.
-
(1999)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
223
-
-
0034455983
-
Adaptive intrusion detection—a data mining approach
-
Lee, W., Stolfo, S. J., and Mok, K. W. Adaptive intrusion detection—a data mining approach. Artificial Intelligence Review 14 (2000), 533–567.
-
(2000)
Artificial Intelligence Review
, vol.14
, pp. 533-567
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
224
-
-
4344698326
-
Anomaly detection based on unsupervised niche clustering with application to network intrusion detection
-
Leon, E., Nasraoui, O., and Gomez, J. Anomaly detection based on unsupervised niche clustering with application to network intrusion detection. IEEE Congress on Evolutionary Computation 1 (2004), 502–508.
-
(2004)
IEEE Congress on Evolutionary Computation
, vol.1
, pp. 502-508
-
-
Leon, E.1
Nasraoui, O.2
Gomez, J.3
-
225
-
-
84868695480
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
Newcastle, NSW, Australia, January/February, Australian Computer Society, Inc., Darlinghurst
-
Leung, K., and Leckie, C. Unsupervised anomaly detection in network intrusion detection using clusters. In Proc. of 28th Australasian Conference on Computer Science-Volume 38 (Newcastle, NSW, Australia, January/February 2005), Australian Computer Society, Inc., Darlinghurst, pp. 333–342.
-
(2005)
Proc. of 28Th Australasian Conference on Computer Science
, vol.38
, pp. 333-342
-
-
Leung, K.1
Leckie, C.2
-
226
-
-
48349140837
-
A lightweight online network anomaly detection scheme based on data mining methods
-
USA, IEEE CS
-
Li, Y., and Fang, B. X. A lightweight online network anomaly detection scheme based on data mining methods. In Proc. of the IEEE International Conference on Network Protocols (USA, 2007), IEEE CS, pp. 340–341.
-
(2007)
Proc. of the IEEE International Conference on Network Protocols
, pp. 340-341
-
-
Li, Y.1
Fang, B.X.2
-
227
-
-
56749159270
-
Anomaly intrusion detection method based on rough set theory
-
Hong Kong, August 30–31, IEEE Computer Society
-
Li, Y.-Z., Zhao, B., Xu, J., and Yang, G. Anomaly intrusion detection method based on rough set theory. In Proc. of the International Conference on Wavelet Analysis and Pattern Recognition (Hong Kong, August 30–31 2008), IEEE Computer Society.
-
(2008)
Proc. of the International Conference on Wavelet Analysis and Pattern Recognition
-
-
Li, Y.-Z.1
Zhao, B.2
Xu, J.3
Yang, G.4
-
228
-
-
0030676601
-
How to systematically classify computer security intrusions
-
Lindqvist, U., and Jonsson, E. How to systematically classify computer security intrusions. IEEE Security and Privacy (1997), 154–163.
-
(1997)
IEEE Security and Privacy
, pp. 154-163
-
-
Lindqvist, U.1
Jonsson, E.2
-
230
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA offline intrusion detection evaluation
-
January
-
Lippmann, R. P., Fried, D. J., Graf, I., Haines, J., Kendall, K., McClung, D., Weber, D., Wyschogord, S. W. D., Cunningham, R. K., and Zissman, M. A. Evaluating intrusion detection systems: The 1998 DARPA offline intrusion detection evaluation. In Proc. of the DARPA Information Survivability Conference and Exposition (January 2000), pp. 12–26.
-
(2000)
Proc. of the DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Wyschogord, S.W.D.8
Cunningham, R.K.9
Zissman, M.A.10
-
231
-
-
33847406678
-
A hierarchical intrusion detection model based on the PCA neural networks
-
Liu, G., Yi, Z., and Yang, S. A hierarchical intrusion detection model based on the PCA neural networks. Neurocomputing 70, 7-9 (2007), 1561–1568.
-
(2007)
Neurocomputing
, vol.70
, Issue.7-9
, pp. 1561-1568
-
-
Liu, G.1
Yi, Z.2
Yang, S.3
-
232
-
-
0031189159
-
Feature selection via discretization
-
Liu, H., and Setiono, R. Feature selection via discretization. IEEE Transactions on Knowledge and Data Engineering 9, 4 (1997), 642–645.
-
(1997)
IEEE Transactions on Knowledge and Data Engineering
, vol.9
, Issue.4
, pp. 642-645
-
-
Liu, H.1
Setiono, R.2
-
233
-
-
0002715112
-
A probabilistic approach to feature selection — A filter solution
-
Citeseer
-
Liu, H., Setiono, R., et al. A probabilistic approach to feature selection — A filter solution. In Machine Learning —Int’nl Workshop (1996), Citeseer, pp. 319–327.
-
(1996)
Machine Learning —Int’nl Workshop
, pp. 319-327
-
-
Liu, H.1
Setiono, R.2
-
234
-
-
17044405923
-
Toward integrating feature selection algorithms for classification and clustering
-
Liu, H., and Yu, L. Toward integrating feature selection algorithms for classification and clustering. IEEE Transactions on Knowledge and Data Engineering 17, 4 (2005), 491–502.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.4
, pp. 491-502
-
-
Liu, H.1
Yu, L.2
-
235
-
-
33745652318
-
FLIPS: Hybrid adaptive intrusion prevention
-
Springer
-
Locasto, M. E., Wang, K., Keromytis, A. D., and Stolfo, S. J. FLIPS: Hybrid adaptive intrusion prevention. In Recent Advances in Intrusion Detection, Lecture Notes in Computer Science (2006), vol. 3858, Springer, pp. 82–101.
-
(2006)
Recent Advances in Intrusion Detection, Lecture Notes in Computer Science
, vol.3858
, pp. 82-101
-
-
Locasto, M.E.1
Wang, K.2
Keromytis, A.D.3
Stolfo, S.J.4
-
240
-
-
84900537680
-
An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming
-
Mabu, S., Chen, C., Lu, N., Shimada, K., and Hirasawa, K. An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 41, 1 (2011), 130–139.
-
(2011)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.41
, Issue.1
, pp. 130-139
-
-
Mabu, S.1
Chen, C.2
Lu, N.3
Shimada, K.4
Hirasawa, K.5
-
242
-
-
78149297786
-
Learning rules for anomaly detection of hostile network traffic
-
Washington, DC, IEEE CS
-
Mahoney, M. V., and Chan, P. K. Learning rules for anomaly detection of hostile network traffic. In Proc. of the 3rd IEEE International Conference on Data Mining (Washington, DC, 2003), IEEE CS.
-
(2003)
Proc. of the 3Rd IEEE International Conference on Data Mining
-
-
Mahoney, M.V.1
Chan, P.K.2
-
243
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
October
-
Manikopoulos, C., and Papavassiliou, S. Network intrusion and fault detection: A statistical anomaly approach. IEEE Communications Magazine 40, 10 (October 2002), 76–82.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
245
-
-
84962806892
-
A short survey of intrusion detection systems. Problems of Engineering Cybernetics and Robotics, Institute of Information Technologies
-
Marinova-Boncheva, V. A short survey of intrusion detection systems. Problems of Engineering Cybernetics and Robotics, Institute of Information Technologies, 1113 Sofia 58 (2007), 23–30.
-
Sofia
, vol.58
, Issue.2007
, pp. 23-30
-
-
Marinova-Boncheva, V.1
-
246
-
-
84883310821
-
Context-based intrusion detection using Snort, Nessus and Bugtraq databases
-
New Brunswick, Canada
-
Massicotte, F., Couture, M., Briand, L., and Labiche, Y. Context-based intrusion detection using Snort, Nessus and Bugtraq databases. In Proc. of the Third Annual Conference on Privacy, Security and Trust (2005), New Brunswick, Canada, pp. 1–12.
-
(2005)
Proc. of the Third Annual Conference on Privacy, Security and Trust
, pp. 1-12
-
-
Massicotte, F.1
Couture, M.2
Briand, L.3
Labiche, Y.4
-
247
-
-
8844278616
-
Fuzzy partitioning using real-coded variable-length genetic algorithm for pixel classification
-
Maulik, U., and Bandyopadhyay, S. Fuzzy partitioning using real-coded variable-length genetic algorithm for pixel classification. IEEE Transactions on Geoscience and Remote Sensing 41, 5 (2003), 1075–1081.
-
(2003)
IEEE Transactions on Geoscience and Remote Sensing
, vol.41
, Issue.5
, pp. 1075-1081
-
-
Maulik, U.1
Bandyopadhyay, S.2
-
248
-
-
34548146810
-
-
University of Newcastle upon Tyne, November
-
Maxion, R. A., and Roberts, R. R. Proper use of ROC curves in intrusion/anomaly detection. Tech. Rep. CS-TR-871, School of Computing Science, University of Newcastle upon Tyne, November 2004.
-
(2004)
Proper Use of ROC Curves in Intrusion/Anomaly Detection. Tech. Rep. CS-TR-871, School of Computing Science
-
-
Maxion, R.A.1
Roberts, R.R.2
-
249
-
-
47049102021
-
Information-theoretic feature selection in microarray data using variable complementarity
-
Meyer, P., Schretter, C., and Bontempi, G. Information-theoretic feature selection in microarray data using variable complementarity. IEEE Journal of Selected Topics in Signal Processing 2, 3 (2008), 261–274.
-
(2008)
IEEE Journal of Selected Topics in Signal Processing
, vol.2
, Issue.3
, pp. 261-274
-
-
Meyer, P.1
Schretter, C.2
Bontempi, G.3
-
250
-
-
78649403251
-
A clustering-based classifier selection method for network intrusion detection
-
Hefei, China, August, IEEE
-
Mi, A., and Hai, L. A clustering-based classifier selection method for network intrusion detection. In Proc. of the 5th International Conference on Computer Science & Education (Hefei, China, August 2010), IEEE, pp. 1001–1004.
-
(2010)
Proc. of the 5Th International Conference on Computer Science & Education
, pp. 1001-1004
-
-
Mi, A.1
Hai, L.2
-
251
-
-
33749558210
-
Yale: Rapid prototyping for complex data mining tasks
-
ACM
-
Mierswa, I., Wurst, M., Klinkenberg, R., Scholz, M., and Euler, T. Yale: Rapid prototyping for complex data mining tasks. In Proc. of the 12th ACM SIGKDD Int’nl Conference on Knowledge Discovery and Data Mining (2006), ACM, pp. 935–940.
-
(2006)
Proc. of the 12Th ACM SIGKDD Int’nl Conference on Knowledge Discovery and Data Mining
, pp. 935-940
-
-
Mierswa, I.1
Wurst, M.2
Klinkenberg, R.3
Scholz, M.4
Euler, T.5
-
253
-
-
27644518127
-
D-ward: A source-end defense against flooding denial-of-service attacks
-
July
-
Mirkovic, J., and Reiher, P. D-ward: A source-end defense against flooding denial-of-service attacks. IEEE Transactions Dependable and Secure Computing 2, 3 (July 2005), 216–232.
-
(2005)
IEEE Transactions Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
255
-
-
0004255908
-
-
McGraw-Hill, Inc., New York, USA
-
Mitchell, T. M. Machine Learning. McGraw-Hill, Inc., New York, USA, 1997.
-
(1997)
Machine Learning
-
-
Mitchell, T.M.1
-
256
-
-
10044299444
-
Feature selection and gene clustering from gene expression data
-
Washington, DC, IEEE Computer Society
-
Mitra, P., and Majumder, D. D. Feature selection and gene clustering from gene expression data. In Proc. of the 17th Int’nl Conference on Pattern Recognition (ICPR’04), Volume 2 (Washington, DC, 2004), IEEE Computer Society, pp. 343–346.
-
(2004)
Proc. of the 17Th Int’nl Conference on Pattern Recognition (ICPR’04
, vol.2
, pp. 343-346
-
-
Mitra, P.1
Majumder, D.D.2
-
257
-
-
0036522403
-
Unsupervised feature selection using feature similarity
-
Mitra, P., Murthy, C., and Pal, S. Unsupervised feature selection using feature similarity. IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 3 (2002), 301–312.
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.3
, pp. 301-312
-
-
Mitra, P.1
Murthy, C.2
Pal, S.3
-
258
-
-
27544490151
-
NFIDS: A Neuro-Fuzzy Intrusion Detection System
-
December
-
Mohajerani, M., Moeini, A., and Kianie, M. NFIDS: A Neuro-Fuzzy Intrusion Detection System. In Proc. of the 10th IEEE International Conference on Electronics, Circuits and Systems (December 2003), vol. 1, pp. 348–351.
-
(2003)
Proc. of the 10Th IEEE International Conference on Electronics, Circuits and Systems
, vol.1
, pp. 348-351
-
-
Mohajerani, M.1
Moeini, A.2
Kianie, M.3
-
259
-
-
85053986937
-
Inverted matrix: Efficient discovery of frequent items in large datsets in the context of interactive mining
-
Mohammad, E., and Zaine, O. R. Inverted matrix: Efficient discovery of frequent items in large datsets in the context of interactive mining. vol. 26, Proc. of the ACM SIGKDD’03, pp. 255–268.
-
Proc. of the ACM SIGKDD’03
, vol.26
, pp. 255-268
-
-
Mohammad, E.1
Zaine, O.R.2
-
260
-
-
78149355539
-
Feature selection algorithms: A survey and experimental evaluation
-
IEEE CS Press
-
Molina, L., Belanche, L., and Nebot, À. Feature selection algorithms: A survey and experimental evaluation. In IEEE International Conference on Data Mining (2002), IEEE CS Press, pp. 306–313.
-
(2002)
IEEE International Conference on Data Mining
, pp. 306-313
-
-
Molina, L.1
Belanche, L.2
Nebot, À.3
-
262
-
-
67349242974
-
A logic-based model to support alert correlation in intrusion detection
-
October
-
Morin, B., Mé, L., Debar, H., and Ducassé, M. A logic-based model to support alert correlation in intrusion detection. Information Fusion 10, 4 (October 2009), 285–299.
-
(2009)
Information Fusion
, vol.10
, Issue.4
, pp. 285-299
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducassé, M.4
-
263
-
-
78651378423
-
A K-means and naive Bayes learning approach for better intrusion detection
-
Muda, Z., Yassin, W., Sulaiman, M. N., and Udzir, N. I. A K-means and naive Bayes learning approach for better intrusion detection. Information Technology Journal 10 (2011), 648–655.
-
(2011)
Information Technology Journal
, vol.10
, pp. 648-655
-
-
Muda, Z.1
Yassin, W.2
Sulaiman, M.N.3
Udzir, N.I.4
-
266
-
-
35048890071
-
A temporal logic based framework for intrusion detection
-
Naldurg, P., Sen, K., and Thati, P. A temporal logic based framework for intrusion detection. In Proc. of the 24th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems (2004), pp. 359–376.
-
(2004)
Proc. of the 24Th IFIP WG 6.1 International Conference on Formal Techniques for Networked and Distributed Systems
, pp. 359-376
-
-
Naldurg, P.1
Sen, K.2
Thati, P.3
-
267
-
-
0000565716
-
A summary of computer misuse techniques
-
Baltimore, MD
-
Neumann, P. G., and Parker, D. B. A summary of computer misuse techniques. In Proc. of the 12th National Computer Security Conference (Baltimore, MD, 1989), pp. 396–407.
-
(1989)
Proc. of the 12Th National Computer Security Conference
, pp. 396-407
-
-
Neumann, P.G.1
Parker, D.B.2
-
268
-
-
84855314334
-
An efficient local region and clustering-based ensemble system for intrusion detection
-
USA, ACM
-
Nguyen, H. H., Harbi, N., and Darmont, J. An efficient local region and clustering-based ensemble system for intrusion detection. In Proc. of the 15th Symposium on International Database Engineering & Applications (USA, 2011), ACM, pp. 185–191.
-
(2011)
Proc. of the 15Th Symposium on International Database Engineering & Applications
, pp. 185-191
-
-
Nguyen, H.H.1
Harbi, N.2
Darmont, J.3
-
270
-
-
0038282217
-
Modern intrusion detection, data mining, and degrees of attack guilt
-
Springer
-
Noel, S., Wijesekera, D., and Youman, C. Modern intrusion detection, data mining, and degrees of attack guilt. In Proc. of the International Conference on Applications of Data Mining in Computer Security (2002), Springer.
-
(2002)
Proc. of the International Conference on Applications of Data Mining in Computer Security
-
-
Noel, S.1
Wijesekera, D.2
Youman, C.3
-
272
-
-
79951731505
-
Anomaly detection using an ensemble of feature models
-
USA, IEEE CS
-
Noto, K., Brodley, C., and Slonim, D. Anomaly detection using an ensemble of feature models. In Proc. of the IEEE International Conference on Data Mining (USA, 2010), IEEE CS, pp. 953–958.
-
(2010)
Proc. of the IEEE International Conference on Data Mining
, pp. 953-958
-
-
Noto, K.1
Brodley, C.2
Slonim, D.3
-
274
-
-
33646553013
-
Fast distributed outlier detection in mixed-attribute data sets
-
Otey, M. E., Ghoting, A., and Parthasarathy, S. Fast distributed outlier detection in mixed-attribute data sets. Data Mining and Knowledge Discovery 12, 2-3 (2006), 203–228.
-
(2006)
Data Mining and Knowledge Discovery
, vol.12
, Issue.2-3
, pp. 203-228
-
-
Otey, M.E.1
Ghoting, A.2
Parthasarathy, S.3
-
276
-
-
77953764785
-
0 day anomaly detection made possible thanks to machine learning
-
Springer
-
Owezarski, P., Mazel, J., and Labit, Y. 0 day anomaly detection made possible thanks to machine learning. In Wired/Wireless Internet Communications, vol. 6074 of LNCS. Springer, 2010, pp. 327–338.
-
(2010)
Wired/Wireless Internet Communications, Vol. 6074 of LNCS
, pp. 327-338
-
-
Owezarski, P.1
Mazel, J.2
Labit, Y.3
-
277
-
-
85053954115
-
-
Tech. rep., Department of Computer Science, Colorado State University, June
-
Papadopoulos, C., Tartakovsky, A. G., and Polunchenko, A. S. A hybrid approach to efficient detection of distributed denial-of-service attacks. Tech. rep., Department of Computer Science, Colorado State University, June, 2008.
-
(2008)
A Hybrid Approach to Efficient Detection of Distributed Denial-Of-Service Attacks
-
-
Papadopoulos, C.1
Tartakovsky, A.G.2
Polunchenko, A.S.3
-
278
-
-
49549110728
-
Data fusion and cost minimization for intrusion detection
-
Parikh, D., and Chen, T. Data fusion and cost minimization for intrusion detection. IEEE Transactions on Information Forensics and Security 3, 3 (2008), 381–389.
-
(2008)
IEEE Transactions on Information Forensics and Security
, vol.3
, Issue.3
, pp. 381-389
-
-
Parikh, D.1
Chen, T.2
-
279
-
-
0000106040
-
Universal approximation using radial basis functions network
-
Park, J., and Sandberg, J. W. Universal approximation using radial basis functions network. Neural Computation 3 (1991), 246–257.
-
(1991)
Neural Computation
, vol.3
, pp. 246-257
-
-
Park, J.1
Sandberg, J.W.2
-
280
-
-
84976830511
-
An efficient hash based algorithm for mining association rules
-
Park, J. S., Chen, M. S., and Yu, P. S. An efficient hash based algorithm for mining association rules. ACM SIGMOD’95, pp. 175–186.
-
ACM SIGMOD’
, vol.95
, pp. 175-186
-
-
Park, J.S.1
Chen, M.S.2
Yu, P.S.3
-
281
-
-
0028391673
-
Application of the recurrent multilayer perceptron in modeling complex process dynamics
-
Parlos, A., Chong, K., and Atiya, A. Application of the recurrent multilayer perceptron in modeling complex process dynamics. IEEE Transactions on Neural Networks 5, 2 (1994), 255–266.
-
(1994)
IEEE Transactions on Neural Networks
, vol.5
, Issue.2
, pp. 255-266
-
-
Parlos, A.1
Chong, K.2
Atiya, A.3
-
282
-
-
77956574669
-
Statistical anomaly detection with sensor networks
-
August
-
Paschalidis, I. C., and Chen, Y. Statistical anomaly detection with sensor networks. ACM Transactions on Sensor Networks 7, 2 (August 2010), 17–23.
-
(2010)
ACM Transactions on Sensor Networks
, vol.7
, Issue.2
, pp. 17-23
-
-
Paschalidis, I.C.1
Chen, Y.2
-
284
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha, A., and Park, J. M. An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks 51, 12 (2007), 3448–3470.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.M.2
-
286
-
-
0031145399
-
Rough set approach to knowledge-based decision support
-
Pawlak, Z. Rough set approach to knowledge-based decision support. European Journal of Operational Research 99, 1 (1997), 48–57.
-
(1997)
European Journal of Operational Research
, vol.99
, Issue.1
, pp. 48-57
-
-
Pawlak, Z.1
-
287
-
-
0029405527
-
Rough sets
-
Pawlak, Z., Grzymala-Busse, J., and Ziarko, W. Rough sets. Communications of the ACM 38, 11 (November 1995), 88– 95.
-
(1995)
Communications of the ACM
, vol.38
, Issue.11
, pp. 88-95
-
-
Pawlak, Z.1
Grzymala-Busse, J.2
Ziarko, W.3
-
288
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V. Bro: A system for detecting network intruders in real-time. Computer networks 31, 23 (1999), 2435–2463.
-
(1999)
Computer Networks
, vol.31
, Issue.23
, pp. 2435-2463
-
-
Paxson, V.1
-
289
-
-
33750514606
-
Modeling intrusion detection system using hybrid intelligent systems
-
Peddabachigari, S., Abraham, A., Grosan, C., and Thomas, J. Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications 30, 1 (January 2007), 114–132.
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.1
, pp. 114-132
-
-
Peddabachigari, S.1
Abraham, A.2
Grosan, C.3
Thomas, J.4
-
290
-
-
24344458137
-
Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy
-
Peng, H., Long, F., and Ding, C. Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy. IEEE Transactions on Pattern Analysis and Machine Intelligence 27, 8 (2005), 1226–1238.
-
(2005)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.27
, Issue.8
, pp. 1226-1238
-
-
Peng, H.1
Long, F.2
Ding, C.3
-
291
-
-
34147099073
-
Survey of network-based defense mechanisms countering the DoS and DDoS problems
-
Peng, T., Leckie, C., and Ramamohanarao, K. Survey of network-based defense mechanisms countering the DoS and DDoS problems. ACM Computing Surveys 39, 1 (April 2007), 1–42.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
, pp. 1-42
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
292
-
-
61749083929
-
McPAD: A multiple classifier system for accurate payload-based anomaly detection
-
April
-
Perdisci, R., Ariu, D., Fogla, P., Giacinto, G., and Lee, W. McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer Networks 53, 6 (April 2009), 864–881.
-
(2009)
Computer Networks
, vol.53
, Issue.6
, pp. 864-881
-
-
Perdisci, R.1
Ariu, D.2
Fogla, P.3
Giacinto, G.4
Lee, W.5
-
293
-
-
60349101742
-
Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
-
USA, IEEE CS
-
Perdisci, R., Gu, G., and Lee, W. Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems. In Proc. of the 6th International Conference on Data Mining (USA, 2006), IEEE CS, pp. 488–498.
-
(2006)
Proc. of the 6Th International Conference on Data Mining
, pp. 488-498
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
294
-
-
25844450147
-
Outlier detection algorithms in data mining systems
-
Petrovskiy, M. I. Outlier detection algorithms in data mining systems. Programming and Computer Software 29, 4 (2003), 228– 237.
-
(2003)
Programming and Computer Software
, vol.29
, Issue.4
, pp. 228-237
-
-
Petrovskiy, M.I.1
-
295
-
-
33748611921
-
Ensemble based systems in decision making
-
Polikar, R. Ensemble based systems in decision making. IEEE Circuits System Magazine 6, 3 (2006), 21–45.
-
(2006)
IEEE Circuits System Magazine
, vol.6
, Issue.3
, pp. 21-45
-
-
Polikar, R.1
-
298
-
-
80955155198
-
-
Pras, A., Sperotto, A., Moura, G. C. M., Drago, I., Barbosa, R., Sadre, R., Schmidt, R., and Hofstede, R. Attacks by anonymous? wikileaks proponents not anonymous. Design and Analysis of Communication Systems Group (DACS) CTIT Technical Report, pp. 1–10.
-
Attacks by Anonymous? Wikileaks Proponents Not Anonymous. Design and Analysis of Communication Systems Group (DACS) CTIT Technical Report
, pp. 1-10
-
-
Pras, A.1
Sperotto, A.2
Moura, G.C.M.3
Drago, I.4
Barbosa, R.5
Sadre, R.6
Schmidt, R.7
Hofstede, R.8
-
299
-
-
58349122797
-
-
PhD thesis, School of Computer Science and Egineering, University of New South Wales, November
-
Prayote, A. Knowledge Based Anomaly Detection. PhD thesis, School of Computer Science and Egineering, University of New South Wales, November 2007.
-
(2007)
Knowledge Based Anomaly Detection
-
-
Prayote, A.1
-
301
-
-
0036361164
-
A Monte Carlo algorithm for fast projective clustering
-
New York, USA, ACM
-
Procopiue, C. M., Jones, M., Agarwal, P. K., and Murali, T. M. A Monte Carlo algorithm for fast projective clustering. In ACM SIGMOD’02 (New York, USA, 2002), ACM, pp. 418–427.
-
(2002)
ACM SIGMOD’02
, pp. 418-427
-
-
Procopiue, C.M.1
Jones, M.2
Agarwal, P.K.3
Murali, T.M.4
-
302
-
-
0035283313
-
Robust classification for imprecise environments
-
Provost, F. J., and Fawcett, T. Robust classification for imprecise environments. Machine Learning 42, 3 (2001), 203– 231.
-
(2001)
Machine Learning
, vol.42
, Issue.3
, pp. 203-231
-
-
Provost, F.J.1
Fawcett, T.2
-
303
-
-
84958544572
-
Correlation-based and contextual merit-based ensemble feature selection
-
Puuronen, S., Tsymbal, A., and Skrypnyk, I. Correlation-based and contextual merit-based ensemble feature selection. Advances in Intelligent Data Analysis (2001), 135–144.
-
(2001)
Advances in Intelligent Data Analysis
, pp. 135-144
-
-
Puuronen, S.1
Tsymbal, A.2
Skrypnyk, I.3
-
305
-
-
34250642066
-
-
Hawthorn Victoria
-
Quittek, J., Zseby, T., Claise, B., and Zender, S. RFC 3917: Requirements for IP Flow Information Export: IPFIX, Hawthorn Victoria. http://www.ietf.org/rfc/rfc3917.txt, 2004.
-
(2004)
RFC 3917: Requirements for IP Flow Information Export: IPFIX
-
-
Quittek, J.1
Zseby, T.2
Claise, B.3
Zender, S.4
-
306
-
-
84863304598
-
-
R Foundation for Statistical Computing, Vienna, Austria
-
R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2012.
-
(2012)
R: A Language and Environment for Statistical Computing
-
-
-
307
-
-
0003676885
-
-
TR // Center for Research in Computing Technology, Harvard University
-
Rabin, M. Fingerprinting by Random Polynomials. TR // Center for Research in Computing Technology, Harvard University. 1981.
-
(1981)
Fingerprinting by Random Polynomials
-
-
Rabin, M.1
-
308
-
-
0039845384
-
Effcient algorithms for mining outliers from large data sets
-
ACM
-
Ramaswamy, S., Rastogi, R., and Shim, K. Effcient algorithms for mining outliers from large data sets. In Proc. of the ACM SIGMOD International Conference on Management of Data (2000), ACM, pp. 427–438.
-
(2000)
Proc. of the ACM SIGMOD International Conference on Management of Data
, pp. 427-438
-
-
Ramaswamy, S.1
Rastogi, R.2
Shim, K.3
-
309
-
-
33845591142
-
DDoS-resilient scheduling to counter application layer attacks under imperfect detection
-
Barcelona, Spain
-
Ranjan, S., Swaminathan, R., Uysal, M., and Knightly, E. DDoS-resilient scheduling to counter application layer attacks under imperfect detection. Proc. of IEEE INFOCOM, 2006, Barcelona, Spain, pp. 1–13.
-
(2006)
Proc. of IEEE INFOCOM
, pp. 1-13
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Knightly, E.4
-
311
-
-
0033884858
-
Speaker verification using adapted Gaussian mixture models
-
Reynolds, D. A., Quatieri, T. F., and Dunn, R. B. Speaker verification using adapted Gaussian mixture models. Digital Signal Processing 10, 1-3 (2000), 19–41.
-
(2000)
Digital Signal Processing
, vol.10
, Issue.1-3
, pp. 19-41
-
-
Reynolds, D.A.1
Quatieri, T.F.2
Dunn, R.B.3
-
313
-
-
75149176174
-
Ensemble-based classifiers
-
February
-
Rokach, L. Ensemble-based classifiers. Artificial Intelligence Review 33, 1-2 (February 2010), 1–39.
-
(2010)
Artificial Intelligence Review
, vol.33
, Issue.1-2
, pp. 1-39
-
-
Rokach, L.1
-
315
-
-
0002501061
-
Two theorems of statistical separability in the perceptron
-
HM Stationary Office, London, National Physical Laboratory
-
Rosenblatt, F. Two theorems of statistical separability in the perceptron. In Proc. of the Symposium of Mechanization of Thought Processes (HM Stationary Office, London, 1959), National Physical Laboratory, pp. 421–456.
-
(1959)
Proc. of the Symposium of Mechanization of Thought Processes
, pp. 421-456
-
-
Rosenblatt, F.1
-
316
-
-
0023453329
-
Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
-
Rousseeuw, P. J. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics 20, 1 (1987), 53–65.
-
(1987)
Journal of Computational and Applied Mathematics
, vol.20
, Issue.1
, pp. 53-65
-
-
Rousseeuw, P.J.1
-
318
-
-
35748932917
-
A review of feature selection techniques in bioinformatics
-
Saeys, Y., Inza, I., and Larrañaga, P. A review of feature selection techniques in bioinformatics. Bioinformatics 23, 19 (2007), 2507–2517.
-
(2007)
Bioinformatics
, vol.23
, Issue.19
, pp. 2507-2517
-
-
Saeys, Y.1
Inza, I.2
Larrañaga, P.3
-
319
-
-
22044455069
-
Density based clustering in spatial databases: The algorithm gdbscan and its applications
-
Sander, J., Ester, M., Kriegel, H. P., and Xu, X. Density based clustering in spatial databases: The algorithm gdbscan and its applications. Data Mining and Knowledge Discovery 2, 2 (1998), 169–194.
-
(1998)
Data Mining and Knowledge Discovery
, vol.2
, Issue.2
, pp. 169-194
-
-
Sander, J.1
Ester, M.2
Kriegel, H.P.3
Xu, X.4
-
320
-
-
0033397980
-
Python: A programming language for software integration and development
-
Sanner, M., et al. Python: a programming language for software integration and development. Journal of Molecular Graph Model 17, 1 (1999), 57–61.
-
(1999)
Journal of Molecular Graph Model
, vol.17
, Issue.1
, pp. 57-61
-
-
Sanner, M.1
-
321
-
-
0032309057
-
Fuzzy-rough membership functions. In Proc. of the IEEE Int’nl Conference on Systems, Man and Cybernetics (San Diego, CA
-
October
-
Sarkar, M., and Yegnanarayana, B. Fuzzy-rough membership functions. In Proc. of the IEEE Int’nl Conference on Systems, Man and Cybernetics (San Diego, CA, USA, October 1998), vol. 2, pp. 2028–2033.
-
(1998)
USA
, vol.2
, pp. 2028-2033
-
-
Sarkar, M.1
Yegnanarayana, B.2
-
323
-
-
0002082857
-
An effective algorithm for mining asociation rules in large database
-
Savesere, A., Omiecinski, E., and Navathe, S. An effective algorithm for mining asociation rules in large database. In Proc. of Int’nl Conference on VLDB95 (1995), pp. 432–443.
-
(1995)
Proc. of Int’nl Conference on VLDB95
, pp. 432-443
-
-
Savesere, A.1
Omiecinski, E.2
Navathe, S.3
-
325
-
-
85086420396
-
Syntax vs. Semantics: Competing approaches to dynamic network intrusion detection
-
Scheirer, W., and Chuah, M. C. Syntax vs. semantics: Competing approaches to dynamic network intrusion detection. Int’nl Journal Security and Networks 3, 1 (December 2008), 24–35.
-
(2008)
Int’nl Journal Security and Networks
, vol.3
, Issue.1
, pp. 24-35
-
-
Scheirer, W.1
Chuah, M.C.2
-
327
-
-
0033280865
-
A high-performance network intrusion detection system
-
USA, ACM
-
Sekar, R., Guang, Y., Verma, S., and Shanbhag, T. A high-performance network intrusion detection system. In Proc. of the 6th ACM Conference on Computer and Communications Security (USA, 1999), ACM, pp. 8–17.
-
(1999)
Proc. of the 6Th ACM Conference on Computer and Communications Security
, pp. 8-17
-
-
Sekar, R.1
Guang, Y.2
Verma, S.3
Shanbhag, T.4
-
328
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
Sekar, R., Gupta, A., Frullo, J., Shanbhag, T., Tiwari, A., and Yang, H. Specification-based anomaly detection: A new approach for detecting network intrusions. In Proc. of the 9th ACM Conference on Computer and Communications Security (2002), pp. 265–274.
-
(2002)
Proc. of the 9Th ACM Conference on Computer and Communications Security
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
-
329
-
-
79955747674
-
LADS: Large-scale automated DDoS detection system
-
Berkeley, CA), USENIX Association
-
Sekar, V., Duffield, N., Spatscheck, O., van der Merwe, J., and Zhang, H. LADS: Large-scale automated DDoS detection system. In Proc. of the Annual Conference on USENIX, 2006 (Berkeley, CA), USENIX Association, pp. 16–16.
-
(2006)
Proc. of the Annual Conference on USENIX
, pp. 16
-
-
Sekar, V.1
Duffield, N.2
Spatscheck, O.3
van der Merwe, J.4
Zhang, H.5
-
330
-
-
84891290313
-
Hybrid multi-level intrusion detection system
-
Selim, S., Hashem, M., and Nazmy, T. M. Hybrid multi-level intrusion detection system. International Journal of Computer Science and Information Security 9, 5 (2011), 23–29.
-
(2011)
International Journal of Computer Science and Information Security
, vol.9
, Issue.5
, pp. 23-29
-
-
Selim, S.1
Hashem, M.2
Nazmy, T.M.3
-
331
-
-
0242456797
-
ADMIT: Anomaly-based data mining for intrusions
-
New York, NY, USA, ACM
-
Sequeira, K., and Zaki, M. ADMIT: Anomaly-based data mining for intrusions. In Proc. of the Eighth ACM SIGKDD Int’nl Conference on Knowledge Discovery and Data Mining (New York, NY, USA, 2002), ACM, pp. 386–395.
-
(2002)
Proc. of the Eighth ACM SIGKDD Int’nl Conference on Knowledge Discovery and Data Mining
, pp. 386-395
-
-
Sequeira, K.1
Zaki, M.2
-
332
-
-
0031140388
-
Neural-network feature selector
-
Setiono, R., and Liu, H. Neural-network feature selector. IEEE Transactions on Neural Networks 8, 3 (1997), 654–662.
-
(1997)
IEEE Transactions on Neural Networks
, vol.8
, Issue.3
, pp. 654-662
-
-
Setiono, R.1
Liu, H.2
-
333
-
-
77953137615
-
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
-
August
-
Shabtai, A., Kanonov, U., and Elovici, Y. Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. Journal of System Software 83, 8 (August 2010), 1524–1537.
-
(2010)
Journal of System Software
, vol.83
, Issue.8
, pp. 1524-1537
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
-
336
-
-
0034565041
-
Click: A clustering algorithm with applications to gene expression analysis
-
AAAI Press
-
Sharan, R., and Shamir, R. Click: A clustering algorithm with applications to gene expression analysis. In Proc. of Intelligent System for Molecular Biology (2000), AAAI Press, pp. 307– 316.
-
(2000)
Proc. of Intelligent System for Molecular Biology
, pp. 307-316
-
-
Sharan, R.1
Shamir, R.2
-
338
-
-
85053978355
-
-
Ohio University, Athens
-
Shawn Ostermann. Tcptrace. Ohio University, Athens, http://www.tcptrace.org, 2009.
-
(2009)
Tcptrace
-
-
Ostermann, S.1
-
339
-
-
0003052357
-
Wavecluster: A multi-resolution clustering approach for very large spatial database
-
Seattle, ACM
-
Sheikholeslami, G., Chatterjee, S., and Zhang, A. Wavecluster: A multi-resolution clustering approach for very large spatial database. In Proc. of the int’nl conference on Very Large Data Bases (Seattle, 1998), ACM, pp. 428–439.
-
(1998)
Proc. of the int’nl Conference on Very Large Data Bases
, pp. 428-439
-
-
Sheikholeslami, G.1
Chatterjee, S.2
Zhang, A.3
-
341
-
-
1542386294
-
ISS RealSecure pushes past newer IDS players
-
Shipley, G. ISS RealSecure pushes past newer IDS players. Network Computing 10, 10 (1999), 95–111.
-
(1999)
Network Computing
, vol.10
, Issue.10
, pp. 95-111
-
-
Shipley, G.1
-
342
-
-
79959226587
-
A novel approach to detect network attacks using G-HMM-based temporal relations between internet protocol packets
-
Shon, T., Han, K., Park, J., and Chang, H. A novel approach to detect network attacks using G-HMM-based temporal relations between internet protocol packets. EURASIP Journal on Wireless Communications and Networking (2011), 1–14.
-
(2011)
EURASIP Journal on Wireless Communications and Networking
, pp. 1-14
-
-
Shon, T.1
Han, K.2
Park, J.3
Chang, H.4
-
343
-
-
34250801472
-
A hybrid machine learning approach to network anomaly detection
-
Shon, T., and Moon, J. A hybrid machine learning approach to network anomaly detection. Information Science 177 (2007), 3799–3821.
-
(2007)
Information Science
, vol.177
, pp. 3799-3821
-
-
Shon, T.1
Moon, J.2
-
345
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Sommer, R., and Paxson, V. Outside the closed world: On using machine learning for network intrusion detection. In Proc. of the IEEE Symposium on Security and Privacy (2010), pp. 305– 316.
-
(2010)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
346
-
-
34250167266
-
Flow-based statistical aggregation schemes for network anomaly detection
-
Song, S., Ling, L., and Manikopoulo, C. N. Flow-based statistical aggregation schemes for network anomaly detection. In Proc. of the IEEE International Conference on Networking, Sensing (2006), pp. 786–791.
-
(2006)
Proc. of the IEEE International Conference on Networking, Sensing
, pp. 786-791
-
-
Song, S.1
Ling, L.2
Manikopoulo, C.N.3
-
347
-
-
33947697162
-
Conditional anomaly detection
-
Song, X., Wu, M., Jermaine, C., and Ranka, S. Conditional anomaly detection. IEEE Transactions on Knowledge and Data Engineering 19, 5 (2007), 631–645.
-
(2007)
IEEE Transactions on Knowledge and Data Engineering
, vol.19
, Issue.5
, pp. 631-645
-
-
Song, X.1
Wu, M.2
Jermaine, C.3
Ranka, S.4
-
348
-
-
77956210836
-
Competitive Overview of Statistical Anomaly Detection
-
Sorensen, S. Competitive Overview of Statistical Anomaly Detection. Juniper Networks, USA, 2004.
-
(2004)
Juniper Networks, USA
-
-
Sorensen, S.1
-
349
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
USA, ACM
-
Soule, A., Salamatian, K., and Taft, N. Combining filtering and statistical methods for anomaly detection. In Proc. of the 5th ACM SIGCOMM Conference on Internet Measurement (USA, 2005), ACM, pp. 1–14.
-
(2005)
Proc. of the 5Th ACM SIGCOMM Conference on Internet Measurement
, pp. 1-14
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
350
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., and Stiller, B. An overview of IP flow-based intrusion detection. IEEE Communications Surveys & Tutorials 12, 3 (2010), 343–356.
-
(2010)
IEEE Communications Surveys & Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
352
-
-
0002880407
-
Mining generalized association rules
-
Zurich, Switzerland
-
Srikant, R., and Agrawala, R. Mining generalized association rules. In Proc. of the 21st VLDB Conference, Zurich, Switzerland (1995), pp. 407–419.
-
(1995)
Proc. of the 21St VLDB Conference
, pp. 407-419
-
-
Srikant, R.1
Agrawala, R.2
-
354
-
-
26944442701
-
A comparative study of real-valued negative selection to statistical anomaly detection techniques
-
Stibor, T., Timmis, J., and Eckert, C. A comparative study of real-valued negative selection to statistical anomaly detection techniques. In Proc. of the 4th International Conference on Artificial Immune Systems (2005), vol. LNCS-3627, pp. 262–275.
-
(2005)
Proc. of the 4Th International Conference on Artificial Immune Systems
, vol.LNCS-3627
, pp. 262-275
-
-
Stibor, T.1
Timmis, J.2
Eckert, C.3
-
356
-
-
84946841683
-
-
National Institute of Standards & Technology, Gaithersburg, MD, United States
-
Stouffer, K. A., Falco, J. A., and Scarfone, K. A. Guide to industrial control systems (ICS) security. Tech. Rep. SP 800-82, National Institute of Standards & Technology, Gaithersburg, MD, United States, 2011.
-
(2011)
Guide to Industrial Control Systems (ICS) Security. Tech. Rep. SP 800-82
-
-
Stouffer, K.A.1
Falco, J.A.2
Scarfone, K.A.3
-
357
-
-
0041965980
-
Cluster ensembles — A knowledge reuse framework for combining multiple partitions
-
volume = 3, number =, month =, year = 2003, pages = 583–617, doi =, publisher =, address =
-
Strehl, A., and Ghosh, J. Cluster ensembles — A knowledge reuse framework for combining multiple partitions, journal = Journal of Machine Learning Research, volume = 3, number =, month =, year = 2003, pages = 583–617, doi =, publisher =, address =,.
-
Journal = Journal of Machine Learning Research
-
-
Strehl, A.1
Ghosh, J.2
-
358
-
-
33646835092
-
Development of a comprehensive intrusion detection system — Challenges and approaches
-
Kolkata, India
-
Subramoniam, N., Pawar, P. S., Bhatnagar, M., Khedekar, N. S., Guntupalli, S., Satyanarayana, N., Vijayakumar, V. A., Ampatt, P. K., Ranjan, R., and Pandit, P. S. Development of a comprehensive intrusion detection system — Challenges and approaches. In Proc. of the 1st International Conference on Information Systems Security (Kolkata, India, 2005), pp. 332–335.
-
(2005)
Proc. of the 1St International Conference on Information Systems Security
, pp. 332-335
-
-
Subramoniam, N.1
Pawar, P.S.2
Bhatnagar, M.3
Khedekar, N.S.4
Guntupalli, S.5
Satyanarayana, N.6
Vijayakumar, V.A.7
Ampatt, P.K.8
Ranjan, R.9
Pandit, P.S.10
-
359
-
-
33750591809
-
Feature selection using decision tree and classification through proximal support vector machine for fault diagnostics of roller bearing
-
Sugumaran, V., Muralidharan, V., and Ramachandran, K. Feature selection using decision tree and classification through proximal support vector machine for fault diagnostics of roller bearing. Mechanical Systems and Signal Processing 21, 2 (2007), 930–942.
-
(2007)
Mechanical Systems and Signal Processing
, vol.21
, Issue.2
, pp. 930-942
-
-
Sugumaran, V.1
Muralidharan, V.2
Ramachandran, K.3
-
360
-
-
66249125727
-
Intrusion detection method based on wavelet neural network
-
USA, IEEE CS
-
Sun, J., Yang, H., Tian, J., and Wu, F. Intrusion detection method based on wavelet neural network. In Proc. of the 2nd International Workshop on Knowledge Discovery and Data Mining (USA, 2009), IEEE CS, pp. 851–854.
-
(2009)
Proc. of the 2Nd International Workshop on Knowledge Discovery and Data Mining
, pp. 851-854
-
-
Sun, J.1
Yang, H.2
Tian, J.3
Wu, F.4
-
362
-
-
58549089680
-
Intrusion detection using fuzzy association rules
-
March
-
Tajbakhsh, A., Rahmati, M., and Mirzaei, A. Intrusion detection using fuzzy association rules. Applied Soft Computing 9, 2 (March 2009), 462–469.
-
(2009)
Applied Soft Computing
, vol.9
, Issue.2
, pp. 462-469
-
-
Tajbakhsh, A.1
Rahmati, M.2
Mirzaei, A.3
-
365
-
-
27544495468
-
Detection of web-based attacks through Markovian protocol parsing
-
USA, IEEE CS
-
Tapiador, J. M. E., Teodoro, P. G., and Diaz-Verdejo, J. E. Detection of web-based attacks through Markovian protocol parsing. In Proc. of the 10th IEEE Symposium on Computers and Communications (USA, June 2005), IEEE CS, pp. 457–462.
-
(2005)
Proc. of the 10Th IEEE Symposium on Computers and Communications
, pp. 457-462
-
-
Tapiador, J.M.E.1
Teodoro, P.G.2
Diaz-Verdejo, J.E.3
-
366
-
-
1642475063
-
Resampling approach for anomaly detection in multispectral images
-
SPIE
-
Theiler, J., and Cai, D. M. Resampling approach for anomaly detection in multispectral images. In Proc. of SPIE (2003), vol. 5093, SPIE, pp. 230–240.
-
(2003)
Proc. of SPIE
, vol.5093
, pp. 230-240
-
-
Theiler, J.1
Cai, D.M.2
-
367
-
-
0043166339
-
Anomaly detection in IP networks
-
August
-
Thottan, M., and Ji, C. Anomaly detection in IP networks. IEEE Transactions on Signal Processing 51, 8 (August 2003), 2191–2204.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
368
-
-
0036678783
-
Analysis of expression profile using fuzzy adaptive resonance theory
-
Tomida, S., Hanai, T., Honda, H., and Kobayashi, T. Analysis of expression profile using fuzzy adaptive resonance theory. Bioinformatics 18, 8 (2002), 1073–1083.
-
(2002)
Bioinformatics
, vol.18
, Issue.8
, pp. 1073-1083
-
-
Tomida, S.1
Hanai, T.2
Honda, H.3
Kobayashi, T.4
-
369
-
-
24944518771
-
Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier
-
Tong, H., Li, C., He, J., Chen, J., Tran, Q. A., Duan, H. X., and Li, X. Anomaly Internet Network Traffic Detection by Kernel Principle Component Classifier. In Proc. of the 2nd International Symposium on Neural Networks (2005), vol. LNCS. 3498, pp. 476–481.
-
(2005)
Proc. of the 2Nd International Symposium on Neural Networks
, vol.LNCS. 3498
, pp. 476-481
-
-
Tong, H.1
Li, C.2
He, J.3
Chen, J.4
Tran, Q.A.5
Duan, H.X.6
Li, X.7
-
370
-
-
69349090629
-
A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
-
Tong, X., Wang, Z., and Yu, H. A research using hybrid RBF/Elman neural networks for intrusion detection system secure model. Computer Physics Communications 180, 10 (2009), 1795–1801.
-
(2009)
Computer Physics Communications
, vol.180
, Issue.10
, pp. 1795-1801
-
-
Tong, X.1
Wang, Z.2
Yu, H.3
-
371
-
-
0030128299
-
Feature extraction methods for character recognition — A survey
-
Trier, O. D., Jain, A., and Taxt, T. Feature extraction methods for character recognition — A survey. Pattern Recognition 29, 4 (1996), 641–662.
-
(1996)
Pattern Recognition
, vol.29
, Issue.4
, pp. 641-662
-
-
Trier, O.D.1
Jain, A.2
Taxt, T.3
-
372
-
-
40649098264
-
Feature selection using ensemble based ranking against artificial contrasts
-
IEEE
-
Tuv, E., Borisov, A., and Torkkola, K. Feature selection using ensemble based ranking against artificial contrasts. In IJCNN’06, International Joint Conference on Neural Networks (2006), IEEE, pp. 2181–2186.
-
(2006)
IJCNN’06, International Joint Conference on Neural Networks
, pp. 2181-2186
-
-
Tuv, E.1
Borisov, A.2
Torkkola, K.3
-
373
-
-
84944220475
-
Adaptive model-based monitoring for cyber attack detection
-
Toulouse, France
-
Valdes, A., and Skinner, K. Adaptive model-based monitoring for cyber attack detection. In Proc. of the Recent Advances in Intrusion Detection (Toulouse, France, 2000), pp. 80–92.
-
(2000)
Proc. of the Recent Advances in Intrusion Detection
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
376
-
-
79956148065
-
Artificial immune system based on interval type-2 fuzzy set paradigm
-
Visconti, A., and Tahayori, H. Artificial immune system based on interval type-2 fuzzy set paradigm. Applied Soft Computing 11, 6 (September 2011), 4055–4063.
-
(2011)
Applied Soft Computing
, vol.11
, Issue.6
, pp. 4055-4063
-
-
Visconti, A.1
Tahayori, H.2
-
377
-
-
70350130556
-
A fast hybrid density based clustering method for large datasets
-
Viswanath, P., and Babu, V. S. A fast hybrid density based clustering method for large datasets. Pattern Recognition Letters 30 (2009), 1477–1488.
-
(2009)
Pattern Recognition Letters
, vol.30
, pp. 1477-1488
-
-
Viswanath, P.1
Babu, V.S.2
-
379
-
-
84994158589
-
Sting: A statistical information grid approach to spatial data mining
-
Athens, Greece
-
Wang, W., Yang, J., and Munz, R. R. Sting: A statistical information grid approach to spatial data mining. In Proc. of VLDB97 (Athens, Greece, 1997), pp. 186–195.
-
(1997)
Proc. of VLDB97
, pp. 186-195
-
-
Wang, W.1
Yang, J.2
Munz, R.R.3
-
381
-
-
79957586137
-
Anomaly detection in network traffic based on statistical inference and α-stable modeling
-
Wattenberg, F. S., Perez, J. I. A., Higuera, P. C., Fernandez, M. M., and Dimitriadis, I. A. Anomaly detection in network traffic based on statistical inference and α-stable modeling. IEEE Transactions on Dependable and Secure Computing 8, 4 (July/August 2011), 494–509.
-
(2011)
IEEE Transactions on Dependable and Secure Computing
, vol.8
, Issue.4
, pp. 494-509
-
-
Wattenberg, F.S.1
Perez, J.I.A.2
Higuera, P.C.3
Fernandez, M.M.4
Dimitriadis, I.A.5
-
386
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: A review
-
Wu, S. X., and Banzhaf, W. The use of computational intelligence in intrusion detection systems: A review. Applied Soft Computing 10, 1 (January 2010), 1–35.
-
(2010)
Applied Soft Computing
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
387
-
-
84863025671
-
A taxonomy of network and computer attacks based on responses
-
China, IEEE Computer Society
-
Wu, Z., Ou, Y., and Liu, Y. A taxonomy of network and computer attacks based on responses. In Proc. of the International Conference of Information Technology, Computer Engineering and Management Sciences (China, 2011), IEEE Computer Society, pp. 26–29.
-
(2011)
Proc. of the International Conference of Information Technology, Computer Engineering and Management Sciences
, pp. 26-29
-
-
Wu, Z.1
Ou, Y.2
Liu, Y.3
-
388
-
-
28444479146
-
A novel intrusion detection method based on clonal selection clustering algorithm
-
IEEE Press, USA
-
Xian, J. Q., Lang, F. H., and Tang, X. L. A novel intrusion detection method based on clonal selection clustering algorithm. In Proc. of the International Conference on Machine Learning and Cybernetics, vol. 6. IEEE Press, USA, 2005.
-
(2005)
Proc. of the International Conference on Machine Learning and Cybernetics
, vol.6
-
-
Xian, J.Q.1
Lang, F.H.2
Tang, X.L.3
-
389
-
-
77949511983
-
-
Rapports de Recherché
-
Xiao, Z., Dellandrea, E., Dou, W., and Chen, L. Esfs: A new embedded feature selection method based on sfs. Rapports de Recherché (2008).
-
(2008)
Esfs: A New Embedded Feature Selection Method Based on Sfs
-
-
Xiao, Z.1
Dellandrea, E.2
Dou, W.3
Chen, L.4
-
390
-
-
0026204245
-
A validity measure for fuzzy clustering
-
Xie, X. L., and Beni, G. A validity measure for fuzzy clustering. IEEE Transactions on Pattern Analysis and Machine Intelligence 13, 4 (1991), 841–847.
-
(1991)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.13
, Issue.4
, pp. 841-847
-
-
Xie, X.L.1
Beni, G.2
-
391
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Xie, Y., and Yu, S.-Z. Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Transactions on Networking 17, 1 (2009), 15–25.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
392
-
-
77649270156
-
Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies
-
Xu, X. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies. Applied Soft Computing 10, 3 (2010), 859–867.
-
(2010)
Applied Soft Computing
, vol.10
, Issue.3
, pp. 859-867
-
-
Xu, X.1
-
393
-
-
33846443005
-
A non-parametric clustering algorithm for knowledge discovery in large spatial datasets
-
IEEE Press
-
Xu, X., Ester, M., Kriegel, H. P., and Sander, J. A non-parametric clustering algorithm for knowledge discovery in large spatial datasets. In Proc. on Data Engineering (1998), IEEE Press.
-
(1998)
Proc. on Data Engineering
-
-
Xu, X.1
Ester, M.2
Kriegel, H.P.3
Sander, J.4
-
394
-
-
22844454592
-
A fast parallel clustering algorithm for large spatial databases
-
Xu, X., Jager, J., and Kriegel, H. P. A fast parallel clustering algorithm for large spatial databases. Data Mining and Knowledge Discovery 3, 3 (1999), 263–290.
-
(1999)
Data Mining and Knowledge Discovery
, vol.3
, Issue.3
, pp. 263-290
-
-
Xu, X.1
Jager, J.2
Kriegel, H.P.3
-
396
-
-
3543125360
-
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms
-
Yamanishi, K., Takeuchi, J. I., Williams, G., and Milne, P. On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. Data Mining and Knowledge Discovery 8 (2004), 275–300.
-
(2004)
Data Mining and Knowledge Discovery
, vol.8
, pp. 275-300
-
-
Yamanishi, K.1
Takeuchi, J.I.2
Williams, G.3
Milne, P.4
-
397
-
-
33750541660
-
Clustering and classification based anomaly detection
-
Yang, H., Xie, F., and Lu, Y. Clustering and classification based anomaly detection. Fuzzy Systems and Knowledge Discovery 4223/2006 (2006), 1082–1091.
-
(2006)
Fuzzy Systems and Knowledge Discovery
, vol.4223
, Issue.2006
, pp. 1082-1091
-
-
Yang, H.1
Xie, F.2
Lu, Y.3
-
398
-
-
0032028297
-
Feature subset selection using a genetic algorithm
-
Yang, J., and Honavar, V. Feature subset selection using a genetic algorithm. Intelligent Systems and Their Applications, IEEE 13, 2 (1998), 44–49.
-
(1998)
Intelligent Systems and Their Applications, IEEE
, vol.13
, Issue.2
, pp. 44-49
-
-
Yang, J.1
Honavar, V.2
-
399
-
-
0036211103
-
δ-clusters: Capturing subspace correlation in a large dataset
-
Yang, J., Wang, W., and Yu, P. δ-clusters: Capturing subspace correlation in a large dataset. In Int’nl Conference on Data Engineering (2002), pp. 517–528.
-
(2002)
In Int’nl Conference on Data Engineering
, pp. 517-528
-
-
Yang, J.1
Wang, W.2
Yu, P.3
-
400
-
-
34547543705
-
Anomaly intrusion detection approach using hybrid MLP/CNN neural network
-
Washington, DC, USA, IEEE Computer Society
-
Yao, Y., Wei, Y., Gao, F. X., and Yu, G. Anomaly intrusion detection approach using hybrid MLP/CNN neural network. In Proc. of the 6th Int’nl Conference on Intelligent Systems Design and Applications (ISDA’06) (Washington, DC, USA, 2006), IEEE Computer Society, pp. 1095–1102.
-
(2006)
Proc. of the 6Th Int’nl Conference on Intelligent Systems Design and Applications (ISDA’06)
, pp. 1095-1102
-
-
Yao, Y.1
Wei, Y.2
Gao, F.X.3
Yu, G.4
-
402
-
-
0003201842
-
A Markov chain model of temporal behavior for anomaly detection
-
(West Point, NY, USA), IEEE
-
Ye, N. A Markov chain model of temporal behavior for anomaly detection. In Proc. of the 2000 IEEE Workshop on Information Assurance and Security United States Military Academy (West Point, NY, USA), IEEE, pp. 171–174.
-
Proc. of the 2000 IEEE Workshop on Information Assurance and Security United States Military Academy
, pp. 171-174
-
-
Ye, N.1
-
403
-
-
0036575252
-
First-order versus high-order stochastic models for computer intrusion detection
-
Ye, N., Ehiabor, T., and Zhang, Y. First-order versus high-order stochastic models for computer intrusion detection. Quality and Reliability Engineering International 18, 3 (2002), 243–250.
-
(2002)
Quality and Reliability Engineering International
, vol.18
, Issue.3
, pp. 243-250
-
-
Ye, N.1
Ehiabor, T.2
Zhang, Y.3
-
404
-
-
84935081578
-
Network management and control using collaborative on-line simulation
-
Helsinki, Finland, June, IEEE Computer Society Press, Los Alamintos, CA
-
Ye, T., Kalyanaraman, S., Harrison, D., Sikdar, B., Mo, B., Kaur, H. T., Vastola, K., and Szymanski, B. Network management and control using collaborative on-line simulation. In Proc. of IEEE Int’nl Conference on Communications (ICC 2001) (Helsinki, Finland, June 2001), IEEE Computer Society Press, Los Alamintos, CA.
-
(2001)
Proc. of IEEE Int’nl Conference on Communications (ICC 2001)
-
-
Ye, T.1
Kalyanaraman, S.2
Harrison, D.3
Sikdar, B.4
Mo, B.5
Kaur, H.T.6
Vastola, K.7
Szymanski, B.8
-
405
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
Yeung, D. Y. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition 36 (2003), 229–243.
-
(2003)
Pattern Recognition
, vol.36
, pp. 229-243
-
-
Yeung, D.Y.1
-
406
-
-
84869056106
-
Tools for attacking layer 2 network infrastructure
-
Yeung, K. H., Fung, D., and Wong, K. Y. Tools for attacking layer 2 network infrastructure. In Proc. of the Int’nl Multi-Conference of Engineers and Computer Scientists, vol 2 (2008).
-
(2008)
Proc. of the Int’nl Multi-Conference of Engineers and Computer Scientists
, vol.2
-
-
Yeung, K.H.1
Fung, D.2
Wong, K.Y.3
-
407
-
-
0041328214
-
K*-means: A new generalized k-means clustering algorithm
-
Yiu-Ming, C. k*-means: A new generalized k-means clustering algorithm. Pattern Recognition Letters 24, 15 (2003), 2883–2893.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.15
, pp. 2883-2893
-
-
Yiu-Ming, C.1
-
408
-
-
79951737996
-
Expert system based intrusion detection system
-
November
-
Yong, H., and Feng, Z. X. Expert system based intrusion detection system. In Proc. of the Int’nl Conference on Information Management, Innovation Management and Industrial Engineering (November 2010), vol. 4, pp. 404–407.
-
(2010)
Proc. of the Int’nl Conference on Information Management, Innovation Management and Industrial Engineering
, vol.4
, pp. 404-407
-
-
Yong, H.1
Feng, Z.X.2
-
409
-
-
33745771946
-
Heterogenous clustering ensemble method for combining different cluster results
-
Berlin, Springer Verlag
-
Yoon, H. S., Ahn, S. Y., Lee, S. H., Cho, S. B., and Kim, J. H. Heterogenous clustering ensemble method for combining different cluster results. In LNCS Proc BioDM’06 (Berlin, 2006), vol. 3916, Springer Verlag, pp. 82–92.
-
(2006)
LNCS Proc BioDM’06
, vol.3916
, pp. 82-92
-
-
Yoon, H.S.1
Ahn, S.Y.2
Lee, S.H.3
Cho, S.B.4
Kim, J.H.5
-
410
-
-
85053974138
-
A detection and offense mechanism to defend against application layer DDoS attacks
-
IEEE
-
Yu, J., Li, Z., Chen, H., and Chen, X. A detection and offense mechanism to defend against application layer DDoS attacks. Third Int’nl Conference on Networking and Services, IEEE.
-
Third Int’nl Conference on Networking and Services
-
-
Yu, J.1
Li, Z.2
Chen, H.3
Chen, X.4
-
411
-
-
1942451938
-
Feature selection for high-dimensional data: A fast correlation-based filter solution
-
Yu, L., and Liu, H. Feature selection for high-dimensional data: A fast correlation-based filter solution. In Machine Learning-Int’nl Workshop (2003), vol. 20, p. 856.
-
(2003)
Machine Learning-Int’nl Workshop
, vol.20
, pp. 856
-
-
Yu, L.1
Liu, H.2
-
412
-
-
84856667841
-
A nonparametric adaptive CUSUM method and its application in network anomaly detection
-
Yu, M. A nonparametric adaptive CUSUM method and its application in network anomaly detection. Int’nl Journal of Advancements in Computing Technology 4, 1 (2012), 280–288.
-
(2012)
Int’nl Journal of Advancements in Computing Technology
, vol.4
, Issue.1
, pp. 280-288
-
-
Yu, M.1
-
415
-
-
0028385414
-
Fuzzy logic, neural networks, and soft computing
-
Zadeh, L. A. Fuzzy logic, neural networks, and soft computing. Communications, ACM 37, 3 (March 1994), 77–84.
-
(1994)
Communications, ACM
, vol.37
, Issue.3
, pp. 77-84
-
-
Zadeh, L.A.1
-
416
-
-
0002524511
-
Role of soft computing and fuzzy logic in the conception, design and development of information/intelligent systems
-
Zadeh, L. A. Role of soft computing and fuzzy logic in the conception, design and development of information/intelligent systems. Lecture Notes in Computer Science 695 (1998), 1–9.
-
(1998)
Lecture Notes in Computer Science
, vol.695
, pp. 1-9
-
-
Zadeh, L.A.1
-
418
-
-
15944375471
-
Intrusion detection using hierarchical neural networks
-
Zhang, C., Jiang, J., and Kamel, M. Intrusion detection using hierarchical neural networks. Pattern Recognition Letters 26, 6 (May 2005), 779–791.
-
(2005)
Pattern Recognition Letters
, vol.26
, Issue.6
, pp. 779-791
-
-
Zhang, C.1
Jiang, J.2
Kamel, M.3
-
419
-
-
77950657888
-
A mixed unsupervised clustering-based intrusion detection. In Proc. of 3rd Int’nl Conference on Genetic and Evolutionary Computing (Gulin, China, October 2009)
-
Zhang, C., Zhang, G., and Sun, S. A mixed unsupervised clustering-based intrusion detection. In Proc. of 3rd Int’nl Conference on Genetic and Evolutionary Computing (Gulin, China, October 2009), IEEE Computer Society.
-
IEEE Computer Society.
-
-
Zhang, C.1
Zhang, G.2
Sun, S.3
-
420
-
-
33750955638
-
A hybrid network intrusion detection technique using random forests
-
Vienna, Austria, IEEE Computer Society
-
Zhang, J., and Zulkernine, M. A hybrid network intrusion detection technique using random forests. In Proc. of 1st Int’nl Conference on Availability, Reliability and Security (ARES 2006) (Vienna, Austria, April 2006), IEEE Computer Society, pp. 262– 269.
-
(2006)
Proc. of 1St Int’nl Conference on Availability, Reliability and Security (ARES 2006)
, pp. 262-269
-
-
Zhang, J.1
Zulkernine, M.2
-
421
-
-
50649094035
-
Random-forests-based network intrusion detection systems
-
Zhang, J., Zulkernine, M., and Haque, A. Random-forests-based network intrusion detection systems. IEEE Transactions on Systems, Man, and Cybernetics: Part C 38, 5 (2008), 649– 659.
-
(2008)
IEEE Transactions on Systems, Man, and Cybernetics: Part C
, vol.38
, Issue.5
, pp. 649-659
-
-
Zhang, J.1
Zulkernine, M.2
Haque, A.3
-
422
-
-
0030157145
-
BIRCH: An effective data clustering method for very large databases. SIG-MOID Record
-
Zhang, T., Ramakrishnan, R., and Livny, M. BIRCH: An effective data clustering method for very large databases. SIG-MOID Record 1996 ACM SIGMOID Int’nl Conference on Management of Data 25 (1996), 103–114.
-
(1996)
ACM SIGMOID Int’nl Conference on Management of Data
, vol.25
, Issue.1996
, pp. 103-114
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
-
423
-
-
77949457636
-
A survey of anomaly detection methods in networks
-
January
-
Zhang, W., Yang, Q., and Geng, Y. A survey of anomaly detection methods in networks. In Proc. of the International Symposium on Computer Network and Multimedia Technology (January 2009), pp. 1–3.
-
(2009)
Proc. of the International Symposium on Computer Network and Multimedia Technology
, pp. 1-3
-
-
Zhang, W.1
Yang, Q.2
Geng, Y.3
-
424
-
-
28444460711
-
Distributed intrusion detection based on clustering
-
August
-
Zhang, Y. F., Xiong, Z. Y., and Wang, X. Q. Distributed intrusion detection based on clustering. In Proc. of the International Conference on Machine Learning and Cybernetics (August 2005), vol. 4, pp. 2379–2383.
-
(2005)
Proc. of the International Conference on Machine Learning and Cybernetics
, vol.4
, pp. 2379-2383
-
-
Zhang, Y.F.1
Xiong, Z.Y.2
Wang, X.Q.3
-
425
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
Zhang, Z., Li, J., Manikopoulos, C. N., Jorgenson, J., and Ucles, J. HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In Proc. of IEEE Man Systems and Cybernetics Information Assurance Workshop (2001).
-
(2001)
Proc. of IEEE Man Systems and Cybernetics Information Assurance Workshop
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.N.3
Jorgenson, J.4
Ucles, J.5
-
426
-
-
84856114036
-
Anomaly detection with score functions based on nearest neighbor graphs
-
Vancouver, British Columbia, Canada, December, Curran Associates, Inc
-
Zhao, M., and Saligrama, V. Anomaly detection with score functions based on nearest neighbor graphs. In Proc. of the 23rd Annual Conference on Neural Information Processing Systems (NIPS) (Vancouver, British Columbia, Canada, December 2009), vol. 22, Curran Associates, Inc., pp. 2250–2258.
-
(2009)
Proc. of the 23Rd Annual Conference on Neural Information Processing Systems (NIPS)
, vol.22
, pp. 2250-2258
-
-
Zhao, M.1
Saligrama, V.2
-
427
-
-
79959299204
-
Decision-level fusion model of multi-source intrusion detection alerts
-
Zhi-dong, L., Wu, Y., Wei, W., and Da-peng, M. Decision-level fusion model of multi-source intrusion detection alerts. Journal on Communications 32, 5 (2011), 121–128.
-
(2011)
Journal on Communications
, vol.32
, Issue.5
, pp. 121-128
-
-
Zhi-Dong, L.1
Wu, Y.2
Wei, W.3
Da-Peng, M.4
-
428
-
-
0035416447
-
Using rough sets with heuristics for feature selection
-
Zhong, N., Dong, J., and Ohsuga, S. Using rough sets with heuristics for feature selection. Journal of Intelligent Information Systems 16, 3 (2001), 199–214.
-
(2001)
Journal of Intelligent Information Systems
, vol.16
, Issue.3
, pp. 199-214
-
-
Zhong, N.1
Dong, J.2
Ohsuga, S.3
-
429
-
-
34249896701
-
Clustering-based network intrusion detection
-
Zhong, S., Khoshgoftaar, T., and Seliya, N. Clustering-based network intrusion detection. International Journal of Reliability, Quality and Safety Engineering 14, 2 (2007), 169–187.
-
(2007)
International Journal of Reliability, Quality and Safety Engineering
, vol.14
, Issue.2
, pp. 169-187
-
-
Zhong, S.1
Khoshgoftaar, T.2
Seliya, N.3
-
430
-
-
22644449321
-
A fast algorithm for density based clustering in large database
-
Springer Verlag
-
Zhou, B., Cheung, D. W., and Kao, B. A fast algorithm for density based clustering in large database. In Proc. of 3rd PAKDD (1999), Springer Verlag, pp. 338–349.
-
(1999)
Proc. of 3Rd PAKDD
, pp. 338-349
-
-
Zhou, B.1
Cheung, D.W.2
Kao, B.3
-
431
-
-
84946216263
-
Utilizing statistical characteristics of N-grams for intrusion detection
-
USA, IEEE CS
-
Zhuowei, L., Das, A., and Nandi, S. Utilizing statistical characteristics of N-grams for intrusion detection. In Proc. of the International Conference on Cyberworlds (USA, 2003), IEEE CS, pp. 486–494.
-
(2003)
Proc. of the International Conference on Cyberworlds
, pp. 486-494
-
-
Zhuowei, L.1
Das, A.2
Nandi, S.3
|