-
1
-
-
0034301571
-
A denial-of-service
-
Mell, P., Marks, D., McLarnon.: A denial-of-Service, Computer Networks. 34, (2000) 641.
-
(2000)
Computer Networks
, vol.34
, pp. 641
-
-
Mell, P.1
McLarnon, M.D.2
-
3
-
-
84898944587
-
Intrusion detection with neural networks
-
M. Jordan et al., Eds., Cambridge, MA: MIT Press
-
J. Ryan, M.J. Lin, R. Miikkulainen, "Intrusion Detection with Neural Networks", in: Advances in Neural Information Processing Systems 10, M. Jordan et al., Eds., Cambridge, MA: MIT Press, 1998 pp. 943-949.
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
, pp. 943-949
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
4
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
Mukkamala, S., Janoski, G., Sung, A.: Intrusion Detection using Neural Networks and Support Vector Machines. Proc. IJCNN, 2 (2002) 1702-1707.
-
(2002)
Proc. IJCNN
, vol.2
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
5
-
-
0031644250
-
Neural networks applied in intrusion detection systems
-
Anchorage, USA
-
Bonifacio, J., Casian, A., CPLF de Carvalho, A., Moreira E.: Neural Networks Applied in Intrusion Detection Systems. Proc. Word Congress on Computational Intelligence - WCCI, Anchorage, USA, (1998) 205-210.
-
(1998)
Proc. Word Congress on Computational Intelligence - WCCI
, pp. 205-210
-
-
Bonifacio, J.1
Casian, A.2
De Carvalho, C.P.L.F.3
Moreira, E.4
-
6
-
-
0038486520
-
Feature selection using a genetic algorithm for intrusion detection
-
Helmer, G., Wong, J., Honavar, V., Miller, L.: Feature Selection Using a Genetic Algorithm for Intrusion Detection. Proceedings of the Genetic and Evolutionary Computation Conference, 2, (1999) 1781.
-
(1999)
Proceedings of the Genetic and Evolutionary Computation Conference
, vol.2
, pp. 1781
-
-
Helmer, G.1
Wong, J.2
Honavar, V.3
Miller, L.4
-
8
-
-
0030715989
-
Analysis of a denial-of-service attack on TCP
-
USA
-
Schuba, C., Krsul, I., Kuhn, M., Spafford, E., Sundaram, A., Zamboni, D.: Analysis of a denial-of-service attack on TCP. Proc. IEEE Computer Society Symposium on Research in Security and Privacy, USA, (1997) 208-223.
-
(1997)
Proc. IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 208-223
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, E.4
Sundaram, A.5
Zamboni, D.6
-
9
-
-
0034300835
-
Improving intrusion detection performance using Keyword selection and neural networks
-
Lippmann, R., Cunnigham, R.: Improving intrusion detection performance using Keyword selection and neural networks, Computer Networks, 34 (2000) 596-603.
-
(2000)
Computer Networks
, vol.34
, pp. 596-603
-
-
Lippmann, R.1
Cunnigham, R.2
-
10
-
-
0034497721
-
Distributed denail-of-service attacks
-
Lau, F., Rubin, S., Smith, M., Trajkovic, L.: Distributed denail-of-service attacks. Proc. IEEE Inter. Conference on Systems, Man and Cybernetics, 3 (2000) 2275-2280.
-
(2000)
Proc. IEEE Inter. Conference on Systems, Man and Cybernetics
, vol.3
, pp. 2275-2280
-
-
Lau, F.1
Rubin, S.2
Smith, M.3
Trajkovic, L.4
-
11
-
-
0033712953
-
Statistical traffic modeling for network intrusion detection
-
Cabrera, J., Ravichandran, B., Mehra, R.: Statistical Traffic Modeling for network intrusion detection. IEEE Inter. Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (2000) 466-473.
-
(2000)
IEEE Inter. Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems
, pp. 466-473
-
-
Cabrera, J.1
Ravichandran, B.2
Mehra, R.3
-
12
-
-
0037004647
-
Network-based intrusion detection using neural networks
-
Nov. 10-13, St. Louis, Missouri
-
Bivens, A., Palagiri, C., Smith, R., Szymanski, B., and Embrechts M.: Network-Based Intrusion Detection using Neural Networks. Artificial Neural Networks In Engineering Nov. 10-13, St. Louis, Missouri, (2002).
-
(2002)
Artificial Neural Networks in Engineering
-
-
Bivens, A.1
Palagiri, C.2
Smith, R.3
Szymanski, B.4
Embrechts, M.5
-
13
-
-
9444268284
-
-
System and process for defending against denial of service attacks on network nodes. Patent WO0219661, Top Layer Networks Inc. (USA)
-
Narayanaswamy, K., Ross, T., Spinney, B., Paquette, M., Wright, C.: System and process for defending against denial of service attacks on network nodes. Patent WO0219661, Top Layer Networks Inc. (USA), (2002).
-
(2002)
-
-
Narayanaswamy, K.1
Ross, T.2
Spinney, B.3
Paquette, M.4
Wright, C.5
-
15
-
-
0002651837
-
An overview of evolutionary algorithms for parameter optimization
-
Back, T., Schwefel, H.: An overview of evolutionary algorithms for parameter optimization, Evolutionary Computation, 1 (1993) 1-23.
-
(1993)
Evolutionary Computation
, vol.1
, pp. 1-23
-
-
Back, T.1
Schwefel, H.2
-
17
-
-
84862474746
-
-
Branch, J., Bivens, A., Chan, C., Lee, T., Szymanski, B.: Denial of Service Intrusion Detection Using Time-Dependent Finite Automata, http://www.cs.rpi.edu/~brancj/research.htm.
-
Denial of Service Intrusion Detection Using Time-dependent Finite Automata
-
-
Branch, J.1
Bivens, A.2
Chan, C.3
Lee, T.4
Szymanski, B.5
-
18
-
-
9444245460
-
-
Method for Blocking Denial of Service and Address spoofing attacks on a private network. Patent WO9948303, Cisco Tech Ind (USA)
-
Cox, D., McClanahan, K.: Method for Blocking Denial of Service and Address spoofing attacks on a private network. Patent WO9948303, Cisco Tech Ind (USA), (1999).
-
(1999)
-
-
Cox, D.1
McClanahan, K.2
-
19
-
-
9444240553
-
-
Method and apparatus for preventing a denial of service (DOS) attack by selectively throttling TCP/IP requests. Patent WO0201834, Sun Microsystems Inc (USA)
-
Belissent, J.: Method and apparatus for preventing a denial of service (DOS) attack by selectively throttling TCP/IP requests. Patent WO0201834, Sun Microsystems Inc (USA), (2002).
-
(2002)
-
-
Belissent, J.1
-
20
-
-
9444250081
-
-
Method for preventing denial of service attacks. Patent WO0203084, Netrake Corp (USA)
-
Maher, R., Bennett V.: Method for preventing denial of service attacks. Patent WO0203084, Netrake Corp (USA), (2002).
-
(2002)
-
-
Maher, R.1
Bennett, V.2
-
21
-
-
0032633791
-
Surviving denial-of-service
-
Scwartau W.: Surviving denial-of-service. Computers & Security, 18, (1999) 124-133.
-
(1999)
Computers & Security
, vol.18
, pp. 124-133
-
-
Scwartau, W.1
|