An overview of recent advances in intrusion detection
暂无分享,去创建一个
[1] Sehun Kim,et al. An Effective Placement of Detection Systems for Distributed Attack Detection in Large Scale Networks , 2004, WISA.
[2] Byung-Joo Kim,et al. Kernel based intrusion detection system , 2005, Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05).
[3] José M. Vidal,et al. Multiagent network security system using FIPA-OS , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).
[4] Michaël Rusinowitch,et al. Protocol analysis in intrusion detection using decision tree , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[5] P. Matzinger. Tolerance, danger, and the extended family. , 1994, Annual review of immunology.
[6] Sushil Jajodia,et al. Intrusion Detection Techniques , 2004 .
[7] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[8] R. Sekar,et al. Experiences with Specification-Based Intrusion Detection , 2001, Recent Advances in Intrusion Detection.
[9] Mohamed Ben Ahmed,et al. A Framework for an Adaptive Intrusion Detection System using Bayesian Network , 2007, 2007 IEEE Intelligence and Security Informatics.
[10] Amparo Alonso-Betanzos,et al. A Misuse Detection Agent for Intrusion Detection in a Multi-agent Architecture , 2007, KES-AMSTA.
[11] Azman Samsudin,et al. Grid-based intrusion detection system , 2003, 9th Asia-Pacific Conference on Communications (IEEE Cat. No.03EX732).
[12] Sandip Sen,et al. Agent-Based Distributed Intrusion Alert System , 2004, IWDC.
[13] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[14] Mohammad Zulkernine,et al. Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[15] Mohammad Zulkernine,et al. DIDMA: a distributed intrusion detection system using mobile agents , 2005, Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Network.
[16] D. Dasgupta,et al. Advances in artificial immune systems , 2006, IEEE Computational Intelligence Magazine.
[17] Yi Hu,et al. A data mining approach for database intrusion detection , 2004, SAC '04.
[18] Eugene H. Spafford,et al. Intrusion detection using autonomous agents , 2000, Comput. Networks.
[19] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[20] Victor K.-W. Wei,et al. Preemptive distributed intrusion detection using mobile agents , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[21] Mauricio Papa,et al. A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems , 2005, The 14th IEEE International Conference on Fuzzy Systems, 2005. FUZZ '05..
[22] Xin Wang,et al. A Novel Peer-to-Peer Intrusion Detection System , 2005, Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05).
[23] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[24] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..