Early Intrusion Detection for OS Scan Attacks
暂无分享,去创建一个
Francisco J. Novoa | Manuel López-Vizcaíno | Fidel Cacheda | Víctor Carneiro | Diego Fernández | Manuel F. López-Vizcaíno | Fidel Cacheda | V. Carneiro | F. J. Nóvoa | Diego Fernández
[1] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[2] Andrew H. Sung,et al. Intrusion detection using an ensemble of intelligent paradigms , 2005, J. Netw. Comput. Appl..
[3] Fabio Crestani,et al. A Test Collection for Research on Depression and Language Use , 2016, CLEF.
[4] Sudarshan S. Chawathe,et al. Monitoring IoT Networks for Botnet Activity , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).
[5] Reyadh Shaker Naoum,et al. An Enhanced Resilient Backpropagation Artificial Neural Network for Intrusion Detection System , 2012 .
[6] Mahmood Yousefi-Azar,et al. Autoencoder-based feature learning for cyber security applications , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).
[7] Yuval Elovici,et al. Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection , 2018, NDSS.
[8] Steven Bethard,et al. Measuring the Latency of Depression Detection in Social Media , 2018, WSDM.
[9] Erhan Guven,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2016, IEEE Communications Surveys & Tutorials.
[10] Brian Trammell,et al. Bidirectional Flow Export Using IP Flow Information Export (IPFIX) , 2008, RFC.
[11] Talha A. Khan,et al. Network Intrusion Detection and its strategic importance , 2013, 2013 IEEE Business Engineering and Industrial Applications Colloquium (BEIAC).
[12] Victor Carneiro,et al. A Practical Application of a Dataset Analysis in an Intrusion Detection System , 2018, 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA).
[13] Hsiao-Hwa Chen,et al. Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks , 2012 .
[14] Jürgen Quittek,et al. Architecture for IP Flow Information Export , 2009, RFC.
[15] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[16] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[17] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.