LINEBACKER: LINE-Speed Bio-Inspired Analysis and Characterization for Event Recognition
暂无分享,去创建一个
Christopher S. Oehmen | Paul J. Bruillard | Brett D. Matzke | Aaron R. Phillips | Keith T. Star | Jeffrey L. Jensen | Doug Nordwall | Seth R. Thompson | Elena S. Peterson
[1] Christopher S. Oehmen,et al. Novel Visual and Analytical Methods in Repurposing Legacy Scientific Code - A Case Study , 2013 .
[2] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[3] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[4] Christopher S. Oehmen,et al. Evolutionary drift models for moving target defense , 2013, CSIIRW '13.
[5] Yau-Hwang Kuo,et al. The new intrusion prevention and detection approaches for clustering-based sensor networks [wireless sensor networks] , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[6] Jarek Nieplocha,et al. ScalaBLAST: A Scalable Implementation of BLAST for High-Performance Data-Intensive Bioinformatics Analysis , 2006, IEEE Transactions on Parallel and Distributed Systems.
[7] Christopher S. Oehmen,et al. An efficient machine learning approach to low-complexity filtering in biological sequences , 2012, 2012 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology (CIBCB).
[8] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[9] Ulf Lindqvist,et al. Using Model-based Intrusion Detection for SCADA Networks , 2006 .
[10] Anna Sperotto,et al. Flow-based intrusion detection , 2011, 12th IFIP/IEEE International Symposium on Integrated Network Management (IM 2011) and Workshops.
[11] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[12] Christopher S. Oehmen,et al. Behavior Models to Express and Share Threat Information , 2015, IT Professional.
[13] Rituparna Chaki,et al. Intrusion Detection in Wireless Ad-Hoc Networks , 2014 .
[14] John C. Wootton,et al. Statistics of Local Complexity in Amino Acid Sequences and Sequence Databases , 1993, Comput. Chem..
[15] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[16] S. B. Needleman,et al. A general method applicable to the search for similarities in the amino acid sequence of two proteins. , 1970, Journal of molecular biology.
[17] G. de Veciana. Leaky buckets and optimal self-tuning rate control , 1994 .
[18] Christopher S. Oehmen,et al. An organic model for detecting cyber-events , 2010, CSIIRW '10.
[19] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[20] Temple F. Smith,et al. The statistical distribution of nucleic acid similarities. , 1985, Nucleic acids research.
[21] Mohammad Zulkernine,et al. Random-Forests-Based Network Intrusion Detection Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[22] Joobin Choobineh,et al. Enterprise information security strategies , 2008, Comput. Secur..
[23] E. Myers,et al. Basic local alignment search tool. , 1990, Journal of molecular biology.
[24] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[25] Qiang Yang,et al. Mining web logs for prediction models in WWW caching and prefetching , 2001, KDD '01.
[26] Alberto Tonietti,et al. Effectiveness of the "Leaky Bucket" Policing Mechanism in ATM Networks , 1991, IEEE J. Sel. Areas Commun..
[27] Mohammad Zulkernine,et al. Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.
[28] Christopher S. Oehmen,et al. ScalaBLAST 2.0: rapid and robust BLAST calculations on multiprocessor systems , 2013, Bioinform..
[29] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[30] Wei Li,et al. Using Genetic Algorithm for Network Intrusion Detection , 2004 .
[31] Vern Paxson,et al. An architecture for exploiting multi-core processors to parallelize network intrusion prevention , 2007 .
[32] Raj Jain,et al. Packet Trains-Measurements and a New Model for Computer Network Traffic , 1986, IEEE J. Sel. Areas Commun..
[33] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[34] Boleslaw K. Szymanski,et al. NETWORK-BASED INTRUSION DETECTION USING NEURAL NETWORKS , 2002 .