A New Parallel Hybrid Model - Intrusion Prevention Systems
暂无分享,去创建一个
Manas Ranjan Patra | Debnath Bhattacharyya | Tai-Hoon Kim | Santosh Kumar Sharma | Tai-hoon Kim | D. Bhattacharyya | S. Sharma | M. Patra
[1] Vallipuram Muthukkumarasamy,et al. Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops.
[2] Massudi Mahmuddin,et al. An Overview of Flow-Based and Packet-Based Intrusion Detection Performance in High Speed Networks , 2011 .
[3] Bruno Dutertre,et al. Intrusion-tolerant Enclaves , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] Y. Weinsberg,et al. High performance string matching algorithm for a network intrusion prevention system (NIPS) , 2006, 2006 Workshop on High Performance Switching and Routing.
[5] Christian Fraboul,et al. A holistic methodology for evaluating wireless Intrusion Detection Systems , 2011, 2011 5th International Conference on Network and System Security.
[6] Huang Chuanhe,et al. Anomaly detection using Support Vector Machine classification with k-Medoids clustering , 2012, 2012 Third Asian Himalayas International Conference on Internet.
[7] Li Xue-yong,et al. A New Intrusion Detection Method Based on Improved DBSCAN , 2010, 2010 WASE International Conference on Information Engineering.
[8] Ali A. Ghorbani,et al. Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[9] Meng Jianliang,et al. The Application on Intrusion Detection Based on K-means Cluster Algorithm , 2009, 2009 International Forum on Information Technology and Applications.
[10] Lei Li,et al. A novel rule-based Intrusion Detection System using data mining , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[11] Aiko Pras,et al. An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.
[12] Yongzhong Li,et al. Anomaly Intrusion Detection Method Based on K-Means Clustering Algorithm with Particle Swarm Optimization , 2011, 2011 International Conference of Information Technology, Computer Engineering and Management Sciences.
[13] Hervé Debar,et al. Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.
[14] Wang Qian,et al. A graph-based clustering algorithm for anomaly intrusion detection , 2012, 2012 7th International Conference on Computer Science & Education (ICCSE).
[15] Nur Izura Udzir,et al. Intrusion detection based on k-means clustering and OneR classification , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[16] Ravi Ranjan,et al. A New Clustering Approach for Anomaly Intrusion Detection , 2014, ArXiv.
[17] K. Wankhade,et al. An Overview of Intrusion Detection Based on Data Mining Techniques , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[18] Yves Deswarte,et al. Intrusion tolerance in distributed computing systems , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[19] Michael J. Chapple,et al. Flow Anomaly Detection in Firewalled Networks , 2006, 2006 Securecomm and Workshops.