The State of the Art in Intrusion Prevention and Detection
暂无分享,去创建一个
[1] Ali A. Ghorbani,et al. Classification and Discovery of Rule Misconfigurations in Intrusion Detection and Response Devices , 2009, 2009 World Congress on Privacy, Security, Trust and the Management of e-Business.
[2] Ece Guran Schmidt,et al. Machine learning algorithms for accurate flow-based network traffic classification: Evaluation and comparison , 2010, Perform. Evaluation.
[3] Brent Waters,et al. New Techniques for Private Stream Searching , 2009, TSEC.
[4] Wenke Lee,et al. Integrating intrusion detection and network management , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).
[5] Milos Manic,et al. Neural Network based Intrusion Detection System for critical infrastructures , 2009, 2009 International Joint Conference on Neural Networks.
[6] Zhang Jun,et al. MADIDS: a novel distributed IDS based on mobile agent , 2003 .
[7] C.-C. Jay Kuo,et al. Distributed spatio-temporal outlier detection in sensor networks , 2005, SPIE Defense + Commercial Sensing.
[8] Dharma P. Agrawal,et al. SVM-based intrusion detection system for wireless ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).
[9] Lior Rokach,et al. Troika - An improved stacking schema for classification tasks , 2009, Inf. Sci..
[10] Kian Meng Yap,et al. The effect of probe interval estimation on attack detection performance of a WLAN independent intrusion detection system , 2012, ICWCA.
[11] Yan Zhang,et al. The Design and Implementation of Host-Based Intrusion Detection System , 2010, 2010 Third International Symposium on Intelligent Information Technology and Security Informatics.
[12] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[13] Cong Wang,et al. Secure Ranked Keyword Search over Encrypted Cloud Data , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[14] A. Marshall,et al. Design and Analysis of an Independent, Layer 2, Open-Access WiFi Monitoring Infrastructure in the Wild , 2012, ICWN 2012.
[15] Peter Stone,et al. Reinforcement Learning for RoboCup Soccer Keepaway , 2005, Adapt. Behav..
[16] Daihee Park,et al. Traffic flooding attack detection with SNMP MIB using SVM , 2008, Comput. Commun..
[17] Salvatore J. Stolfo,et al. A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions , 2000, Recent Advances in Intrusion Detection.
[18] Dayu Yang,et al. Anomaly-Based Intrusion Detection for SCADA Systems , 2006 .
[19] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.
[20] Charles L. A. Clarke,et al. Relevance ranking for one to three term queries , 1997, Inf. Process. Manag..
[21] Do-hyeon Lee,et al. Multi-Stage Intrusion Detection System Using Hidden Markov Model Algorithm , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).
[22] C. Lu. A Uniied Approach to Spatial Outliers Detection , 2003 .
[23] David W. Aha,et al. Instance-Based Learning Algorithms , 1991, Machine Learning.
[24] Vijay Varadharajan,et al. Intrusion Detection Techniques for Infrastructure as a Service Cloud , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.
[25] Lam-for Kwok,et al. Intrusion Detection Using Disagreement-Based Semi-supervised Learning: Detection Enhancement and False Alarm Reduction , 2012, CSS.
[26] Bill Cheswick,et al. Privacy-Enhanced Searches Using Encrypted Bloom Filters , 2004, IACR Cryptol. ePrint Arch..
[27] Giovanni Vigna. Mobile agents: ten reasons for failure , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.
[28] Christopher Krügel,et al. Anomalous system call detection , 2006, TSEC.
[29] Ming Li,et al. Toward Privacy-Assured Cloud Data Services with Flexible Search Functionalities , 2012, 2012 32nd International Conference on Distributed Computing Systems Workshops.
[30] Mansour Sheikhan,et al. Intrusion detection using reduced-size RNN based on feature grouping , 2010, Neural Computing and Applications.
[31] M. Bellare,et al. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions , 2008, Journal of Cryptology.
[32] Aiko M. Hormann,et al. Programs for Machine Learning. Part I , 1962, Inf. Control..
[33] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[34] Peyman Kabiri,et al. Category-Based Selection of Effective Parameters for Intrusion Detection , 2009 .
[35] Guanlin Chen,et al. An Intelligent WLAN Intrusion Prevention System Based on Signature Detection and Plan Recognition , 2010, 2010 Second International Conference on Future Networks.
[36] Aidong Zhang,et al. FindOut: Finding Outliers in Very Large Datasets , 2002, Knowledge and Information Systems.
[37] Steven Furnell,et al. A new taxonomy for comparing intrusion detection systems , 2007, Internet Res..
[38] Guisong Liu,et al. An integrated intrusion detection system by using multiple neural networks , 2008, 2008 IEEE Conference on Cybernetics and Intelligent Systems.
[39] Robert C. Holte,et al. Very Simple Classification Rules Perform Well on Most Commonly Used Datasets , 1993, Machine Learning.
[40] P. Brockett,et al. Using Kohonen's Self-Organizing Feature Map to Uncover Automobile Bodily Injury Claims Fraud , 1998 .
[41] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[42] Gulshan Kumar,et al. The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review , 2012, Appl. Comput. Intell. Soft Comput..
[43] Mark Stamp,et al. Masquerade detection using profile hidden Markov models , 2011, Comput. Secur..
[44] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[45] Johnny S. Wong,et al. On Evaluation of Response Cost for Intrusion Response Systems , 2008, RAID.
[46] Anthony K. H. Tung,et al. Mining top-n local outliers in large databases , 2001, KDD '01.
[47] Gregory White,et al. A Taxonomy of Cyber Events Affecting Communities , 2011, 2011 44th Hawaii International Conference on System Sciences.
[48] Vasant Honavar,et al. Lightweight agents for intrusion detection , 2003, J. Syst. Softw..
[49] Hua Song,et al. Real-time intrusion detection for high-speed networks , 2005, Comput. Secur..
[50] Salvatore D'Antonio,et al. High-Speed Intrusion Detection in Support of Critical Infrastructure Protection , 2006, CRITIS.
[51] Nur Izura Udzir,et al. A K-Means and Naive Bayes Learning Approach for Better Intrusion Detection , 2011 .
[52] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[53] Ray Hunt,et al. Intrusion detection techniques and approaches , 2002, Comput. Commun..
[54] Ali Ghorbani,et al. Alert correlation survey: framework and techniques , 2006, PST.
[55] Evangelos P. Markatos,et al. An active splitter architecture for intrusion detection and prevention , 2006, IEEE Transactions on Dependable and Secure Computing.
[56] Wei Lu,et al. An unsupervised approach for detecting DDOS attacks based on traffic-based metrics , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..
[57] Jung-Taek Seo,et al. SVM Approach with CTNT to Detect DDoS Attacks in Grid Computing , 2005, GCC.
[58] Xinjian Qiang,et al. A survey of some classic self-organizing maps with incremental learning , 2010, 2010 2nd International Conference on Signal Processing Systems.
[59] Viktor K. Prasanna,et al. Fast Regular Expression Matching Using FPGAs , 2001, The 9th Annual IEEE Symposium on Field-Programmable Custom Computing Machines (FCCM'01).
[60] Chunlei Wang,et al. A Simulation Environment for SCADA Security Analysis and Assessment , 2010, 2010 International Conference on Measuring Technology and Mechatronics Automation.
[61] Wu Yang,et al. Intrusion detection system for high-speed network , 2004, Comput. Commun..
[62] AIIDA-SQL: An Adaptive Intelligent Intrusion Detector Agent for detecting SQL Injection attacks , 2010, 2010 10th International Conference on Hybrid Intelligent Systems.
[63] Daniel Kudenko,et al. Multi-agent Reinforcement Learning for Intrusion Detection , 2007, Adaptive Agents and Multi-Agents Systems.
[64] Lambert Schaelicke,et al. SPANIDS: a scalable network intrusion detection loadbalancer , 2005, CF '05.
[65] Deborah A. Frincke,et al. Configurable middleware-level intrusion detection for embedded systems , 2005, 25th IEEE International Conference on Distributed Computing Systems Workshops.
[66] Hans-Peter Kriegel,et al. LoOP: local outlier probabilities , 2009, CIKM.
[67] Qishi Wu,et al. AVOIDIT: A Cyber Attack Taxonomy , 2009 .
[68] Dwen-Ren Tsai,et al. A hybrid intelligent intrusion detection system to recognize novel attacks , 2003, IEEE 37th Annual 2003 International Carnahan Conference onSecurity Technology, 2003. Proceedings..
[69] Xin Xu,et al. A Reinforcement Learning Approach for Host-Based Intrusion Detection Using Sequences of System Calls , 2005, ICIC.
[70] Atsushi Inoue,et al. Collaborative intrusion detection system , 2003, 22nd International Conference of the North American Fuzzy Information Processing Society, NAFIPS 2003.
[71] Sugata Sanyal,et al. Adaptive neuro-fuzzy intrusion detection systems , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[72] Joonsang Baek,et al. Public Key Encryption with Keyword Search Revisited , 2008, ICCSA.
[73] Peng Ning,et al. Learning attack strategies from intrusion alerts , 2003, CCS '03.
[74] Christopher R. Clark,et al. Scalable pattern matching for high speed networks , 2004, 12th Annual IEEE Symposium on Field-Programmable Custom Computing Machines.
[75] Bhupendra Verma,et al. Implementation of network traffic classifier using semi supervised machine learning approach , 2012, 2012 Nirma University International Conference on Engineering (NUiCONE).
[76] M. F. Augusteijn,et al. Neural network classification and novelty detection , 2002 .
[77] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..
[78] William Perrizo,et al. A vertical outlier detection algorithm with clusters as by-product , 2004, 16th IEEE International Conference on Tools with Artificial Intelligence.
[79] Christos Faloutsos,et al. LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[80] Mikhail J. Atallah,et al. Better Logging through Formality , 2000, Recent Advances in Intrusion Detection.
[81] Joemon M. Jose,et al. A Comparative Study of the Effectiveness of Search Result Presentation on the Web , 2006, ECIR.
[82] Michaël Rusinowitch,et al. Protocol analysis in intrusion detection using decision tree , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[83] Li Yang,et al. Alerts Analysis and Visualization in Network-based Intrusion Detection Systems , 2010, 2010 IEEE Second International Conference on Social Computing.
[84] Uwe Aickelin,et al. Adaptive Alert Throttling for Intrusion Detection Systems , 2013, ArXiv.
[85] Álvaro Herrero,et al. Neural visualization of network traffic data for intrusion detection , 2011, Appl. Soft Comput..
[86] Pieter H. Hartel,et al. Computationally Efficient Searchable Symmetric Encryption , 2010, Secure Data Management.
[87] Li Zhang,et al. Application of Support Vector Machine and Genetic Algorithm to Network Intrusion Detection , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.
[88] Alexander Zien,et al. Semi-Supervised Classification by Low Density Separation , 2005, AISTATS.
[89] Ali A. Ghorbani,et al. Comparative Study of Supervised Machine Learning Techniques for Intrusion Detection , 2007, Fifth Annual Conference on Communication Networks and Services Research (CNSR '07).
[90] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[91] Sung-Bae Cho,et al. Efficient anomaly detection by modeling privilege flows using hidden Markov model , 2003, Comput. Secur..
[92] S. Chintabathina,et al. Plan recognition in intrusion detection systems using logic programming , 2012, 2012 IEEE Conference on Technologies for Homeland Security (HST).
[93] Ajith Abraham,et al. Feature deduction and ensemble design of intrusion detection systems , 2005, Comput. Secur..
[94] Aiko Pras,et al. A Labeled Data Set for Flow-Based Intrusion Detection , 2009, IPOM.
[95] Dharanipragada Janakiram,et al. Outlier Detection in Sensor Networks using Bayesian Belief Networks , 2006 .
[96] Robert McNaughton,et al. Regular Expressions and State Graphs for Automata , 1960, IRE Trans. Electron. Comput..
[97] Jason Smith,et al. Specification-Based Intrusion Detection in WLANs , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).
[98] Eamonn J. Keogh,et al. Approximations to magic: finding unusual medical time series , 2005, 18th IEEE Symposium on Computer-Based Medical Systems (CBMS'05).
[99] Shay Artzi,et al. Encrypted Keyword Search in a Distributed Storage System , 2006 .
[100] Philipp Winter,et al. Inductive Intrusion Detection in Flow-Based Network Data Using One-Class Support Vector Machines , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[101] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[102] Nasser Ghadiri,et al. An Adaptive Hybrid Architecture for Intrusion Detection Based on Fuzzy Clustering and RBF Neural Networks , 2011, 2011 Ninth Annual Communication Networks and Services Research Conference.
[103] Laxmi N. Bhuyan,et al. Compiling PCRE to FPGA for accelerating SNORT IDS , 2007, ANCS '07.
[104] Chris Horn,et al. Visual analysis of goal-directed network defense decisions , 2011, VizSec '11.
[105] P. Sajda,et al. Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model , 2001, Proceedings IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA 2001).
[106] Ravi Jain,et al. D-SCIDS: Distributed soft computing intrusion detection system , 2007, J. Netw. Comput. Appl..
[107] Ray Hunt,et al. A taxonomy of network and computer attacks , 2005, Comput. Secur..
[108] Kang G. Shin,et al. Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[109] Sridhar Ramaswamy,et al. Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.
[110] Viktor K. Prasanna,et al. Compact architecture for high-throughput regular expression matching on FPGA , 2008, ANCS '08.
[111] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[112] Christopher Krügel,et al. A Parallel Architecture for Stateful, High-Speed Intrusion Detection , 2008, ICISS.
[113] Wei Hu,et al. Unsupervised Active Learning Based on Hierarchical Graph-Theoretic Clustering , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[114] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[115] Bo Zhang,et al. An efficient public key encryption with conjunctive-subset keywords search , 2011, J. Netw. Comput. Appl..
[116] Raouf Boutaba,et al. Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.
[117] Carlos Soares,et al. Outlier Detection using Clustering Methods: a data cleaning application , 2004 .
[118] Keith A Gehrke. The Unexplored Impact of IPv6 on Intrusion Detection Systems , 2012 .
[119] Alexandros G. Fragkiadakis,et al. Anomaly-based intrusion detection of jamming attacks, local versus collaborative detection , 2015, Wirel. Commun. Mob. Comput..
[120] Martti Juhola,et al. Informal identification of outliers in medical data , 2000 .
[121] H. Hotelling. A Generalized T Test and Measure of Multivariate Dispersion , 1951 .
[122] Zengyou He,et al. Outlier Detection Integrating Semantic Knowledge , 2002, WAIM.
[123] Christopher Krügel,et al. Stateful intrusion detection for high-speed network's , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[124] Jr. D W Straub,et al. Deviancy by bits and bytes: computer abusers and control measures , 1984 .
[125] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[126] Alfonso Valdes,et al. A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.
[127] Ali A. Ghorbani,et al. Alert Correlation for Extracting Attack Strategies , 2006, Int. J. Netw. Secur..
[128] Stamatis Vassiliadis,et al. Regular expression matching for reconfigurable packet inspection , 2006, 2006 IEEE International Conference on Field Programmable Technology.
[129] Salim Hariri,et al. Abnormality metrics to detect and protect against network attacks , 2004, The IEEE/ACS International Conference onPervasive Services, 2004. ICPS 2004. Proceedings..
[130] Patrick Crowley,et al. Algorithms to accelerate multiple regular expressions matching for deep packet inspection , 2006, SIGCOMM 2006.
[131] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[132] Zengyou He,et al. Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..
[133] Xin Xu,et al. Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning , 2007, PAISI.
[134] Norio Yamagaki,et al. High-speed regular expression matching engine using multi-character NFA , 2008, 2008 International Conference on Field Programmable Logic and Applications.
[135] Moh'd Belal Al-Zoubi,et al. New outlier detection method based on fuzzy clustering , 2010 .
[136] Khalil El-Khatib,et al. Impact of Feature Reduction on the Efficiency of Wireless Intrusion Detection Systems , 2010, IEEE Transactions on Parallel and Distributed Systems.
[137] Eugene H. Spafford,et al. Intrusion detection using autonomous agents , 2000, Comput. Networks.
[138] K. Kadota,et al. Detecting outlying samples in microarray data: A critical assessment of the effect of outliers on sample classification , 2003 .
[139] Julien Bourgeois,et al. Protecting grids from cross-domain attacks using security alert sharing mechanisms , 2013, Future Gener. Comput. Syst..
[140] Zbigniew Kotulski,et al. Analysis of different architectures of neural networks for application in Intrusion Detection Systems , 2008, 2008 International Multiconference on Computer Science and Information Technology.
[141] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[142] Johnny S. Wong,et al. On the symbiosis of specification-based and anomaly-based detection , 2010, Comput. Secur..
[143] Elaine Shi,et al. Predicate Privacy in Encryption Systems , 2009, IACR Cryptol. ePrint Arch..
[144] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[145] Bin Li,et al. A Wireless Intrusion Detection Method Based on Dynamic Growing Neural Network , 2006, First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS'06).
[146] Ke Zhang,et al. A New Local Distance-Based Outlier Detection Approach for Scattered Real-World Data , 2009, PAKDD.
[147] Tal Malkin,et al. Secure anonymous database search , 2009, CCSW '09.
[148] George Varghese,et al. Deterministic memory-efficient string matching algorithms for intrusion detection , 2004, IEEE INFOCOM 2004.
[149] Michel Cukier,et al. Evaluating Attack Resiliency for Host Intrusion Detection Systems , 2009 .
[150] Robert K. Cunningham,et al. Fusing A Heterogeneous Alert Stream Into Scenarios , 2002, Applications of Data Mining in Computer Security.
[151] Kymie M. C. Tan,et al. A defense-centric taxonomy based on attack manifestations , 2004, International Conference on Dependable Systems and Networks, 2004.
[152] H. Altay Güvenir,et al. Classification by Voting Feature Intervals , 1997, ECML.
[153] Morteza Amini,et al. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..
[154] Oded Goldreich,et al. Public-Key Cryptosystems from Lattice Reduction Problems , 1996, CRYPTO.
[155] Haimonti Dutta,et al. Distributed Top-K Outlier Detection from Astronomy Catalogs using the DEMAC System , 2007, SDM.
[156] Slavi ˘ Sarafijanovicand. An Artificial Immune System Approach With Secondary Response for Misbehavior Detection in Mobile ad hoc Networks , 2005 .
[157] Richard S. Sutton,et al. Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.
[158] Brent Waters,et al. Secure Conjunctive Keyword Search over Encrypted Data , 2004, ACNS.
[159] Riyad Alshammari,et al. Machine learning based encrypted traffic classification: Identifying SSH and Skype , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[160] Angelos D. Keromytis,et al. SSARES: Secure Searchable Automated Remote Email Storage , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[161] Yan Gao,et al. A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).
[162] N. Elz,et al. Anomaly detection using new MIB traffic parameters based on profile , 2012, 2012 8th International Conference on Computing Technology and Information Management (NCM and ICNIT).
[163] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[164] D. L. Lough,et al. A taxonomy of computer attacks with applications to wireless networks , 2001 .
[165] Minjie Zhang,et al. P2P Distributed Intrusion Detections by Using Mobile Agents , 2008, Seventh IEEE/ACIS International Conference on Computer and Information Science (icis 2008).
[166] Viktor K. Prasanna,et al. High-Performance and Compact Architecture for Regular Expression Matching on FPGA , 2012, IEEE Transactions on Computers.
[167] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[168] Salim Hariri,et al. A testbed for analyzing security of SCADA control systems (TASSCS) , 2011, ISGT 2011.
[169] H. Bergman,et al. Information processing, dimensionality reduction and reinforcement learning in the basal ganglia , 2003, Progress in Neurobiology.
[170] Leon Reznik,et al. Traffic Analysis Based Identification of Attacks , 2008, Int. J. Comput. Sci. Appl..
[171] Wei Gao,et al. On SCADA control system command and response injection and intrusion detection , 2010, 2010 eCrime Researchers Summit.
[172] Geoffrey M. Voelker,et al. Usage Patterns in an Urban WiFi Network , 2010, IEEE/ACM Transactions on Networking.
[173] Pat Langley,et al. Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.
[174] Tsuhan Chen,et al. Semi-supervised co-training and active learning based approach for multi-view intrusion detection , 2009, SAC '09.
[175] M. Zolghadri Jahromi,et al. A cost sensitive learning algorithm for intrusion detection , 2010, 2010 18th Iranian Conference on Electrical Engineering.
[176] Jian Ma,et al. A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering , 2010, Expert Syst. Appl..
[177] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[178] Dipankar Dasgupta,et al. A comparison of negative and positive selection algorithms in novel pattern detection , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[179] Mohamed S. Kamel,et al. RBF-based real-time hierarchical intrusion detection systems , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[180] Robert P. Goldman,et al. Plan recognition in intrusion detection systems , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[181] Craig Valli. SCADA Forensics with Snort IDS , 2009 .
[182] Cong Wang,et al. Enabling Secure and Efficient Ranked Keyword Search over Outsourced Cloud Data , 2012, IEEE Transactions on Parallel and Distributed Systems.
[183] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[184] P. Vishvapathi,et al. Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data , 2022 .
[185] David S. Rosenblum,et al. Enabling Confidentiality in Content-Based Publish/Subscribe Infrastructures , 2006, 2006 Securecomm and Workshops.
[186] Mudhakar Srivatsa,et al. Securing publish-subscribe overlay services with EventGuard , 2005, CCS '05.
[187] Christopher Krügel,et al. Comprehensive approach to intrusion detection alert correlation , 2004, IEEE Transactions on Dependable and Secure Computing.
[188] Reyadh Shaker Naoum,et al. Learning Vector Quantization ( LVQ ) and k-Nearest Neighbor for Intrusion Classification , 2012 .
[189] Paul A. Crook,et al. A Robot Implementation of a Biologically Inspired Method for Novelty Detection , 2002 .
[190] Sureswaran Ramadass,et al. Architecture for Applying Data Mining and Visualization on Network Flow for Botnet Traffic Detection , 2009, 2009 International Conference on Computer Technology and Development.