Intrusion Detection System Methodologies Based on Data Analysis
暂无分享,去创建一个
[1] Belur V. Dasarathy. Data mining, intrusion detection, information assurance, and data networks security 2006 : 17-18 April 2006, Kissimmee, Florida, USA , 2006 .
[2] Theodoros Lappas,et al. Data Mining Techniques for ( Network ) Intrusion Detection Systems , 2007 .
[3] Peter Mell. Understanding Intrusion Detection Systems , 2001 .
[4] Anup K. Ghosh,et al. A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.
[5] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[6] Jaideep Srivastava,et al. Intrusion Detection: A Survey , 2005 .
[7] T. Bass,et al. Intrusion Detection Systems & Multisensor Data Fusion: Creating Cyberspace Situational Awareness , 1999 .
[8] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.
[9] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[10] Jonatan Gómez,et al. Evolving Fuzzy Classifiers for Intrusion Detection , 2002 .
[11] Kotagiri Ramamohanarao,et al. Information sharing for distributed intrusion detection systems , 2007, J. Netw. Comput. Appl..
[12] Anastasia Pagnoni,et al. An innate immune system for the protection of computer networks , 2005 .
[13] Susan C. Lee,et al. Training a neural-network based intrusion detector to recognize novel attacks , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[14] Ali Movaghar-Rahimabadi,et al. Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.
[15] N. Srinivasan,et al. Timed Coloured Petri Net Model for Misuse Intrusion Detection , 2006, First International Conference on Industrial and Information Systems.
[16] A. Anou,et al. RETRACTED: A Bayesian Networks in Intrusion Detection Systems , 2007 .
[17] M. Gordeev. Intrusion Detection: Techniques and Approaches , 2003 .
[18] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[19] Jingtao Yao,et al. A study on fuzzy intrusion detection , 2005, SPIE Defense + Commercial Sensing.
[20] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.