A Method of Combining Multiple Experts for the Recognition of Unconstrained Handwritten Numerals
IEEE Transactions on Pattern Analysis and Machine Intelligence
IEEE Transactions on Pattern Analysis and Machine Intelligence
Intrusion detection systems and multisensor data fusion
Communications of the ACM
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
ACM Transactions on Information and System Security (TISSEC)
Characteristics of network traffic flow anomalies
IMW '01 Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
Data Processing and Reconciliation for Chemical Process Operations
Data Processing and Reconciliation for Chemical Process Operations
Combating computer viruses: IBM's new computer immune system
IEEE Parallel & Distributed Technology: Systems & Technology
Decentralized Event Correlation for Intrusion Detection
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Fusion of multiple classifiers for intrusion detection in computer networks
Pattern Recognition Letters
Results of the KDD'99 classifier learning
ACM SIGKDD Explorations Newsletter
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
A data mining framework for constructing features and models for intrusion detection systems (computer security, network security)
IEEE Security and Privacy
An infrastructure for context-awareness based on first order logic
Personal and Ubiquitous Computing
Towards multisensor data fusion for DoS detection
Proceedings of the 2004 ACM symposium on Applied computing
Combining Pattern Classifiers: Methods and Algorithms
Combining Pattern Classifiers: Methods and Algorithms
Intrusion detection using hierarchical neural networks
Pattern Recognition Letters
Can machine learning be secure?
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Host-based network monitoring tools for MANETs
Proceedings of the 3rd ACM international workshop on Performance evaluation of wireless ad hoc, sensor and ubiquitous networks
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Alert Fusion for a Computer Host Based Intrusion Detection System
ECBS '07 Proceedings of the 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems
Information fusion for wireless sensor networks: Methods, models, and classifications
ACM Computing Surveys (CSUR)
A multi-stage classification system for detecting intrusions in computer networks
Pattern Analysis & Applications
Security against probe-response attacks in collaborative intrusion detection
Proceedings of the 2007 workshop on Large scale attack defense
A 'No Panacea Theorem' for classifier combination
Pattern Recognition
Reformulating the monitor placement problem: optimal network-wide sampling
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
REFACING: An autonomic approach to network security based on multidimensional trustworthiness
Computer Networks: The International Journal of Computer and Telecommunications Networking
Network anomaly detection and classification via opportunistic sampling
IEEE Network: The Magazine of Global Internetworking - Special issue title on recent developments in network intrusion detection
An overview of network evasion methods
Information Security Tech. Report
An artificial immune system architecture for computer securityapplications
IEEE Transactions on Evolutionary Computation
Active and dynamic information fusion for multisensor systems with dynamic bayesian networks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Internet infrastructure security: a taxonomy
IEEE Network: The Magazine of Global Internetworking
IEEE Network: The Magazine of Global Internetworking
ICDM'10 Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects
Early classification of network traffic through multi-classification
TMA'11 Proceedings of the Third international conference on Traffic monitoring and analysis
Using a behaviour knowledge space approach for detecting unknown IP traffic flows
MCS'11 Proceedings of the 10th international conference on Multiple classifier systems
SOCIAL: self-organizing classifier ensemble for adversarial learning
MCS'10 Proceedings of the 9th international conference on Multiple Classifier Systems
CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion
Concurrency and Computation: Practice & Experience
Multisensor data fusion: A review of the state-of-the-art
Information Fusion
The use of artificial-intelligence-based ensembles for intrusion detection: a review
Applied Computational Intelligence and Soft Computing
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Information Sciences: an International Journal
Hi-index | 0.00 |
In this paper, we critically review the issue of information fusion for computer security, both in terms of problem formulation and in terms of state-of-the-art solutions. We also analyze main strengths and weaknesses of currently used approaches and propose some research issues that should be investigated in the future.