UNICORN: misuse detection for UNICOS
Supercomputing '95 Proceedings of the 1995 ACM/IEEE conference on Supercomputing
A Methodology for Testing Intrusion Detection Systems
IEEE Transactions on Software Engineering
A high-performance network intrusion detection system
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Intrusion detection systems and multisensor data fusion
Communications of the ACM
Abstraction-based intrusion detection in distributed environments
ACM Transactions on Information and System Security (TISSEC)
Specification-based anomaly detection: a new approach for detecting network intrusions
Proceedings of the 9th ACM conference on Computer and communications security
Using internal sensors and embedded detectors for intrusion detection
Journal of Computer Security
Decentralized Event Correlation for Intrusion Detection
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Survivable Monitoring in Dynamic Networks
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Architecture for an Artificial Immune System
Evolutionary Computation
A System Architecture for Computer Intrusion Detection
Information-Knowledge-Systems Management
Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies
IEEE Transactions on Dependable and Secure Computing
Intrusion detection through dynamic software measurement
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Design and implementation of a misused intrusion detection system using autonomous and mobile agents
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
Network anomaly detection based on wavelet analysis
EURASIP Journal on Advances in Signal Processing - Special issue on signal processing applications in network intrusion detection systems
Accurate buffer overflow detection via abstract payload execution
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
The use of artificial intelligence based techniques for intrusion detection: a review
Artificial Intelligence Review
A new unsupervised anomaly detection framework for detecting network attacks in real-time
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
Anomaly detection methods in wired networks: a survey and taxonomy
Computer Communications
Design and implementation of a decentralized prototype system for detecting distributed attacks
Computer Communications
Intrusion detection techniques and approaches
Computer Communications
Hi-index | 0.02 |