Biological versus computer viruses
ACM SIGSAC Review
UNIX security in a supercomputing environment
Proceedings of the 1989 ACM/IEEE conference on Supercomputing
Prophylaxis for “virus” propagation and general computer security policy
ACM SIGSAC Review
A Methodology for Testing Intrusion Detection Systems
IEEE Transactions on Software Engineering
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior
IEEE Transactions on Software Engineering
Communications of the ACM
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
Temporal sequence learning and data reduction for anomaly detection
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
A graph-based system for network-vulnerability analysis
Proceedings of the 1998 workshop on New security paradigms
Information mining platforms: an infrastructure for KDD rapid deployment
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
The base-rate fallacy and its implications for the difficulty of intrusion detection
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A high-performance network intrusion detection system
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
Temporal sequence learning and data reduction for anomaly detection
ACM Transactions on Information and System Security (TISSEC)
Intrusion detection systems and multisensor data fusion
Communications of the ACM
An introduction to intrusion detection
Crossroads - Special issue on computer security
Hancock: a language for extracting signatures from data streams
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
XML document security based on provisional authorization
Proceedings of the 7th ACM conference on Computer and communications security
The base-rate fallacy and the difficulty of intrusion detection
ACM Transactions on Information and System Security (TISSEC)
Real-time protocol analysis for detecting link-state routing protocol attacks
ACM Transactions on Information and System Security (TISSEC)
Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
The economics of information security investment
ACM Transactions on Information and System Security (TISSEC)
Automated discovery of concise predictive rules for intrusion detection
Journal of Systems and Software
Specification-based anomaly detection: a new approach for detecting network intrusions
Proceedings of the 9th ACM conference on Computer and communications security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Signature-Based Methods for Data Streams
Data Mining and Knowledge Discovery
Journal of Network and Systems Management
Enhancing profiles for anomaly detection using time granularities
Journal of Computer Security
Computer Networks: The International Journal of Computer and Telecommunications Networking
On-Line Monitoring: A Tutorial
Computer
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
IEEE Transactions on Computers
On a Pattern-Oriented Model for Intrusion Detection
IEEE Transactions on Knowledge and Data Engineering
Recovery from Malicious Transactions
IEEE Transactions on Knowledge and Data Engineering
IEEE Expert: Intelligent Systems and Their Applications
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
IEEE Transactions on Software Engineering
Some Privacy Issues in Knowledge Discovery: The OECD Personal Privacy Guidelines
IEEE Expert: Intelligent Systems and Their Applications
Building Survivable Services Using Redundancy and Adaptation
IEEE Transactions on Computers
Mining TCP/IP Traffic for Network Intrusion Detection by Using a Distributed Genetic Algorithm
ECML '00 Proceedings of the 11th European Conference on Machine Learning
Evolutive Modeling of TCP/IP Network Traffic for Intrusion Detection
Real-World Applications of Evolutionary Computing, EvoWorkshops 2000: EvoIASP, EvoSCONDI, EvoTel, EvoSTIM, EvoROB, and EvoFlight
AudES - An Expert System for Security Auditing
IAAI '90 Proceedings of the The Second Conference on Innovative Applications of Artificial Intelligence
User Profiling for Intrusion Detection Using Dynamic and Static Behavioral Models
PAKDD '02 Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Hiding Intrusions: From the Abnormal to the Normal and Beyond
IH '02 Revised Papers from the 5th International Workshop on Information Hiding
Enhancing Survivability of Security Services Using Redundanc
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Journal of Computer Security
ADMIT: anomaly-based data mining for intrusions
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Internet security and intrusion detection
Proceedings of the 25th International Conference on Software Engineering
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Identifying key features for intrusion detection using neural networks
ICCC '02 Proceedings of the 15th international conference on Computer communication
An approach to usable security based on event monitoring and visualization
Proceedings of the 2002 workshop on New security paradigms
Security issues for wireless ATM networks
ACM SIGOPS Operating Systems Review
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Journal of Computer Security - IFIP 2000
Real-time network-based anomaly intrusion detection
Real-time system security
Decision tree classifiers for computer intrusion detection
Real-time system security
Lightweight agents for intrusion detection
Journal of Systems and Software
Monitoring mission critical data for integrity and availability
Integrity and internal control in information systems V
Anomaly detection of web-based attacks
Proceedings of the 10th ACM conference on Computer and communications security
Management of security in TCP/IP hosts using dedicated monitoring applications
Network control and engineering for Qos, security and mobility II
Hancock: A language for analyzing transactional data streams
ACM Transactions on Programming Languages and Systems (TOPLAS)
Detecting errors within a corpus using anomaly detection
NAACL 2000 Proceedings of the 1st North American chapter of the Association for Computational Linguistics conference
Incremental learning with partial instance memory
Artificial Intelligence
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Using DAML+OIL to classify intrusive behaviours
The Knowledge Engineering Review
Distributed multi-intelligent agent framework for detection of stealthy probes
Design and application of hybrid intelligent systems
Design and application of hybrid intelligent systems
Measuring normality in HTTP traffic for anomaly-based intrusion detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
Mobility-based anomaly detection in cellular mobile networks
Proceedings of the 3rd ACM workshop on Wireless security
User re-authentication via mouse movements
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Web tap: detecting covert web traffic
Proceedings of the 11th ACM conference on Computer and communications security
On Optimal Placement of Intrusion Detection Modules in Sensor Networks
BROADNETS '04 Proceedings of the First International Conference on Broadband Networks
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
Continual repair for windows using the event log
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
A Comprehensive Approach to Intrusion Detection Alert Correlation
IEEE Transactions on Dependable and Secure Computing
An new intrusion detection method based on linear prediction
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Network-based Intrusion Detection-Modeling for a Larger Picture
LISA '02 Proceedings of the 16th USENIX conference on System administration
Intrusion detection using an ensemble of intelligent paradigms
Journal of Network and Computer Applications - Special issue on computational intelligence on the internet
Two experiences designing for effective security
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Application of SVM and ANN for intrusion detection
Computers and Operations Research
Using model trees to characterize computer resource usage
WOSS '04 Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems
Mining anomalies using traffic feature distributions
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
Unsupervised anomaly detection in network intrusion detection using clusters
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Using dynamic information flow analysis to detect attacks against applications
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
In the eye of the beholder: a visualization-based approach to information system security
International Journal of Human-Computer Studies - Special isssue: HCI research in privacy and security is critical now
A multi-model approach to the detection of web-based attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
High-throughput linked-pattern matching for intrusion detection systems
Proceedings of the 2005 ACM symposium on Architecture for networking and communications systems
The monitoring and early detection of internet worms
IEEE/ACM Transactions on Networking (TON)
A blackboard-based learning intrusion detection system: a new approach
IEA/AIE'2003 Proceedings of the 16th international conference on Developments in applied artificial intelligence
Transaction fusion: a model for data recovery from information attacks
Journal of Intelligent Information Systems - Special issue: Database and applications security
A scalable decision tree system and its application in pattern recognition and intrusion detection
Decision Support Systems
Anomalous system call detection
ACM Transactions on Information and System Security (TISSEC)
Measuring intrusion detection capability: an information-theoretic approach
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
A clustering-based method for unsupervised intrusion detections
Pattern Recognition Letters
Behavior-based modeling and its application to Email analysis
ACM Transactions on Internet Technology (TOIT)
Real-time data attack isolation for commercial database applications
Journal of Network and Computer Applications
Probabilistic anomaly detection in distributed computer networks
Science of Computer Programming
A Bayesian Network Approach to Detecting Privacy Intrusion
WI-IATW '06 Proceedings of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology
Web Dragons: Inside the Myths of Search Engine Technology
Web Dragons: Inside the Myths of Search Engine Technology
Modeling network intrusion detection alerts for correlation
ACM Transactions on Information and System Security (TISSEC)
Survey of network-based defense mechanisms countering the DoS and DDoS problems
ACM Computing Surveys (CSUR)
ANSS '06 Proceedings of the 39th annual Symposium on Simulation
NetHost-sensor: Monitoring a target host's application via system calls
Information Security Tech. Report
Network anomaly detection based on TCM-KNN algorithm
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Intrusion detection in web applications using text mining
Engineering Applications of Artificial Intelligence
Analysis of active intrusion prevention data for predicting hostile activity in computer networks
Communications of the ACM
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Hybrid multi-agent framework for detection of stealthy probes
Applied Soft Computing
D-SCIDS: distributed soft computing intrusion detection system
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Intrusion detection using a fuzzy genetics-based learning algorithm
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Evaluating indirect and direct classification techniques for network intrusion detection
Intelligent Data Analysis
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection
Journal of Computer Security
Network intrusion detection in covariance feature space
Pattern Recognition
Towards security monitoring patterns
Proceedings of the 2007 ACM symposium on Applied computing
Role classification of hosts within enterprise networks based on connection patterns
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
The case for Byzantine fault detection
HOTDEP'06 Proceedings of the 2nd conference on Hot Topics in System Dependability - Volume 2
Self-securing storage: protecting data in compromised system
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Storage-based intrusion detection: watching storage activity for suspicious behavior
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Detecting malicious java code using virtual machine auditing
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Synthesizing fast intrusion prevention/detection systems from high-level specifications
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Analysis of Computer Intrusions Using Sequences of Function Calls
IEEE Transactions on Dependable and Secure Computing
On preventing intrusions by process behavior monitoring
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
Intrusion detection through dynamic software measurement
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
A markovian signature-based approach to IP traffic classification
Proceedings of the 3rd annual ACM workshop on Mining network data
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
The motivation and proposition of a privacy-enhancing architecture for operational databases
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Challenging the anomaly detection paradigm: a provocative discussion
NSPW '06 Proceedings of the 2006 workshop on New security paradigms
A new intrusion detection system using support vector machines and hierarchical clustering
The VLDB Journal — The International Journal on Very Large Data Bases
Simulating adversarial interactions between intruders and system administrators using OODA-RR
Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
A Tabu Clustering algorithm for Intrusion Detection
Intelligent Data Analysis
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
A New Biometric Technology Based on Mouse Dynamics
IEEE Transactions on Dependable and Secure Computing
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Proceedings of the 14th ACM conference on Computer and communications security
Insider attack and real-time data mining of user behavior
IBM Journal of Research and Development - Business optimization
Processing of massive audit data streams for real-time anomaly intrusion detection
Computer Communications
Implementing high-speed string matching hardware for network intrusion detection systems
Proceedings of the 16th international ACM/SIGDA symposium on Field programmable gate arrays
Formal architectural models for agent-based service systems
International Journal of Computer Applications in Technology
An adaptive expert system approach for intrusion detection
International Journal of Security and Networks
International Journal of Information and Computer Security
Automatic software interference detection in parallel applications
Proceedings of the 2007 ACM/IEEE conference on Supercomputing
A real-time intrusion prevention system for commercial enterprise databases and file systems
AIKED'05 Proceedings of the 4th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering Data Bases
TCM-KNN scheme for network anomaly detection using feature-based optimizations
Proceedings of the 2008 ACM symposium on Applied computing
A comparative analysis of artificial neural network technologies in intrusion detection systems
MIV'06 Proceedings of the 6th WSEAS International Conference on Multimedia, Internet & Video Technologies
A real-time intrusion prevention system for commercial enterprise databases
SEPADS'05 Proceedings of the 4th WSEAS International Conference on Software Engineering, Parallel & Distributed Systems
Classification of intrusion detection alerts using abstaining classifiers
Intelligent Data Analysis
Detecting VoIP based DoS attacks at the public safety answering point
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Using Echo State Networks for Anomaly Detection in Underground Coal Mines
IPSN '08 Proceedings of the 7th international conference on Information processing in sensor networks
Analytics for audit and business controls in corporate travel & entertainment
AusDM '07 Proceedings of the sixth Australasian conference on Data mining and analytics - Volume 70
A hybrid artificial immune system and Self Organising Map for network intrusion detection
Information Sciences: an International Journal
CAMNEP: agent-based network intrusion detection system
Proceedings of the 7th international joint conference on Autonomous agents and multiagent systems: industrial track
Impact of daily computer usage on GUI usage analysis
Proceedings of the 4th annual conference on Information security curriculum development
NN'08 Proceedings of the 9th WSEAS International Conference on Neural Networks
ACACOS'08 Proceedings of the 7th WSEAS International Conference on Applied Computer and Applied Computational Science
A real-time intrusion prevention system for commercial enterprise databases and file systems
MMACTEE'08 Proceedings of the 10th WSEAS International Conference on Mathematical Methods and Computational Techniques in Electrical Engineering
A Kernel-Based Reinforcement Learning Approach to Dynamic Behavior Modeling of Intrusion Detection
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks
A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme
ISNN '07 Proceedings of the 4th international symposium on Neural Networks: Advances in Neural Networks
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Sensing Attacks in Computers Networks with Hidden Markov Models
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
ICCBR '07 Proceedings of the 7th international conference on Case-Based Reasoning: Case-Based Reasoning Research and Development
Agent-Based Immunological Intrusion Detection System for Mobile Ad-Hoc Networks
ICCS '08 Proceedings of the 8th international conference on Computational Science, Part III
Trust-Based Classifier Combination for Network Anomaly Detection
CIA '08 Proceedings of the 12th international workshop on Cooperative Information Agents XII
A Component-Based Framework for Visualization of Intrusion Detection Events
Information Security Journal: A Global Perspective
Peer-to-peer system-based active worm attacks: Modeling, analysis and defense
Computer Communications
Fast intrusion detection based on a non-negative matrix factorization model
Journal of Network and Computer Applications
The implementation and evaluation of a recovery system for workflows
Journal of Network and Computer Applications
Statistical Analysis of Slow Portsweep
APNOMS '08 Proceedings of the 11th Asia-Pacific Symposium on Network Operations and Management: Challenges for Next Generation Network Operations and Service Management
Runtime Verification
Network-Based Anomaly Intrusion Detection Improvement by Bayesian Network and Indirect Relation
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
Research challenges for the security of control systems
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Dynamic dependencies and performance improvement
LISA'08 Proceedings of the 22nd conference on Large installation system administration conference
Data mining-based intrusion detectors
Expert Systems with Applications: An International Journal
WSEAS Transactions on Information Science and Applications
Log summarization and anomaly detection for troubleshooting distributed systems
GRID '07 Proceedings of the 8th IEEE/ACM International Conference on Grid Computing
Network anomaly detection based on wavelet analysis
EURASIP Journal on Advances in Signal Processing - Special issue on signal processing applications in network intrusion detection systems
VMFence: a customized intrusion prevention system in distributed virtual computing environment
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication
A hybrid intrusion detection system design for computer network security
Computers and Electrical Engineering
Proceedings of the International Conference on Advances in Computing, Communication and Control
ACM Computing Surveys (CSUR)
Security management of mutually trusted domains through cooperation of defensive technologies
International Journal of Network Management
Dynamic information source selection for intrusion detection systems
Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems - Volume 2
Artificial neural network approaches to intrusion detection: a review
TELE-INFO'09 Proceedings of the 8th Wseas international conference on Telecommunications and informatics
Design of a Snort-Based Hybrid Intrusion Detection System
IWANN '09 Proceedings of the 10th International Work-Conference on Artificial Neural Networks: Part II: Distributed Computing, Artificial Intelligence, Bioinformatics, Soft Computing, and Ambient Assisted Living
Implicit User Re-authentication for Mobile Devices
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
High-speed string matching for network intrusion detection
International Journal of Communication Networks and Distributed Systems
Evolving event-driven programs
GECCO '96 Proceedings of the 1st annual conference on Genetic and evolutionary computation
Journal of Network and Computer Applications
Application of artificial neural network in detection of DOS attacks
Proceedings of the 2nd international conference on Security of information and networks
DSS for computer security incident response applying CBR and collaborative response
Expert Systems with Applications: An International Journal
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Constructing attribute weights from computer audit data for effective intrusion detection
Journal of Systems and Software
Optimized memory based accelerator for scalable pattern matching
Microprocessors & Microsystems
A multi-model approach to the detection of web-based attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Neural network approach for intrusion detection
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Intrusion detection system based on partially ordered events and patterns
INES'09 Proceedings of the IEEE 13th international conference on Intelligent Engineering Systems
Anomaly detection inspired by immune network theory: a proposal
CEC'09 Proceedings of the Eleventh conference on Congress on Evolutionary Computation
Protecting a Moving Target: Addressing Web Application Concept Drift
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
Runtime Monitoring and Dynamic Reconfiguration for Intrusion Detection Systems
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
Detecting Network Anomalies Using CUSUM and EM Clustering
ISICA '09 Proceedings of the 4th International Symposium on Advances in Computation and Intelligence
OPODIS '09 Proceedings of the 13th International Conference on Principles of Distributed Systems
A scalable decision tree system and its application in pattern recognition and intrusion detection
Decision Support Systems
Neural network based intrusion detection system for critical infrastructures
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Data mining and machine learning-Towards reducing false positives in intrusion detection
Information Security Tech. Report
Applying Kernel methods to anomaly based intrusion detection systems
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Three levels network analysis for anomaly detection
SoftCOM'09 Proceedings of the 17th international conference on Software, Telecommunications and Computer Networks
Local area network anomaly detection using association rules mining
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Experimental analysis of application-level intrusion detection algorithms
International Journal of Security and Networks
Anomaly detection of masquerders based upon typing biometrics and probabilistic neural network
Journal of Computing Sciences in Colleges
Detecting malicious software by monitoring anomalous windows registry accesses
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
TCM-KNN algorithm for supervised network intrusion detection
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Defending DDoS attacks using hidden Markov models and cooperative reinforcement learning
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
PPIDS: privacy preserving intrusion detection system
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A Bayesian biosurveillance method that models unknown outbreak diseases
BioSurveillance'07 Proceedings of the 2nd NSF conference on Intelligence and security informatics: BioSurveillance
Improvement of anomaly intrusion detection performance by indirect relation for FTP service
IWANN'07 Proceedings of the 9th international work conference on Artificial neural networks
An intrusion detection based on support vector machines with a voting weight schema
IEA/AIE'07 Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems
Detection and analysis of drive-by-download attacks and malicious JavaScript code
Proceedings of the 19th international conference on World wide web
Swaddler: an approach for the anomaly-based detection of state violations in web applications
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
ELICIT: a system for detecting insiders who violate need-to-know
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Meta learning intrusion detection in real time network
ICANN'07 Proceedings of the 17th international conference on Artificial neural networks
A comprehensive approach to detect unknown attacks via intrusion detection alerts
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Statistic learning and intrusion detection
RSFDGrC'03 Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Algebra for capability based attack correlation
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Application of network intrusion detection based on fuzzy C-means clustering algorithm
IITA'09 Proceedings of the 3rd international conference on Intelligent information technology application
Optimizing network anomaly detection scheme using instance selection mechanism
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
G-means: a clustering algorithm for intrusion detection
ICONIP'08 Proceedings of the 15th international conference on Advances in neuro-information processing - Volume Part I
Network security using growing hierarchical self-organizing maps
ICANNGA'09 Proceedings of the 9th international conference on Adaptive and natural computing algorithms
Mining frequent patterns from network flows for monitoring network
Expert Systems with Applications: An International Journal
A Framework for Large-Scale Detection of Web Site Defacements
ACM Transactions on Internet Technology (TOIT)
Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
OSDI'08 Proceedings of the 8th USENIX conference on Operating systems design and implementation
Host-based intrusion detection system
INES'10 Proceedings of the 14th international conference on Intelligent engineering systems
Role-based differentiation for insider detection algorithms
Proceedings of the 2010 ACM workshop on Insider threats
AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology
An effective intrusion detection method using optimal hybrid model of classifiers
Journal of Computational Methods in Sciences and Engineering - Special Supplement Issue in Section A and B: Selected Papers from the ISCA International Conference on Software Engineering and Data Engineering, 2009
Evolving boundary detector for anomaly detection
Expert Systems with Applications: An International Journal
Storage-Based Intrusion Detection
ACM Transactions on Information and System Security (TISSEC)
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
State-based network intrusion detection systems for SCADA protocols: a proof of concept
CRITIS'09 Proceedings of the 4th international conference on Critical information infrastructures security
Enhancing efficiency of intrusion prediction based on intelligent immune method
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Damage assessment and repair in attack resilient distributed database systems
Computer Standards & Interfaces
Using regression analysis to identify patterns of non-technical losses on power utilities
KES'10 Proceedings of the 14th international conference on Knowledge-based and intelligent information and engineering systems: Part I
Why did my detector do that?!: predicting keystroke-dynamics error rates
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
A queue model to detect DDos attacks
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
Web server protection by customized instruction set encoding
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Enhancing Intrusion Detection System with proximity information
International Journal of Security and Networks
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
Neural visualization of network traffic data for intrusion detection
Applied Soft Computing
LarvaStat: monitoring of statistical properties
RV'10 Proceedings of the First international conference on Runtime verification
Abstracting audit data for lightweight intrusion detection
ICISS'10 Proceedings of the 6th international conference on Information systems security
A sense of self for Unix processes
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Effective multimodel anomaly detection using cooperative negotiation
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
A two-tier system for web attack detection using linear discriminant method
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A prototype real-time intrusion-detection expert system
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
Exploring discrepancies in findings obtained with the KDD Cup '99 data set
Intelligent Data Analysis
The case for byzantine fault detection
HotDep'06 Proceedings of the Second conference on Hot topics in system dependability
Decision tree based learning and genetic based learning to detect network intrusions
SMO'05 Proceedings of the 5th WSEAS international conference on Simulation, modelling and optimization
Intrusion detection using neural based hybrid classification methods
Computer Networks: The International Journal of Computer and Telecommunications Networking
Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
On detecting active worms with varying scan rate
Computer Communications
Anomaly detection techniques for a web defacement monitoring service
Expert Systems with Applications: An International Journal
Proceedings of the 2010 Conference on Grand Challenges in Modeling & Simulation
Testing ensembles for intrusion detection: On the identification of mutated network scans
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
General tool-based approximation framework based on partial approximation of sets
RSFDGrC'11 Proceedings of the 13th international conference on Rough sets, fuzzy sets, data mining and granular computing
The Frog-Boiling Attack: Limitations of Secure Network Coordinate Systems
ACM Transactions on Information and System Security (TISSEC)
A distributed surveillance model for network security inspired by immunology
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Proceedings of the 4th ACM workshop on Security and artificial intelligence
On the Value of Coordination in Distributed Self-Adaptation of Intrusion Detection System
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 02
ICICS'11 Proceedings of the 13th international conference on Information and communications security
An anomaly intrusion detection approach using cellular neural networks
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Using static program analysis to aid intrusion detection
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Effective intrusion type identification with edit distance for HMM-Based anomaly detection system
PReMI'05 Proceedings of the First international conference on Pattern Recognition and Machine Intelligence
SCIDS: a soft computing intrusion detection system
IWDC'04 Proceedings of the 6th international conference on Distributed Computing
An intelligent agent-based framework for collaborative information security
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
IDEAL'05 Proceedings of the 6th international conference on Intelligent Data Engineering and Automated Learning
Intrusion detection of DoS/DDoS and probing attacks for web services
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
The feature selection and intrusion detection problems
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
Application of neural networks in network control and information security
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
A new unsupervised anomaly detection framework for detecting network attacks in real-time
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Detection of unknown dos attacks by kolmogorov-complexity fluctuation
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Traffic anomaly detection and characterization in the tunisian national university network
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
Network intrusion detection using statistical probability distribution
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Network anomaly detection based on clustering of sequence patterns
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
A neural network model for detection systems based on data mining and false errors
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Using data field to analyze network intrusions
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
A mobile phone malicious software detection model with behavior checker
HSI'05 Proceedings of the 3rd international conference on Human Society@Internet: web and Communication Technologies and Internet-Related Social Issues
Probabilistic inference strategy in distributed intrusion detection systems
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Model generalization and its implications on intrusion detection
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Intrusion detection system for securing geographical information system web servers
W2GIS'04 Proceedings of the 4th international conference on Web and Wireless Geographical Information Systems
Intrusion detection: introduction to intrusion detection and security information management
Foundations of Security Analysis and Design III
An efficient anomaly detection algorithm for vector-based intrusion detection systems
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Anomaly detection in computer security and an application to file system accesses
ISMIS'05 Proceedings of the 15th international conference on Foundations of Intelligent Systems
MEPIDS: multi-expression programming for intrusion detection system
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
An electronic reconfigurable neural architecture for intrusion detection
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
A reinforcement learning approach for host-based intrusion detection using sequences of system calls
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part I
Detecting anomalous network traffic with combined fuzzy-based approaches
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part II
A learning-based approach to the detection of SQL attacks
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
On random-inspection-based intrusion detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
User modelling for exclusion and anomaly detection: a behavioural intrusion detection system
UMAP'10 Proceedings of the 18th international conference on User Modeling, Adaptation, and Personalization
Unsupervised anomaly detection based n an evolutionary artificial immune network
EC'05 Proceedings of the 3rd European conference on Applications of Evolutionary Computing
RIDA: robust intrusion detection in ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Building an intrusion detection system based on support vector machine and genetic algorithm
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
A novel intrusion detection method for mobile ad hoc networks
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
iTrust'05 Proceedings of the Third international conference on Trust Management
Behavior-based model of detection and prevention of intrusions in computer networks
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Towards a theory of intrusion detection
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
SPIDER: an autonomic computing approach to database security management
SDM'06 Proceedings of the Third VLDB international conference on Secure Data Management
Towards an information-theoretic framework for analyzing intrusion detection systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A model for detecting "global footprint anomalies" in a grid environment
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Anomaly detector performance evaluation using a parameterized environment
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
A dead-lock free self-healing algorithm for distributed transactional processes
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Securing agents against malicious host in an intrusion detection system
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Predictive pattern matching for scalable network intrusion detection
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
A generic model and architecture for automated auditing
DSOM'05 Proceedings of the 16th IFIP/IEEE Ambient Networks international conference on Distributed Systems: operations and Management
Web traffic profiling and characterization
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Higher dependability and security for mobile applications
SPC'06 Proceedings of the Third international conference on Security in Pervasive Computing
Reliable client accounting for P2P-infrastructure hybrids
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Review: Artificial intelligence approaches to network management: recent advances and a survey
Computer Communications
Anomaly detection methods in wired networks: a survey and taxonomy
Computer Communications
Self-adaptive and dynamic clustering for online anomaly detection
Expert Systems with Applications: An International Journal
Intrusion detection through learning behavior model
Computer Communications
Intrusion detection with mobile agents
Computer Communications
Intrusion detection techniques and approaches
Computer Communications
A hybrid network intrusion detection system using simplified swarm optimization (SSO)
Applied Soft Computing
Network intrusion detection system: a machine learning approach
Intelligent Decision Technologies
Computer Methods and Programs in Biomedicine
Learning from socio-economic characteristics of IP geo-locations for cybercrime prediction
International Journal of Business Intelligence and Data Mining
A survey of anomaly intrusion detection techniques
Journal of Computing Sciences in Colleges
A proposed model for data warehouse user behaviour using intrusion detection system
ACM SIGSOFT Software Engineering Notes
Review: Intrusion detection system: A comprehensive review
Journal of Network and Computer Applications
Information Systems and e-Business Management
Toward a more practical unsupervised anomaly detection system
Information Sciences: an International Journal
Review Article: RePIDS: A multi tier Real-time Payload-based Intrusion Detection System
Computer Networks: The International Journal of Computer and Telecommunications Networking
A bigData platform for analytics on access control policies and logs
Proceedings of the 18th ACM symposium on Access control models and technologies
The Journal of Supercomputing
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Information Sciences: an International Journal
Detection of HTTP-GET attack with clustering and information theoretic measurements
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Moving steganography and steganalysis from the laboratory into the real world
Proceedings of the first ACM workshop on Information hiding and multimedia security
A taint marking approach to confidentiality violation detection
AISC '12 Proceedings of the Tenth Australasian Information Security Conference - Volume 125
Administrative evaluation of intrusion detection system
Proceedings of the 2nd annual conference on Research in information technology
Engineering Applications of Artificial Intelligence
Performance analysis of machine learning algorithms for intrusion detection in MANETs
International Journal of Wireless and Mobile Computing
Approximation of sets based on partial covering
Transactions on Rough Sets XVI
A methodological overview on anomaly detection
DataTraffic Monitoring and Analysis
IDS false alarm reduction using an instance selection KNN-memetic algorithm
International Journal of Metaheuristics
A distance sum-based hybrid method for intrusion detection
Applied Intelligence
Human perspective to anomaly detection for cybersecurity
Journal of Intelligent Information Systems
Hi-index | 0.06 |
A model of a real-time intrusion-detection expert system capable of detecting break-ins, penetrations, and other forms of computer abuse is described. The model is based on the hypothesis that security violations can be detected by monitoring a system's audit records for abnormal patterns of system usage. The model includes profiles for representing the behavior of subjects with respect to objects in terms of metrics and statistical models, and rules for acquiring knowledge about this behavior from audit records and for detecting anomalous behavior. The model is independent of any particular system, application environment, system vulnerability, or type of intrusion, thereby providing a framework for a general-purpose intrusion-detection expert system.