Discussion: strike back: offensive actions in information warfare
Proceedings of the 1999 workshop on New security paradigms
Data dependency based logging for defensive information warfare
SAC '00 Proceedings of the 2000 ACM symposium on Applied computing - Volume 1
ACM Transactions on Information and System Security (TISSEC)
STATL: an attack language for state-based intrusion detection
Journal of Computer Security
Using Checksums to Detect Data Corruption
EDBT '00 Proceedings of the 7th International Conference on Extending Database Technology: Advances in Database Technology
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Designing a Web of Highly-Configurable Intrusion Detection Sensors
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
Multi-Agent based Intrusion Detection Architecture
ICCNMC '01 Proceedings of the 2001 International Conference on Computer Networks and Mobile Computing (ICCNMC'01)
Designing and implementing a family of intrusion detection systems
Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering
Integrating cooperative engagement capability into network-centric information system security
Current security management & Ethical issues of information technology
Generating realistic workloads for network intrusion detection systems
WOSP '04 Proceedings of the 4th international workshop on Software and performance
Testing network-based intrusion detection signatures using mutant exploits
Proceedings of the 11th ACM conference on Computer and communications security
A Comprehensive Approach to Intrusion Detection Alert Correlation
IEEE Transactions on Dependable and Secure Computing
Application of SVM and ANN for intrusion detection
Computers and Operations Research
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
A System Architecture for Computer Intrusion Detection
Information-Knowledge-Systems Management
Indirect classification approaches: a comparative study in network intrusion detection
International Journal of Computer Applications in Technology
International Journal of Information and Computer Security
Evaluation of Intrusion Detection Systems Under a Resource Constraint
ACM Transactions on Information and System Security (TISSEC)
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model
Information Security Applications
Intrusion detection with OMNeT++
Proceedings of the 2nd International Conference on Simulation Tools and Techniques
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
Information Sciences: an International Journal
Adaptive agents applied to intrusion detection
CEEMAS'03 Proceedings of the 3rd Central and Eastern European conference on Multi-agent systems
Intrusion detection in computer networks with neural and fuzzy classifiers
ICANN/ICONIP'03 Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing
Integrated "mixed" networks security monitoring: a proposed framework
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Accuracy improving guidelines for network anomaly detection systems
Journal in Computer Virology
A neural model in intrusion detection systems
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
Development of an attack packet generator applying an NP to the intelligent APS
KES'06 Proceedings of the 10th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
A database of anomalous traffic for assessing profile based IDS
TMA'10 Proceedings of the Second international conference on Traffic Monitoring and Analysis
An electronic reconfigurable neural architecture for intrusion detection
IWINAC'05 Proceedings of the First international work-conference on the Interplay Between Natural and Artificial Computation conference on Artificial Intelligence and Knowledge Engineering Applications: a bioinspired approach - Volume Part II
A robust approach for multivariate binary vectors clustering and feature selection
ICONIP'11 Proceedings of the 18th international conference on Neural Information Processing - Volume Part II
Methods for testing network-intrusion detection systems
Scientific and Technical Information Processing
Divided two-part adaptive intrusion detection system
Wireless Networks
Administrative evaluation of intrusion detection system
Proceedings of the 2nd annual conference on Research in information technology
Hi-index | 48.22 |