Mining association rules between sets of items in large databases
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data
The KDD process for extracting useful knowledge from volumes of data
Communications of the ACM
Discovery of Frequent Episodes in Event Sequences
Data Mining and Knowledge Discovery
Data Mining and Knowledge Discovery
Journal of Artificial Intelligence Research
Proceedings of the 14th international conference on Supercomputing
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Adaptive Intrusion Detection: A Data Mining Approach
Artificial Intelligence Review - Issues on the application of data mining
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Mining system audit data: opportunities and challenges
ACM SIGMOD Record
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
IEEE Transactions on Computers
Distributed Data Mining in Credit Card Fraud Detection
IEEE Intelligent Systems
Mining TCP/IP Traffic for Network Intrusion Detection by Using a Distributed Genetic Algorithm
ECML '00 Proceedings of the 11th European Conference on Machine Learning
Evolutive Modeling of TCP/IP Network Traffic for Intrusion Detection
Real-World Applications of Evolutionary Computing, EvoWorkshops 2000: EvoIASP, EvoSCONDI, EvoTel, EvoSTIM, EvoROB, and EvoFlight
Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility
ACM SIGKDD Explorations Newsletter
Algorithms for mining system audit data
Data mining, rough sets and granular computing
Anomaly detection of web-based attacks
Proceedings of the 10th ACM conference on Computer and communications security
PSoup: a system for streaming queries over streaming data
The VLDB Journal — The International Journal on Very Large Data Bases
Unsupervised learning techniques for an intrusion detection system
Proceedings of the 2004 ACM symposium on Applied computing
On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms
Data Mining and Knowledge Discovery
A holistic approach to service survivability
Proceedings of the 2003 ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security
A framework of cooperating intrusion detection based on clustering analysis and expert system
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Some Issues in Solving the Anomaly Detection Problem using Immunological Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 6 - Volume 07
An internet routing forensics framework for discovering rules of abnormal BGP events
ACM SIGCOMM Computer Communication Review
A scalable decision tree system and its application in pattern recognition and intrusion detection
Decision Support Systems
Anomalous system call detection
ACM Transactions on Information and System Security (TISSEC)
Behavior-based modeling and its application to Email analysis
ACM Transactions on Internet Technology (TOIT)
Anomaly detection in TCP/IP networks using immune systems paradigm
Computer Communications
Evaluating indirect and direct classification techniques for network intrusion detection
Intelligent Data Analysis
A comparative evaluation of two algorithms for Windows Registry Anomaly Detection
Journal of Computer Security
Building intrusion pattern miner for Snort network intrusion detection system
Journal of Systems and Software
Streaming queries over streaming data
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Network traffic analysis using singular value decomposition and multiscale transforms
Information Sciences: an International Journal
A Tabu Clustering algorithm for Intrusion Detection
Intelligent Data Analysis
Why machine learning algorithms fail in misuse detection on KDD intrusion detection data set
Intelligent Data Analysis
A user-oriented ontology-based approach for network intrusion detection
Computer Standards & Interfaces
Agent-oriented network intrusion detection system using data mining approaches
International Journal of Agent-Oriented Software Engineering
Indirect classification approaches: a comparative study in network intrusion detection
International Journal of Computer Applications in Technology
An adaptive expert system approach for intrusion detection
International Journal of Security and Networks
Ontology-Based Fraud Detection
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007
Traffic Data Preparation for a Hybrid Network IDS
HAIS '08 Proceedings of the 3rd international workshop on Hybrid Artificial Intelligence Systems
IDS Based on Bio-inspired Models
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
A Data Mining Framework for Building Intrusion Detection Models Based on IPv6
ISA '09 Proceedings of the 3rd International Conference and Workshops on Advances in Information Security and Assurance
An efficient network intrusion detection
Computer Communications
International Journal of Information and Computer Security
Measuring similarity in feature space of knowledge entailed by two separate rule sets
Knowledge-Based Systems
Detecting malicious software by monitoring anomalous windows registry accesses
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Swaddler: an approach for the anomaly-based detection of state violations in web applications
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Intrusion detection at packet level by unsupervised architectures
IDEAL'07 Proceedings of the 8th international conference on Intelligent data engineering and automated learning
Decision tree based learning and genetic based learning to detect network intrusions
SMO'05 Proceedings of the 5th WSEAS international conference on Simulation, modelling and optimization
Improved realtime intrusion detection system
ICONIP'06 Proceedings of the 13th international conference on Neural information processing - Volume Part III
Machine learning approach for IP-flow record anomaly detection
NETWORKING'11 Proceedings of the 10th international IFIP TC 6 conference on Networking - Volume Part I
Practical real-time intrusion detection using machine learning approaches
Computer Communications
Intrusion detection based on ART and artificial immune network clustering
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part II
Improved kernel based intrusion detection system
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
Using static program analysis to aid intrusion detection
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Incremental fuzzy decision tree-based network forensic system
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Machine learning approach to realtime intrusion detection system
AI'05 Proceedings of the 18th Australian Joint conference on Advances in Artificial Intelligence
An ontology-based network intrusion detection system: a user-oriented approach
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A database of anomalous traffic for assessing profile based IDS
TMA'10 Proceedings of the Second international conference on Traffic Monitoring and Analysis
Two-tier based intrusion detection system
FSKD'05 Proceedings of the Second international conference on Fuzzy Systems and Knowledge Discovery - Volume Part II
Network intrusion detection using wavelet analysis
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
Active host information-based abnormal IP address detection
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
A genetic SOM clustering algorithm for intrusion detection
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Function and service pattern analysis for facilitating the reconfiguration of collaboration systems
Computers and Industrial Engineering
Preprocessing unbalanced data using support vector machine
Decision Support Systems
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |