Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
IEEE Transactions on Computers
A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Intrusion Detection Using Variable-Length Audit Trail Patterns
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Using Rule-Based Activity Descriptions to Evaluate Intrusion-Detection Systems
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
BlueBoX: A policy-driven, host-based intrusion detection system
ACM Transactions on Information and System Security (TISSEC)
An empirical analysis of NATE: Network Analysis of Anomalous Traffic Events
Proceedings of the 2002 workshop on New security paradigms
Decision tree classifiers for computer intrusion detection
Real-time system security
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
A taxonomy of DDoS attack and DDoS defense mechanisms
ACM SIGCOMM Computer Communication Review
Cost effective management frameworks for intrusion detection systems
Journal of Computer Security
Combining static analysis and runtime monitoring to counter SQL-injection attacks
WODA '05 Proceedings of the third international workshop on Dynamic analysis
A Machine Learning Evaluation of an Artificial Immune System
Evolutionary Computation
Description of bad-signatures for network intrusion detection
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
Clustering and indexing of experience sequences for popularity-driven recommendations
Proceedings of the 3rd ACM workshop on Continuous archival and retrival of personal experences
A System Architecture for Computer Intrusion Detection
Information-Knowledge-Systems Management
Network intrusion detection in covariance feature space
Pattern Recognition
Detecting malicious java code using virtual machine auditing
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
ATLANTIDES: an architecture for alert verification in network intrusion detection systems
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
A Case-Based Approach to Anomaly Intrusion Detection
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
Intrusion Detection as Passive Testing: Linguistic Support with TTCN-3 (Extended Abstract)
DIMVA '07 Proceedings of the 4th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Towards a taxonomy of network scanning techniques
Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology
Hybrid Intrusion Forecasting Framework for Early Warning System
IEICE - Transactions on Information and Systems
Proceedings of the International Conference on Advances in Computing, Communication and Control
Analysis of Data Dependency Based Intrusion Detection System
Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security XXIII
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
Dynamic policy model for target based intrusion detection system
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human
Semantic integrity in large-scale online simulations
ACM Transactions on Internet Technology (TOIT)
Intelligence system approach for computer network security
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Undermining an anomaly-based intrusion detection system using common exploits
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Content-based methodology for anomaly detection on the web
AWIC'03 Proceedings of the 1st international Atlantic web intelligence conference on Advances in web intelligence
Self-protection for distributed component-based applications
SSS'06 Proceedings of the 8th international conference on Stabilization, safety, and security of distributed systems
A reliable context-aware intrusion tolerant system
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Policy-based security configuration management application to intrusion detection and prevention
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Developing cyberspace data understanding: using CRISP-DM for host-based IDS feature mining
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
gPath: a game-theoretic path selection algorithm to protect Tor's anonymity
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Exploring discrepancies in findings obtained with the KDD Cup '99 data set
Intelligent Data Analysis
Feasibility of one-class-SVM for anomaly detection in telecommunication network
CIMMACS'07 Proceedings of the 6th WSEAS international conference on Computational intelligence, man-machine systems and cybernetics
A neural model in intrusion detection systems
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
A neural network model for detection systems based on data mining and false errors
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Defending grids against intrusions
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Addressing malicious code in COTS: a protection framework
ICCBSS'05 Proceedings of the 4th international conference on COTS-Based Software Systems
Environment-sensitive intrusion detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
A WS-based infrastructure for integrating intrusion detection systems in large-scale environments
ODBASE'06/OTM'06 Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I
Behavior-based model of detection and prevention of intrusions in computer networks
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Towards an information-theoretic framework for analyzing intrusion detection systems
ESORICS'06 Proceedings of the 11th European conference on Research in Computer Security
A multi-agent cooperative model and system for integrated security monitoring
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
ESOA'05 Proceedings of the Third international conference on Engineering Self-Organising Systems
Towards a multiagent-based distributed intrusion detection system using data mining approaches
ADMI'11 Proceedings of the 7th international conference on Agents and Data Mining Interaction
Envisioning grid vulnerabilities: multi-dimensional visualization for electrical grid planning
Proceedings of the International Working Conference on Advanced Visual Interfaces
Intrusion detection through learning behavior model
Computer Communications
Security architecture testing using IDS-a case study
Computer Communications
Intrusion detection techniques and approaches
Computer Communications
Building agents for rule-based intrusion detection system
Computer Communications
Application of self-adaptive techniques to federated authorization models
Proceedings of the 34th International Conference on Software Engineering
Learning from socio-economic characteristics of IP geo-locations for cybercrime prediction
International Journal of Business Intelligence and Data Mining
Review: Intrusion detection system: A comprehensive review
Journal of Network and Computer Applications
A negative selection approach to intrusion detection
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
Performance analysis of wireless intrusion detection systems
IDCS'12 Proceedings of the 5th international conference on Internet and Distributed Computing Systems
Behavior analysis of long-term cyber attacks in the darknet
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Information Sciences: an International Journal
Game theory meets network security and privacy
ACM Computing Surveys (CSUR)
IDS false alarm reduction using an instance selection KNN-memetic algorithm
International Journal of Metaheuristics
Hi-index | 0.05 |