Abstraction-based intrusion detection in distributed environments
ACM Transactions on Information and System Security (TISSEC)
The utilization of artificial intelligence in a hybrid intrusion detection system
SAICSIT '02 Proceedings of the 2002 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
Constructing attack scenarios through correlation of intrusion alerts
Proceedings of the 9th ACM conference on Computer and communications security
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
DEVS Simulation of distributed intrusion detection systems
Transactions of the Society for Computer Simulation International - Recent advances in DEVS Methodology--part I
Modeling and Simulation for Detecting a Distributed Denial of Service Attack
AI '02 Proceedings of the 15th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Simulation of Network Security with Collaboration among IDS Models
AI '01 Proceedings of the 14th Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
Mobile Agent-Based Misuse Intrusion Detection Rule Propagation Model for Distributed System
EurAsia-ICT '02 Proceedings of the First EurAsian Conference on Information and Communication Technology
Agent-Based Model of Computer Network Security System: A Case Study
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Mining intrusion detection alarms for actionable knowledge
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Integrated Access Control and Intrusion Detection for Web Servers
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Decision tree classifiers for computer intrusion detection
Real-time system security
Enhancing byte-level network intrusion detection signatures with context
Proceedings of the 10th ACM conference on Computer and communications security
Clustering intrusion detection alarms to support root cause analysis
ACM Transactions on Information and System Security (TISSEC)
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Techniques and tools for analyzing intrusion alerts
ACM Transactions on Information and System Security (TISSEC)
An approach to implement a network intrusion detection system using genetic algorithms
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Web Dragons: Inside the Myths of Search Engine Technology
Web Dragons: Inside the Myths of Search Engine Technology
Analysis of Computer Intrusions Using Sequences of Function Calls
IEEE Transactions on Dependable and Secure Computing
Applying a data mining method for intrusion detection
CompSysTech '07 Proceedings of the 2007 international conference on Computer systems and technologies
ATLANTIDES: an architecture for alert verification in network intrusion detection systems
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
ULISSE, a network intrusion detection system
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
Proceedings of the 4th ACM workshop on Quality of protection
Analyzing Business Continuity through a Multi-layers Model
BPM '08 Proceedings of the 6th International Conference on Business Process Management
A Semi-Autonomic Framework for Intrusion Tolerance in Heterogeneous Networks
IWSOS '08 Proceedings of the 3rd International Workshop on Self-Organizing Systems
WI-IAT '08 Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology - Volume 02
A real-time intrusion detection algorithm for network security
AIC'08 Proceedings of the 8th conference on Applied informatics and communications
A hybrid intrusion detection system design for computer network security
Computers and Electrical Engineering
Security management of mutually trusted domains through cooperation of defensive technologies
International Journal of Network Management
Selecting and Improving System Call Models for Anomaly Detection
DIMVA '09 Proceedings of the 6th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Intrusion detection system based on partially ordered events and patterns
INES'09 Proceedings of the IEEE 13th international conference on Intelligent Engineering Systems
Developing insider attack detection model: a grounded approach
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
The architecture of SAAIDS: Secured Autonomous Agent-based Intrusion Detection System
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Anomaly detection of masquerders based upon typing biometrics and probabilistic neural network
Journal of Computing Sciences in Colleges
Analyzing intensive intrusion alerts via correlation
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Performance adaptation in real-time intrusion detection systems
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Cost-effective IDS operating scheme in MANETs
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
Discovering emerging patterns for anomaly detection in network connection data
ISMIS'08 Proceedings of the 17th international conference on Foundations of intelligent systems
A principal components analysis neural gas algorithm for anomalies clustering
WSEAS TRANSACTIONS on SYSTEMS
Host-based intrusion detection system
INES'10 Proceedings of the 14th international conference on Intelligent engineering systems
Architecture of distributed intrusion detection system based on anomalies
INES'10 Proceedings of the 14th international conference on Intelligent engineering systems
Anomaly intrusion detection based upon an artificial immunity model
Proceedings of the 49th Annual Southeast Regional Conference
Towards a cooperative intrusion detection system for cognitive radio networks
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Weighted intra-transactional rule mining for database intrusion detection
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
An enhanced support vector machine model for intrusion detection
RSKT'06 Proceedings of the First international conference on Rough Sets and Knowledge Technology
FADS: a fuzzy anomaly detection system
RSKT'06 Proceedings of the First international conference on Rough Sets and Knowledge Technology
Application of fuzzy logic for distributed intrusion detection
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Distributed security agent modeling in the policy-based networking
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
Intrusion detection based on fuzzy neural networks
ISNN'06 Proceedings of the Third international conference on Advances in Neural Networks - Volume Part III
A development of intrusion detection and protection system using netfilter framework
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
Learning intrusion detection: supervised or unsupervised?
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
IDS false alarm filtering using KNN classifier
WISA'04 Proceedings of the 5th international conference on Information Security Applications
Intrusion detection system using sequence and set preserving metric
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
A fast host-based intrusion detection system using rough set theory
Transactions on Rough Sets IV
Advanced reaction using risk assessment in intrusion detection systems
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
A game theory-based surveillance mechanism against suspicious insiders in MANETs
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Using sub-sequence information with kNN for classification of sequential data
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
A fuzzy anomaly detection system
WISI'06 Proceedings of the 2006 international conference on Intelligence and Security Informatics
Security architecture testing using IDS-a case study
Computer Communications
Intrusion detection techniques and approaches
Computer Communications
Mixed-Strategy game based trust management for clustered wireless sensor networks
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
A survey of anomaly intrusion detection techniques
Journal of Computing Sciences in Colleges
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Anomaly intrusion detection based on PLS feature extraction and core vector machine
Knowledge-Based Systems
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication
Administrative evaluation of intrusion detection system
Proceedings of the 2nd annual conference on Research in information technology
SHAPE--an approach for self-healing and self-protection in complex distributed networks
The Journal of Supercomputing
Hi-index | 0.00 |