Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Experiences with Specification-Based Intrusion Detection
RAID '00 Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection
A Synthetic Fraud Data Generation Methodology
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis
ISC '01 Proceedings of the 4th International Conference on Information Security
Learning nonstationary models of normal network traffic for detecting novel attacks
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Decision tree classifiers for computer intrusion detection
Real-time system security
Enhancing byte-level network intrusion detection signatures with context
Proceedings of the 10th ACM conference on Computer and communications security
Learning Rules for Anomaly Detection of Hostile Network Traffic
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Network traffic anomaly detection based on packet bytes
Proceedings of the 2003 ACM symposium on Applied computing
Generating realistic workloads for network intrusion detection systems
WOSP '04 Proceedings of the 4th international workshop on Software and performance
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
Incremental learning with partial instance memory
Artificial Intelligence
Measuring normality in HTTP traffic for anomaly-based intrusion detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
MORPHEUS: motif oriented representations to purge hostile events from unlabeled sequences
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Home-centric visualization of network traffic for security administration
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
IP covert timing channels: design and detection
Proceedings of the 11th ACM conference on Computer and communications security
A Management Perspective on Risk of Security Threats to Information Systems
Information Technology and Management
Preventing race condition attacks on file-systems
Proceedings of the 2005 ACM symposium on Applied computing
A Novel Fuzzy Anomaly Detection Algorithm Based on Artificial Immune System
HPCASIA '05 Proceedings of the Eighth International Conference on High-Performance Computing in Asia-Pacific Region
An Active Splitter Architecture for Intrusion Detection and Prevention
IEEE Transactions on Dependable and Secure Computing
Simulating application level self-similar network traffic using hybrid heavy-tailed distributions
Proceedings of the 43rd annual Southeast regional conference - Volume 2
A dynamic data mining technique for intrusion detection systems
Proceedings of the 43rd annual Southeast regional conference - Volume 2
A latent class modeling approach to detect network intrusion
Computer Communications
Learning DFA representations of HTTP for protecting web applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Evaluating indirect and direct classification techniques for network intrusion detection
Intelligent Data Analysis
A three-tier IDS via data mining approach
Proceedings of the 3rd annual ACM workshop on Mining network data
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
Weighting versus pruning in rule validation for detecting network and host anomalies
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
ATLANTIDES: an architecture for alert verification in network intrusion detection systems
LISA'07 Proceedings of the 21st conference on Large Installation System Administration Conference
DNCOCO'07 Proceedings of the 9th WSEAS International Conference on Data Networks, Communications, Computers
Indirect classification approaches: a comparative study in network intrusion detection
International Journal of Computer Applications in Technology
Classification of intrusion detection alerts using abstaining classifiers
Intelligent Data Analysis
Novel hardware-based approaches for intrusion detection
ICCOM'05 Proceedings of the 9th WSEAS International Conference on Communications
Autonomous decision on intrusion detection with trained BDI agents
Computer Communications
Linear-Time Computation of Similarity Measures for Sequential Data
The Journal of Machine Learning Research
A Hybrid Model for Immune Inspired Network Intrusion Detection
ICARIS '08 Proceedings of the 7th international conference on Artificial Immune Systems
Application of Wavelet Packet Transform to Network Anomaly Detection
NEW2AN '08 / ruSMART '08 Proceedings of the 8th international conference, NEW2AN and 1st Russian Conference on Smart Spaces, ruSMART on Next Generation Teletraffic and Wired/Wireless Advanced Networking
The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks
RAID '08 Proceedings of the 11th international symposium on Recent Advances in Intrusion Detection
Evaluating the utility of anonymized network traces for intrusion detection
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Boosting Web Intrusion Detection Systems by Inferring Positive Signatures
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part II on On the Move to Meaningful Internet Systems
Enhancing network based intrusion detection for imbalanced data
International Journal of Knowledge-based and Intelligent Engineering Systems
McPAD: A multiple classifier system for accurate payload-based anomaly detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
A hybrid intrusion detection system design for computer network security
Computers and Electrical Engineering
IP Packet Size Entropy-Based Scheme for Detection of DoS/DDoS Attacks
IEICE - Transactions on Information and Systems
A Regression Method to Compare Network Data and Modeling Data Using Generalized Additive Model
Information Security Applications
Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming
EvoWorkshops '09 Proceedings of the EvoWorkshops 2009 on Applications of Evolutionary Computing: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG
Spatio-temporal network anomaly detection by assessing deviations of empirical measures
IEEE/ACM Transactions on Networking (TON)
On achieving good operating points on an ROC plane using stochastic anomaly score prediction
Proceedings of the 16th ACM conference on Computer and communications security
Towards systematic traffic annotation
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies
A cascade architecture for DoS attacks detection based on the wavelet transform
Journal of Computer Security
Aggregating performance metrics for classifier evaluation
IRI'09 Proceedings of the 10th IEEE international conference on Information Reuse & Integration
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
A Labeled Data Set for Flow-Based Intrusion Detection
IPOM '09 Proceedings of the 9th IEEE International Workshop on IP Operations and Management
Alarm clustering for intrusion detection systems in computer networks
Engineering Applications of Artificial Intelligence
An efficient network intrusion detection
Computer Communications
P2P-AIS: a P2P artificial immune systems architecture for detecting DDoS flooding attacks
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Applying Kernel methods to anomaly based intrusion detection systems
GIIS'09 Proceedings of the Second international conference on Global Information Infrastructure Symposium
Analysis of the 1999 DARPA/Lincoln laboratory IDS evaluation data with NetADHICT
CISDA'09 Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applications
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Information Sciences: an International Journal
The Journal of Machine Learning Research
Intrusion detection in computer networks with neural and fuzzy classifiers
ICANN/ICONIP'03 Proceedings of the 2003 joint international conference on Artificial neural networks and neural information processing
Comparing anomaly detection techniques for HTTP
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
ELICIT: a system for detecting insiders who violate need-to-know
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
On the use of different statistical tests for alert correlation: short paper
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Using unsupervised learning for network alert correlation
Canadian AI'08 Proceedings of the Canadian Society for computational studies of intelligence, 21st conference on Advances in artificial intelligence
A two-layered anomaly detection technique based on multi-modal flow behavior models
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Optimizing network anomaly detection scheme using instance selection mechanism
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Embedding a covert channel in active network connections
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Intrusion detection using GSAD model for HTTP traffic on web services
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
On the use of compression algorithms for network anomaly detection
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
HMM-web: a framework for the detection of attacks against web applications
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Policy-based security configuration management application to intrusion detection and prevention
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A principal components analysis neural gas algorithm for anomalies clustering
WSEAS TRANSACTIONS on SYSTEMS
Payload modeling for network intrusion detection systems
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Routing through an integrated communication and social network
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A cost-based analysis of intrusion detection system configuration under active or passive response
Decision Support Systems
KIDS: keyed intrusion detection system
DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
Resource-sensitive intrusion detection models for network traffic
HASE'04 Proceedings of the Eighth IEEE international conference on High assurance systems engineering
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
A queue model to detect DDos attacks
CTS'05 Proceedings of the 2005 international conference on Collaborative technologies and systems
Proceedings of the 6th International COnference
Accuracy improving guidelines for network anomaly detection systems
Journal in Computer Virology
Effective multimodel anomaly detection using cooperative negotiation
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Joint network-host based malware detection using information-theoretic tools
Journal in Computer Virology
Exploring discrepancies in findings obtained with the KDD Cup '99 data set
Intelligent Data Analysis
Detection of TCP attacks using SOM with fast nearest-neighbor search
NN'05 Proceedings of the 6th WSEAS international conference on Neural networks
Mutual information-based feature selection for intrusion detection systems
Journal of Network and Computer Applications
TVi: a visual querying system for network monitoring and anomaly detection
Proceedings of the 8th International Symposium on Visualization for Cyber Security
Fast, memory-efficient regular expression matching with NFA-OBDDs
Computer Networks: The International Journal of Computer and Telecommunications Networking
Tunable immune detectors for behaviour-based network intrusion detection
ICARIS'11 Proceedings of the 10th international conference on Artificial immune systems
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
Detecting, validating and characterizing computer infections in the wild
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Analysis of neural networks usage for detection of a new attack in IDS
Annales UMCS, Informatica
Proposals on assessment environments for anomaly-based network intrusion detection systems
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Efficient algorithms for similarity measures over sequential data: a look beyond kernels
DAGM'06 Proceedings of the 28th conference on Pattern Recognition
A neural model in intrusion detection systems
ICANN'06 Proceedings of the 16th international conference on Artificial Neural Networks - Volume Part II
Combining wavelet analysis and information theory for network anomaly detection
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Redesign and implementation of evaluation dataset for intrusion detection system
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Detecting unknown network attacks using language models
DIMVA'06 Proceedings of the Third international conference on Detection of Intrusions and Malware & Vulnerability Assessment
Intrusion detection of DoS/DDoS and probing attacks for web services
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Uncovering relations between traffic classifiers and anomaly detectors via graph theory
TMA'10 Proceedings of the Second international conference on Traffic Monitoring and Analysis
Applying genetic programming to evolve learned rules for network anomaly detection
ICNC'05 Proceedings of the First international conference on Advances in Natural Computation - Volume Part III
Learning intrusion detection: supervised or unsupervised?
ICIAP'05 Proceedings of the 13th international conference on Image Analysis and Processing
Improving the performance of signature-based network intrusion detection sensors by multi-threading
WISA'04 Proceedings of the 5th international conference on Information Security Applications
TCPtransform: property-oriented TCP traffic transformation
DIMVA'05 Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability Assessment
Anomalous payload-based worm detection and signature generation
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Effectiveness evaluation of data mining based IDS
ICDM'06 Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
An evolutionary multi-agent approach to anomaly detection and cyber defense
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Enhanced network traffic anomaly detector
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
International Journal of Sensor Networks
Anomaly detection methods in wired networks: a survey and taxonomy
Computer Communications
An experimental comparison of real and artificial deception using a deception generation model
Decision Support Systems
Mining Concept Drifting Network Traffic in Cloud Computing Environments
CCGRID '12 Proceedings of the 2012 12th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (ccgrid 2012)
Automatic network intrusion detection: Current techniques and open issues
Computers and Electrical Engineering
Methods for testing network-intrusion detection systems
Scientific and Technical Information Processing
Generating simplified regular expression signatures for polymorphic worms
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Improving an SVD-based combination strategy of anomaly detectors for traffic labelling
Proceedings of the Asian Internet Engineeering Conference
N-Gram against the machine: on the feasibility of the n-gram network analysis for binary protocols
RAID'12 Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses
An ecological approach to anomaly detection: the EIA model
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
FireCol: a collaborative protection network for the detection of flooding DDoS attacks
IEEE/ACM Transactions on Networking (TON)
Automated Anomaly Detector Adaptation using Adaptive Threshold Tuning
ACM Transactions on Information and System Security (TISSEC)
Divided two-part adaptive intrusion detection system
Wireless Networks
Review Article: RePIDS: A multi tier Real-time Payload-based Intrusion Detection System
Computer Networks: The International Journal of Computer and Telecommunications Networking
The Journal of Supercomputing
Administrative evaluation of intrusion detection system
Proceedings of the 2nd annual conference on Research in information technology
Proceedings of the South African Institute for Computer Scientists and Information Technologists Conference
A novel threshold-based scan detection method using genetic algorithm
Proceedings of the 6th International Conference on Security of Information and Networks
Information Sciences: an International Journal
Active flows in diagnostic of troubleshooting on backbone links
Journal of High Speed Networks
Hi-index | 0.00 |