Passive visual fingerprinting of network attack tools
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
Scatter (and other) plots for visualizing user profiling data and network traffic
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security
PRISM: A Preventive and Risk-Reducing Integrated Security Management Model Using Security Label
The Journal of Supercomputing
Proceedings of the 2005 ACM symposium on Applied computing
A three-tier IDS via data mining approach
Proceedings of the 3rd annual ACM workshop on Mining network data
Employing Latent Dirichlet Allocation for fraud detection in telecommunications
Pattern Recognition Letters
An adaptive expert system approach for intrusion detection
International Journal of Security and Networks
Existence Plots: A Low-Resolution Time Series for Port Behavior Analysis
VizSec '08 Proceedings of the 5th international workshop on Visualization for Computer Security
Nonparametric density estimation of streaming data using orthogonal series
Computational Statistics & Data Analysis
International Journal of Information and Computer Security
Neural visualization of network traffic data for intrusion detection
Applied Soft Computing
Comparison of soft-computing techniques for classification of intrusion-detection
MMES'10 Proceedings of the 2010 international conference on Mathematical models for engineering science
Testing ensembles for intrusion detection: On the identification of mutated network scans
CISIS'11 Proceedings of the 4th international conference on Computational intelligence in security for information systems
Interactive visualization for network and port scan detection
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
MOVICAB-IDS: visual analysis of network traffic data streams for intrusion detection
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
RT-MOVICAB-IDS: Addressing real-time intrusion detection
Future Generation Computer Systems
idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining
Information Sciences: an International Journal
Hi-index | 0.00 |
From the Publisher:"This book covers the basic statistical and analytical techniques of computer intrusion detection. It is aimed at both statisticians looking to become involved in the data analysis aspects of computer security and computer scientists looking to expand their toolbox of techniques for detecting intruders." "The book is self-contained, assuring no expertise in either computer security or statistics. It begins with a description of the basics of TCP/IP, followed by chapters dealing with network traffic analysis, network monitoring for intrusion detection, host-based intrusion detection, and computer viruses and other malicious code. Each section develops the necessary tools as needed. There is extensive discussion of visualization as it relates to network data and intrusion detection. The book also contains an extensive bibliography covering the statistical, machine learning, and pattern recognition literature related to network monitoring and intrusion detection."--BOOK JACKET.