IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Testing and evaluating computer intrusion detection systems
Communications of the ACM
The 1999 DARPA off-line intrusion detection evaluation
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue on recent advances in intrusion detection systems
Network Intrusion Detection: An Analyst's Handbook
Network Intrusion Detection: An Analyst's Handbook
Selection Criteria for Intrusion Detection Systems
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Specialized Hardware for Deep Network Packet Filtering
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
Fusion of multiple classifiers for intrusion detection in computer networks
Pattern Recognition Letters
Network intrusion visualization with NIVA, an intrusion detection visual and haptic analyzer
Information Visualization
Autonomous Agents and Multi-Agent Systems
Analysis of active intrusion prevention data for predicting hostile activity in computer networks
Communications of the ACM
A parallel genetic local search algorithm for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Dependable security: testing network intrusion detection systems
HotDep'07 Proceedings of the 3rd workshop on on Hot Topics in System Dependability
Deep network packet filter design for reconfigurable devices
ACM Transactions on Embedded Computing Systems (TECS)
Sensing Attacks in Computers Networks with Hidden Markov Models
MLDM '07 Proceedings of the 5th international conference on Machine Learning and Data Mining in Pattern Recognition
A Component-Based Framework for Visualization of Intrusion Detection Events
Information Security Journal: A Global Perspective
McPAD: A multiple classifier system for accurate payload-based anomaly detection
Computer Networks: The International Journal of Computer and Telecommunications Networking
Ensemble of classifiers for detecting network intrusion
Proceedings of the International Conference on Advances in Computing, Communication and Control
Proceedings of the 2009 International Conference on Hybrid Information Technology
SAX: a privacy preserving general pupose methodapplied to detection of intrusions
Proceedings of the ACM first international workshop on Privacy and anonymity for very large databases
A modular multiple classifier system for the detection of intrusions in computer networks
MCS'03 Proceedings of the 4th international conference on Multiple classifier systems
An Analysis of the Impact of Passenger Profiling for Transportation Security
Operations Research
Infinite Dirichlet mixture models learning via expectation propagation
Advances in Data Analysis and Classification
Information security strategies: towards an organizational multi-strategy perspective
Journal of Intelligent Manufacturing
Hi-index | 0.02 |
Intrusion detection systems are an important component of defensive measures protecting computer systems and networks from abuse. This article considers the role of IDSs in an organization's overall defensive posture and provides guidelines for IDS deployment, operation, and maintenance.