Simple, state-based approaches to program-based anomaly detection
ACM Transactions on Information and System Security (TISSEC)
STATL: an attack language for state-based intrusion detection
Journal of Computer Security
Architecture of Generalized Network Service Anomaly and Fault Thresholds
MMNS '01 Proceedings of the 4th IFIP/IEEE International Conference on Management of Multimedia Networks and Services: Management of Multimedia on the Internet
A Real-Time Intrusion Detection System Based on Learning Program Behavior
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Proceedings of the 25th International Conference on Software Engineering
Anomaly detection of web-based attacks
Proceedings of the 10th ACM conference on Computer and communications security
Metadata for Anomaly-Based Security Protocol Attack Deduction
IEEE Transactions on Knowledge and Data Engineering
Web tap: detecting covert web traffic
Proceedings of the 11th ACM conference on Computer and communications security
A Comprehensive Approach to Intrusion Detection Alert Correlation
IEEE Transactions on Dependable and Secure Computing
Intrusion detection using hierarchical neural networks
Pattern Recognition Letters
A multi-model approach to the detection of web-based attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Anomalous system call detection
ACM Transactions on Information and System Security (TISSEC)
Factor-analysis based anomaly detection and clustering
Decision Support Systems
A study in using neural networks for anomaly and misuse detection
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Learning program behavior profiles for intrusion detection
ID'99 Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 1
A new intrusion detection method based on data-oriented classification of attacks
ACS'07 Proceedings of the 7th Conference on 7th WSEAS International Conference on Applied Computer Science - Volume 7
Detecting Anomalous Traffic Using Statistical Discriminator and Neural Decisional Motor
IWINAC '07 Proceedings of the 2nd international work-conference on The Interplay Between Natural and Artificial Computation, Part I: Bio-inspired Modeling of Cognitive Tasks
Improving performance of intrusion detection system by applying a new machine learning strategy
CSTST '08 Proceedings of the 5th international conference on Soft computing as transdisciplinary science and technology
ACM Computing Surveys (CSUR)
Review: The use of computational intelligence in intrusion detection systems: A review
Applied Soft Computing
A multi-model approach to the detection of web-based attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web security
Neural network based intrusion detection system for critical infrastructures
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Undermining an anomaly-based intrusion detection system using common exploits
RAID'02 Proceedings of the 5th international conference on Recent advances in intrusion detection
Swaddler: an approach for the anomaly-based detection of state violations in web applications
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Comparison of BPL and RBF network in intrusion detection system
RSFDGrC'03 Proceedings of the 9th international conference on Rough sets, fuzzy sets, data mining, and granular computing
Algebra for capability based attack correlation
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
A Framework for Large-Scale Detection of Web Site Defacements
ACM Transactions on Internet Technology (TOIT)
The use of artificial intelligence based techniques for intrusion detection: a review
Artificial Intelligence Review
Enhancing Intrusion Detection System with proximity information
International Journal of Security and Networks
Anomaly detection techniques for a web defacement monitoring service
Expert Systems with Applications: An International Journal
IWANN'11 Proceedings of the 11th international conference on Artificial neural networks conference on Advances in computational intelligence - Volume Part I
An anomaly intrusion detection approach using cellular neural networks
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Probabilistic inference strategy in distributed intrusion detection systems
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Network-Based anomaly detection using an elman network
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
An effective placement of detection systems for distributed attack detection in large scale networks
WISA'04 Proceedings of the 5th international conference on Information Security Applications
RCS: a distributed mechanism against link flooding DDoS attacks
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Intrusion detection based on MLP neural networks and k-means algorithm
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
ISI'05 Proceedings of the 2005 IEEE international conference on Intelligence and Security Informatics
Anomaly detector performance evaluation using a parameterized environment
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Design and implementation of a decentralized prototype system for detecting distributed attacks
Computer Communications
An Optimum-Path Forest framework for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Intelligent alarm filter using knowledge-based alert verification in network intrusion detection
ISMIS'12 Proceedings of the 20th international conference on Foundations of Intelligent Systems
NSS'12 Proceedings of the 6th international conference on Network and System Security
Network anomaly detection with bayesian self-organizing maps
IWANN'13 Proceedings of the 12th international conference on Artificial Neural Networks: advances in computational intelligence - Volume Part I
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 0.00 |