A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
Mining system audit data: opportunities and challenges
ACM SIGMOD Record
A Multiple Model Cost-Sensitive Approach for Intrusion Detection
ECML '00 Proceedings of the 11th European Conference on Machine Learning
A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions
RAID '00 Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection
Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility
ACM SIGKDD Explorations Newsletter
Using artificial anomalies to detect unknown and known network intrusions
Knowledge and Information Systems
An auctioning reputation system based on anomaly
Proceedings of the 12th ACM conference on Computer and communications security
Modeling intrusion detection system using hybrid intelligent systems
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Network intrusion detection in covariance feature space
Pattern Recognition
A three-tier IDS via data mining approach
Proceedings of the 3rd annual ACM workshop on Mining network data
Building intrusion pattern miner for Snort network intrusion detection system
Journal of Systems and Software
A Tabu Clustering algorithm for Intrusion Detection
Intelligent Data Analysis
Classification of intrusion detection alerts using abstaining classifiers
Intelligent Data Analysis
Information fusion for computer security: State of the art and open issues
Information Fusion
Panacea: Automating Attack Classification for Anomaly-Based Network Intrusion Detection Systems
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
Data mining and machine learning-Towards reducing false positives in intrusion detection
Information Security Tech. Report
Analysis of firewall policy rules using traffic mining techniques
International Journal of Internet Protocol Technology
Selection of effective network parameters in attacks for intrusion detection
ICDM'10 Proceedings of the 10th industrial conference on Advances in data mining: applications and theoretical aspects
Immune clonal selection wavelet network based intrusion detection
ICANN'05 Proceedings of the 15th international conference on Artificial Neural Networks: biological Inspirations - Volume Part I
A covariance matrix based approach to internet anomaly detection
ICMLC'05 Proceedings of the 4th international conference on Advances in Machine Learning and Cybernetics
Probabilistic inference strategy in distributed intrusion detection systems
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
A genetic SOM clustering algorithm for intrusion detection
ISNN'05 Proceedings of the Second international conference on Advances in Neural Networks - Volume Part III
Hybrid intrusion detection model based on ordered sequences
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Towards a multiagent-based distributed intrusion detection system using data mining approaches
ADMI'11 Proceedings of the 7th international conference on Agents and Data Mining Interaction
OMC-IDS: at the cross-roads of OLAP mining and intrusion detection
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
A survey of anomaly intrusion detection techniques
Journal of Computing Sciences in Colleges
Service-independent payload analysis to improve intrusion detection in network traffic
AusDM '08 Proceedings of the 7th Australasian Data Mining Conference - Volume 87
Hi-index | 0.00 |