IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Automatic text processing
The nature of statistical learning theory
The nature of statistical learning theory
A data reduction method for intrusion detection
Journal of Systems and Software
Using neural networks to aid the diagnosis of breast implant rupture
Computers and Operations Research
Communications of the ACM
Testing and evaluating computer intrusion detection systems
Communications of the ACM
Predicting the success of nations at the Summer Olympics using neural networks
Computers and Operations Research
An introduction to support Vector Machines: and other kernel-based learning methods
An introduction to support Vector Machines: and other kernel-based learning methods
Neural networks in business: techniques and applications for the operations researcher
Computers and Operations Research - Neural networks in business
Automated discovery of concise predictive rules for intrusion detection
Journal of Systems and Software
Mimicry attacks on host-based intrusion detection systems
Proceedings of the 9th ACM conference on Computer and communications security
Estimation of all-terminal network reliability using an artificial neural network
Computers and Operations Research
A Tutorial on Support Vector Machines for Pattern Recognition
Data Mining and Knowledge Discovery
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
IEEE Transactions on Software Engineering
Learning Program Behavior Profiles for Intrusion Detection
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Support Vector Machines for Text Categorization
HICSS '03 Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS'03) - Track 4 - Volume 4
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Design and implementation of a decentralized prototype system for detecting distributed attacks
Computer Communications
Intrusion detection techniques and approaches
Computer Communications
Predicting defect-prone software modules using support vector machines
Journal of Systems and Software
A triangle area based nearest neighbors approach to intrusion detection
Pattern Recognition
Review: Intrusion detection by machine learning: A review
Expert Systems with Applications: An International Journal
Constructing attribute weights from computer audit data for effective intrusion detection
Journal of Systems and Software
Using an Evolutionary Neural Network for web intrusion detection
AIA '08 Proceedings of the 26th IASTED International Conference on Artificial Intelligence and Applications
Intelligence system approach for computer network security
AsiaCSN '07 Proceedings of the Fourth IASTED Asian Conference on Communication Systems and Networks
Information Sciences: an International Journal
An intrusion detection based on support vector machines with a voting weight schema
IEA/AIE'07 Proceedings of the 20th international conference on Industrial, engineering, and other applications of applied intelligent systems
Combining heterogeneous classifiers for network intrusion detection
ASIAN'07 Proceedings of the 12th Asian computing science conference on Advances in computer science: computer and network security
Feature selection using rough-DPSO in anomaly intrusion detection
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Apply robust segmentation to the service industry using kernel induced fuzzy clustering techniques
Expert Systems with Applications: An International Journal
The use of artificial intelligence based techniques for intrusion detection: a review
Artificial Intelligence Review
A fusion of ICA and SVM for detection computer attacks
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
A differentiated one-class classification method with applications to intrusion detection
Expert Systems with Applications: An International Journal
An anomaly intrusion detection approach using cellular neural networks
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Intrusion detection system based on multi-class SVM
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
Ranger intrusion detection system for wireless sensor networks with Sybil attack based on ontology
AIC'10/BEBI'10 Proceedings of the 10th WSEAS international conference on applied informatics and communications, and 3rd WSEAS international conference on Biomedical electronics and biomedical informatics
A hybrid network intrusion detection system using simplified swarm optimization (SSO)
Applied Soft Computing
An Optimum-Path Forest framework for intrusion detection in computer networks
Engineering Applications of Artificial Intelligence
Robotics and Computer-Integrated Manufacturing
A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection
Journal of Parallel and Distributed Computing
Editorial: Recent developments in high performance computing and security: An editorial
Future Generation Computer Systems
Review: A survey of intrusion detection techniques in Cloud
Journal of Network and Computer Applications
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part V
Mining Deviations from Patient Care Pathways via Electronic Medical Record System Audits
ACM Transactions on Management Information Systems (TMIS) - Special Issue on Informatics for Smart Health and Wellbeing
A distance sum-based hybrid method for intrusion detection
Applied Intelligence
Hi-index | 0.01 |
The popularization of shared networks and Internet usage demands increases attention on information system security, particularly on intrusion detection. Two data mining methodologies--Artificial Neural Networks (ANNs) and Support Vector Machine (SVM) and two encoding methods--simple frequency-based scheme and tf×idf scheme are used to detect potential system intrusions in this study. Our results show that SVM with tf×idf scheme achieved the best performance, while ANN with simple frequency-based scheme achieved the worst. The data used in experiments are BSM audit data from the DARPA 1998 Intrusion Detection Evaluation Program at MIT's Lincoln Labs.