相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Hybrid intelligent systems for detecting network intrusions
Mrutyunjaya Panda et al.
SECURITY AND COMMUNICATION NETWORKS (2015)
RT-MOVICAB-IDS: Addressing real-time intrusion detection
Alvaro Herrero et al.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2013)
Unsupervised Network Intrusion Detection Systems: Detecting the Unknown without Knowledge
Pedro Casas et al.
COMPUTER COMMUNICATIONS (2012)
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
Ali Shiravi et al.
COMPUTERS & SECURITY (2012)
A differentiated one-class classification method with applications to intrusion detection
Inho Kang et al.
EXPERT SYSTEMS WITH APPLICATIONS (2012)
Adaptive ROC-based ensembles of HMMs applied to anomaly detection
Wael Khreich et al.
PATTERN RECOGNITION (2012)
Artificial immune system based on interval type-2 fuzzy set paradigm
A. Viscontia et al.
APPLIED SOFT COMPUTING (2011)
A Survey of Outlier Detection Methods in Network Anomaly Identification
Prasanta Gogoi et al.
COMPUTER JOURNAL (2011)
Surveying Port Scans and Their Detection Methodologies
Monowar H. Bhuyan et al.
COMPUTER JOURNAL (2011)
HMMPayl: An intrusion detection system based on Hidden Markov Models
Davide Ariu et al.
COMPUTERS & SECURITY (2011)
Anomaly Detection in Network Traffic Based on Statistical Inference and α-Stable Modeling
Federico Simmross-Wattenberg et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2011)
An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming
Shingo Mabu et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2011)
Mutual information-based feature selection for intrusion detection systems
Fatemeh Amiri et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2011)
Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies
Xin Xu
APPLIED SOFT COMPUTING (2010)
The use of computational intelligence in intrusion detection systems: A review
Shelly Xiaonan Wu et al.
APPLIED SOFT COMPUTING (2010)
Ensemble-based classifiers
Lior Rokach
ARTIFICIAL INTELLIGENCE REVIEW (2010)
An ensemble-based evolutionary framework for coping with distributed intrusion detection
Gianluigi Folino et al.
GENETIC PROGRAMMING AND EVOLVABLE MACHINES (2010)
An Overview of IP Flow-Based Intrusion Detection
Anna Sperotto et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)
A Survey on Network Coordinates Systems, Design, and Security
Benoit Donnet et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2010)
Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods
Mahbod Tavallaee et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2010)
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
Asaf Shabtai et al.
JOURNAL OF SYSTEMS AND SOFTWARE (2010)
Anomaly detection
Varun Chandola et al.
ACM COMPUTING SURVEYS (2009)
Intrusion detection using fuzzy association rules
Arman Tajbakhsh et al.
APPLIED SOFT COMPUTING (2009)
McPAD: A multiple classifier system for accurate payload-based anomaly detection
Roberto Perdisci et al.
COMPUTER NETWORKS (2009)
A research using hybrid RBF/Elman neural networks for intrusion detection system secure model
Xiaojun Tong et al.
COMPUTER PHYSICS COMMUNICATIONS (2009)
A hybrid intrusion detection system design for computer network security
M. Ali Aydin et al.
COMPUTERS & ELECTRICAL ENGINEERING (2009)
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach
Ming-Yang Su et al.
COMPUTERS & SECURITY (2009)
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms
Yang Li et al.
COMPUTERS & SECURITY (2009)
Anomaly-based network intrusion detection: Techniques, systems and challenges
P. Garcia-Teodoro et al.
COMPUTERS & SECURITY (2009)
Intrusion detection by machine learning: A review
Chih-Fong Tsai et al.
EXPERT SYSTEMS WITH APPLICATIONS (2009)
A Comparative Analysis of Network Dependability, Fault-tolerance, Reliability, Security, and Survivability
M. Al-Kuwaiti et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)
A Survey on Internet Traffic Identification
Arthur Callado et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2009)
Network Anomaly Detection Based on Wavelet Analysis
Wei Lu et al.
EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING (2009)
A user-oriented ontology-based approach for network intrusion detection
Shao-Shin Hung et al.
COMPUTER STANDARDS & INTERFACES (2008)
A Survey of Techniques for Internet Traffic Classification using Machine Learning
Thuy T. T. Nguyen et al.
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2008)
Data fusion and cost minimization for intrusion detection
Devi Parikh et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2008)
Random-forests-based network intrusion detection systems
Jiong Zhang et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS (2008)
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
Giorgio Giacinto et al.
INFORMATION FUSION (2008)
Detection of fraudulent usage in wireless networks
Bo Sun et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2007)
Intrusion detection techniques in mobile Ad Hoc and wireless sensor networks
Bo Sun et al.
IEEE WIRELESS COMMUNICATIONS (2007)
A new intrusion detection system using support vector machines and hierarchical clustering
Latifur Khan et al.
VLDB JOURNAL (2007)
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Animesh Patcha et al.
COMPUTER NETWORKS (2007)
Integration of mobility and intrusion detection for wireless ad hoc networks
Bo Sun et al.
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2007)
Conditional anomaly detection
Xiuyao Song et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2007)
Survey of network-based defense mechanisms countering the DoS and DDoS problems
Tao Peng et al.
ACM COMPUTING SURVEYS (2007)
K-Means+ID3: A novel method for supervised anomaly detection by cascading k-Means clustering and ID3 decision tree learning methods
Shekhar R. Gaddam et al.
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING (2007)
A hierarchical intrusion detection model based on the PCA neural networks
Guisong Liu et al.
NEUROCOMPUTING (2007)
Modeling intrusion detection system using hybrid intelligent systems
Sandhya Peddabachigari et al.
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2007)
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks
Morteza Amini et al.
COMPUTERS & SECURITY (2006)
Enhancing security using mobility-based anomaly detection in cellular mobile networks
Bo Sun et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2006)
Fast distributed outlier detection in mixed-attribute data sets
ME Otey et al.
DATA MINING AND KNOWLEDGE DISCOVERY (2006)
A clustering-based method for unsupervised intrusion detections
SY Jiang et al.
PATTERN RECOGNITION LETTERS (2006)
Feature selection based on mutual information: Criteria of max-dependency, max-relevance, and min-redundancy
HC Peng et al.
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE (2005)
Feature deduction and ensemble design of intrusion detection systems
S Chebrolu et al.
COMPUTERS & SECURITY (2005)
A survey of outlier detection methodologies
VJ Hodge et al.
ARTIFICIAL INTELLIGENCE REVIEW (2004)
A rough set theory based method for anomaly intrusion detection in computer network systems
ZM Cai et al.
EXPERT SYSTEMS (2003)
Anomaly detection in IP networks
M Thottan et al.
IEEE TRANSACTIONS ON SIGNAL PROCESSING (2003)
Fusion of multiple classifiers for intrusion detection in computer networks
G Giacinto et al.
PATTERN RECOGNITION LETTERS (2003)
Network intrusion and fault detection: A statistical anomaly approach
C Manikopoulos et al.
IEEE COMMUNICATIONS MAGAZINE (2002)
Intrusion detection through learning behavior model
B Balajinath et al.
COMPUTER COMMUNICATIONS (2001)
Estimating the support of a high-dimensional distribution
B Schölkopf et al.
NEURAL COMPUTATION (2001)
Training a neural-network based intrusion detector to recognize novel attacks
SC Lee et al.
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS (2001)
Robust classification for imprecise environments
F Provost et al.
MACHINE LEARNING (2001)
Adaptive intrusion detection: A data mining approach
WK Lee et al.
ARTIFICIAL INTELLIGENCE REVIEW (2000)