Anomaly-based intrusion detection system

Results: 13



#Item
1Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2006-01-26 18:38:00
29. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

9. Evolutionary Computation in Intelligent Network Management Ajith Abraham Natural Computation Lab Department of Computer Science Oklahoma State University,USA

Add to Reading List

Source URL: www.softcomputing.net

Language: English - Date: 2006-12-26 09:46:58
3Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

Add to Reading List

Source URL: www.s0ftpj.org

Language: English - Date: 2006-07-14 18:58:00
4Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer Reliable Software Group Department of Com

Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks William Robertson, Giovanni Vigna, Christopher Kruegel, and Richard A. Kemmerer Reliable Software Group Department of Com

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-10 13:37:55
5CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection DAY, David and FLORES, Denys Available from Sheffield Hallam University Research Archive (SHURA) at: http://shura.shu.ac.uk/5246/

Add to Reading List

Source URL: shura.shu.ac.uk

Language: English - Date: 2013-08-01 09:17:33
6Microsoft Word - aaai_final.doc

Microsoft Word - aaai_final.doc

Add to Reading List

Source URL: www.aaai.org

Language: English - Date: 2008-03-11 15:26:12
7Special Issue on Security for Network Society  Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

Special Issue on Security for Network Society Falsification Prevention and Protection Technologies and Products Data Mining for Security By Kenji YAMANISHI,* Jun-ichi TAKEUCHI* and Yuko MARUYAMA*

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2013-10-21 08:29:06
8ARTICLE IN PRESS  Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet  A multi-model approach to the detection of web-based attacks

ARTICLE IN PRESS Computer Networks xxx[removed]xxx–xxx www.elsevier.com/locate/comnet A multi-model approach to the detection of web-based attacks

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2005-05-30 18:56:39
9Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Masibty: an anomaly based intrusion prevention system for web applications Claudio Criscione Secure Network Srl [removed] Stefano Zanero

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:30
10Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta Division of Computer Science Mathematical Sciences Department The University of Memphis

Immunity-Based Intrusion Detection System: A General Framework Dipankar Dasgupta Division of Computer Science Mathematical Sciences Department The University of Memphis

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 1999-11-05 00:00:00