Artificial Intelligence and Intrusion Detection: Current and Future Directions (1994)

Cached

Download Links

by Jeremy Frank , Nsa Urp Mda--c
Venue:In Proceedings of the 17th National Computer Security Conference
Citations:69 - 0 self

Active Bibliography

7 On Atypical Database Transactions: Identification of Probable Frauds using Machine Learning for User Profiling – A. I. Kokkinaki - 1997
1 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun Richard, Richard A. Kemmerer, Phillip A. Porras - 1995
275 State Transition Analysis: A Rule-Based Intrusion Detection Approach – Koral Ilgun, Richard A. Kemmerer, Phillip A. Porras - 1995
Host-Based Misuse Detection and . . . – Katherine E. Price - 1997
Host-Based Misuse Detection and Conventional . . . – Katherine E. Price - 1997
95 Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-BEST) – Ulf Lindqvist, Phillip A. Porras - 1999
133 Classification And Detection Of Computer Intrusions – Sandeep Kumar - 1995
35 A Revised Taxonomy for Intrusion-Detection Systems – Herve Debar, Marc Dacier, Andreas Wespi
3 Machine Learning Techniques for the Domain of Anomaly Detection for Computer Security – Terran Lane - 1998
34 Machine Learning Techniques for the Computer Security Domain of Anomaly Detection – Terran D. Lane - 2000
46 Research in Intrusion-Detection Systems: A Survey – Stefan Axelsson - 1998
5 An Introduction to Intrusion-Detection Systems – HervĂ© Debar - 2002
37 Computer System Intrusion Detection: A Survey – Anita K. Jones, Robert S. Sielken - 1999
Deepti Yadav et al IJCSET |February 2012 | Vol 2, Issue 2,899-902 Peer to Peer Reputation Management – Deepti Yadav, Shraddha Tagde, Deepa Kale, Neha Ramteke, Vishakha Borkar
43 Intrusion and Intrusion Detection – John Mchugh - 2001
15 DATA MINING FOR INTRUSION DETECTION -- A Critical Review – Klaus Julisch
Runtime Monitoring of Malicious Code in a Network – Ibironke A. Ajayi, Olutayo B. Ajayi, O. J. Adeniran
Using CLIPS to Detect Network Intrusions – Pedro Alipio , Paulo Carvalho, JosĂ© Neves - 2003
28 Intrusion Detection Applying Machine Learning to Solaris Audit Data – David Endler - 1998