|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 32 occurrences of 18 keywords
|
|
|
Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
37 | Tsong Song Hwang, Tsung-Ju Lee, Yuh-Jye Lee |
A three-tier IDS via data mining approach. |
MineNet |
2007 |
DBLP DOI BibTeX RDF |
KDD'99, RIPPER, activity profile, whitelist, intrusion detection system, blacklist, false alarm rate, multiclass SVMs |
36 | Wei-Yi Yu, Hahn-Ming Lee |
An Incremental-Learning Method for Supervised Anomaly Detection by Cascading Service Classifier and ITI Decision Tree Methods. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection system (ADS), Kohonens’ self-organizing maps (SOM), ITI (incremental tree inducer), KDD’99, K-Means clustering |
35 | Mohammed Javeed Zaki, Ching-Tien Ho |
KDD-99 Workshop on Large-Scale Parallel KDD Systems. |
SIGKDD Explor. |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
Using self-organizing maps to build an attack map for forensic analysis. |
PST |
2006 |
DBLP DOI BibTeX RDF |
KDD 99 intrusion detection datasets, neural networks, intrusion detection, self-organizing map |
18 | Javier G. Marín-Blázquez, Gregorio Martínez Pérez |
Intrusion detection using a linguistic hedged fuzzy-XCS classifier system. |
Soft Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Feng Gu 0006, Julie Greensmith, Uwe Aickelin |
Further Exploration of the Dendritic Cell Algorithm: Antigen Multiplier and Time Windows. |
ICARIS |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz, Atta Badii |
Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Dong Song, Malcolm I. Heywood, Nur Zincir-Heywood |
Training genetic programming on half a million patterns: an example from anomaly detection. |
IEEE Trans. Evol. Comput. |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Nahla Ben Amor, Salem Benferhat, Zied Elouedi |
Naive Bayes vs decision trees in intrusion detection systems. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Chaochao Luo, Le Wang 0008, Hui Lu 0005 |
Analysis of LSTM-RNN Based on Attack Type of KDD-99 Dataset. |
ICCCS (1) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Santosh Kumar, Sumit Kumar, Sukumar Nandi |
Multi-density Clustering Algorithm for Anomaly Detection Using KDD'99 Dataset. |
ACC (1) |
2011 |
DBLP DOI BibTeX RDF |
|
17 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood |
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99. |
PST |
2005 |
DBLP BibTeX RDF |
|
17 | Jim Georges, Anne H. Milley |
KDD'99 Competition: Knowledge Discovery Contest. |
SIGKDD Explor. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Vladimir Miheev, Alexei Vopilov, Ivan Shabalin |
The MP13 Approach to the KDD'99 Classifier Learning Contest. |
SIGKDD Explor. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Charles Elkan |
Results of the KDD'99 Classifier Learning. |
SIGKDD Explor. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Surajit Chaudhuri, David Madigan, Usama M. Fayyad |
KDD-99: The Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. |
SIGKDD Explor. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Charles Elkan |
KDD'99 Knowledge Discovery Contest. |
SIGKDD Explor. |
2000 |
DBLP BibTeX RDF |
|
17 | Itzhak Levin |
KDD-99 Classifier Learning Contest: LLSoft's Results Overview. |
SIGKDD Explor. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | J. Ross Quinlan |
KDD-99 Panel on Last 10 and Next 10 years. |
SIGKDD Explor. |
2000 |
DBLP DOI BibTeX RDF |
|
9 | Daxin Tian, Yanheng Liu, Yang Xiang 0001 |
Large-scale network intrusion detection based on distributed learning algorithm. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Network behavior, Neural network, Intrusion detection system, Distributed learning |
9 | Nitesh V. Chawla, David A. Cieslak, Lawrence O. Hall, Ajay Joshi |
Automatically countering imbalance and its empirical relationship to cost. |
Data Min. Knowl. Discov. |
2008 |
DBLP DOI BibTeX RDF |
Unbalanced data, Classification, Cost-sensitive learning |
9 | Kien C. Nguyen, Tansu Alpcan, Tamer Basar |
A Decentralized Bayesian Attack Detection Algorithm for Network Security. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Tich Phuoc Tran, Pohsiang Tsai, Tony Jan |
A Multi-expert Classification Framework with Transferable Voting for Intrusion Detection. |
ICMLA |
2008 |
DBLP DOI BibTeX RDF |
|
9 | K. G. Srinivasa 0001, M. Jagadish, K. R. Venugopal 0001, Lalit M. Patnaik |
Data Mining based Query Processing using Rough Sets and Genetic Algorithms. |
CIDM |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Lin Yao 0001, Kai Yao 0001 |
A Low Complexity Intrusion Detection Algorithm. |
International Conference on Computational Science (3) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Daxin Tian, Yanheng Liu, Bin Li |
A Distributed Hebb Neural Network for Network Anomaly Detection. |
ISPA |
2007 |
DBLP DOI BibTeX RDF |
Scaling up, Neural network, Intrusion detection system, Distributed learning |
9 | Vladimir A. Golovko, Leanid U. Vaitsekhovich, Pavel A. Kochurko, Uladzimir S. Rubanau |
Dimensionality Reduction and Attack Recognition using Neural Network Approaches. |
IJCNN |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jiong Zhang, Mohammad Zulkernine |
A Hybrid Network Intrusion Detection Technique Using Random Forests. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
Hybrid detection, Data mining, Intrusion detection, Network security, Random forests |
9 | Xiaotao Wei, Houkuan Huang, Shengfeng Tian |
A Modified RBF Neural Network for Network Anomaly Detection. |
ISNN (2) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Hongyu Yang, Feng Xie, Yi Lu |
Clustering and Classification Based Anomaly Detection. |
FSKD |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Tich Phuoc Tran, Tony Jan |
Boosted Modified Probabilistic Neural Network (BMPNN) for Network Intrusion Detection. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Yanheng Liu, Daxin Tian, Xuegang Yu, Jian Wang 0003 |
A Distributed Neural Network Learning Algorithm for Network Intrusion Detection System. |
ICONIP (3) |
2006 |
DBLP DOI BibTeX RDF |
Neural network, Intrusion detection system, Distributed learning |
9 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
Generating Representative Traffic for Intrusion Detection System Benchmarking. |
CNSR |
2005 |
DBLP DOI BibTeX RDF |
Intrusion Detection, Network Security, Self-Organizing Maps, Markov Models, Traffic Modeling |
9 | Wei Pan, Weihua Li |
A Hybrid Neural Network Approach to the Classification of Novel Attacks for Intrusion Detection. |
ISPA |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 |
USAID: Unifying Signature-Based and Anomaly-Based Intrusion Detection. |
PAKDD |
2005 |
DBLP DOI BibTeX RDF |
|
9 | John Zhong Lei, Ali A. Ghorbani 0001 |
Network Intrusion Detection Using an Improved Competitive Learning Neural Network. |
CNSR |
2004 |
DBLP DOI BibTeX RDF |
Arti.cial Neural Network, Data Mining, Network Security, Network Intrusion Detection, Competitive Learning |
9 | Dong Song, Malcolm I. Heywood, Nur Zincir-Heywood |
A Linear Genetic Programming Approach to Intrusion Detection. |
GECCO |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Mike Fugate, James R. Gattiker |
Anomaly Detection Enhanced Classification in Computer Intrusion Detection. |
SVM |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #38 of 38 (100 per page; Change: )
|
|