Found 143 Documents (Results 1–100)
Evading machine learning based network intrusion detection systems with GANs. (English) Zbl 07526411
Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 335-356 (2021).
Continuous authentication security games. (English) Zbl 07526405
Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 180-203 (2021).
Study of multi-class classification algorithms’ performance on highly imbalanced network intrusion datasets. (English) Zbl 1485.68213
A soft computing model based on asymmetric Gaussian mixtures and Bayesian inference. (English) Zbl 1490.68181
Dimensionality reduction and visualization of network intrusion detection data. (English) Zbl 1443.68040
Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 441-455 (2019).
An optimization detection algorithm for complex intrusion interference signal in mobile wireless network. (English) Zbl 1458.94089
Moving target defense for the placement of intrusion detection systems in the cloud. (English) Zbl 1519.68011
Bushnell, Linda (ed.) et al., Decision and game theory for security. 9th international conference, GameSec 2018, Seattle, WA, USA, October 29–31, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11199, 326-345 (2018).
Density clustering anomaly intrusion detection algorithm based on ABC-DBSCAN. (Chinese. English summary) Zbl 1413.68126
A multi-class classification MCLP model with particle swarm optimization for network intrusion detection. (English) Zbl 1381.90101
Between syntax and semantics of resource oriented logic for IDS behavior description. (English) Zbl 1524.68017
The impact of hybrid quarantine strategies and delay factor on viral prevalence in computer networks. (English) Zbl 1462.34112
Intrusion detection on imbalanced dataset. (Chinese. English summary) Zbl 1374.68373
MSC:
68T05
Optimal thresholds for anomaly-based intrusion detection in dynamical environments. (English) Zbl 1453.91032
Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 415-434 (2016).
An insight review on Bloom filter and its variants with applications: an emerging hash based membership querying technique. (English) Zbl 1487.68085
A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. (English) Zbl 1382.68196
Cardinality estimates for some classes of regular languages. (English. Russian original) Zbl 1386.68083
Discrete Math. Appl. 25, No. 6, 323-337 (2015); translation from Diskretn. Mat. 27, No. 2, 3-21 (2015).
MSC:
68Q45
RFID intrusion detection with finite automation. (Chinese. English summary) Zbl 1324.68009
On the robust synthesis of logical consensus algorithms for distributed intrusion detection. (English) Zbl 1364.93260
Real-time detection of application-layer DDoS attack using time series analysis. (English) Zbl 1291.93205
Evolving optimised decision rules for intrusion detection using particle swarm paradigm. (English) Zbl 1314.68297
Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems. (English) Zbl 1255.68132
An adaptive mode control algorithm of a scalable intrusion tolerant architecture. (English) Zbl 1250.68062
Measuring inconsistency in a network intrusion detection rule set based on Snort. (English) Zbl 1234.68376
Intrusion detection in a \(K\)-Gaussian distributed wireless sensor network. (English) Zbl 1231.68094
MSC:
68M14
Indices of power in optimal IDS default configuration: theory and examples. (English) Zbl 1349.68018
Baras, John S. (ed.) et al., Decision and game theory for security. Second international conference, GameSec 2011, College Park, MD, Maryland, USA, November 14–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25279-2/pbk). Lecture Notes in Computer Science 7037, 7-21 (2011).
Intrusion detection based on rough set theory and kernel matching pursuit. (Chinese. English summary) Zbl 1246.68188
MSC:
68T05
Techniques for intrusion detection based on adaptive intuitionistic fuzzy reasoning. (Chinese. English summary) Zbl 1246.68181
Reliability of wireless sensors with code attestation for intrusion detection. (English) Zbl 1234.68039
MSC:
68M15
Intrusion detection using wavelet neural networks with genetic and Levenberg-Marquardt algorithms. (Chinese. English summary) Zbl 1240.68179
Parallel proximal support vector machine and its application in intrusion detection. (English) Zbl 1240.68203
MSC:
68T05
Network statistics in function of statistical intrusion detection. (English) Zbl 1209.68014
Rudas, Imre J.(ed) et al., Computational intelligence and informatics. Selected papers based on the presentations at the 10th international symposium of Hungarian researchers on computational intelligence and informatics, Budapest, Hungary, November 12–14, 2009. Berlin: Springer (ISBN 978-3-642-15219-1/hbk; 978-3-642-15220-7/ebook). Studies in Computational Intelligence 313, 27-35 (2010).
A deviation based outlier intrusion detection system. (English) Zbl 1207.68061
Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 395-401 (2010).
Detection and classification of DDoS attacks using fuzzy inference system. (English) Zbl 1210.68021
Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 242-252 (2010).
MSC:
68M10
Fuzzy rule-base based intrusion detection system on application layer. (English) Zbl 1210.68020
Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 27-36 (2010).
MSC:
68M10
Novelty-aware attack recognition - intrusion detection with organic computing techniques. (English) Zbl 1202.68081
Hinchey, Mike (ed.) et al., Distributed, parallel and biologically inspired systems. 7th IFIP TC 10 working conference, DIPES 2010, and 3rd IFIP TC 10 international conference biologically-inspired collaborative computing, BICC 2010, held as part of WCC 2010, Brisbane, Australia, September 20–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15233-7/hbk; 978-3-642-15234-4/ebook). IFIP Advances in Information and Communication Technology 329, 242-253 (2010).
Intrusion detections in collaborative organizations by preserving privacy. (English) Zbl 1198.68086
Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 235-247 (2010).
MSC:
68M10
HiFIND: a high-speed flow-level intrusion detection approach with DoS resiliency. (English) Zbl 1204.68019
MSC:
68M10
CARRADS: cross layer based adaptive real-time routing attack detection system for MANETS. (English) Zbl 1202.68031
MSC:
68M10
A taxonomy of biologically inspired research in computer networking. (English) Zbl 1202.68038
MSC:
68M10
Neural network and artificial immune systems for malware and network intrusion detection. (English) Zbl 1185.68526
Koronacki, Jacek (ed.) et al., Advances in machine learning II. Dedicated to the memory of Professor Ryszard S. Michalski. Berlin: Springer (ISBN 978-3-642-05178-4/hbk; 978-3-642-05179-1/ebook). Studies in Computational Intelligence 263, 485-513 (2010).
Tree-structure based hybrid computational intelligence. Theoretical foundations and applications. (English) Zbl 1195.68076
Intelligent Systems Reference Library 2. Berlin: Springer (ISBN 978-3-642-04738-1/hbk; 978-3-642-26120-6/pbk; 978-3-642-04739-8/ebook). xiv, 206 p. (2010).
Reviewer: Ruxandra Stoean (Craiova)
Multiagent systems for network intrusion detection: A review. (English) Zbl 1191.68727
Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 143-154 (2009).
Learning program behavior for run-time software assurance. (English) Zbl 1191.68483
Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 135-142 (2009).
Neural network based intrusion detection system for detecting changes in hardware profile. (English) Zbl 1184.68419
Cooperative network intrusion detection based on data fusion. (Chinese. English summary) Zbl 1170.68333
Intrusion detection method based on rough set and adaptive boost. (Chinese. English summary) Zbl 1170.68408
McPAD: A multiple classifier system for accurate payload-based anomaly detection. (English) Zbl 1188.68045
MSC:
68M10
A hybrid intrusion detection system design for computer network security. (English) Zbl 1189.68017
MSC:
68M10
The impact of a realistic packet traffic model on the performance of surveillance wireless sensor networks. (English) Zbl 1181.68068
Computer network security. Theory and practice. (English) Zbl 1167.68009
Beijing: Higher Education Press; Berlin: Springer (ISBN 978-7-04-024162-4; 978-3-540-79697-8/hbk). xviii, 384 p. (2009).
Reviewer: Jozef Woźniak (Gdańsk)
Detection workload in a dynamic grid-based intrusion detection environment. (English) Zbl 1243.68064
Uncertainty clustering algorithm and its application to intrusion detection system. (Chinese. English summary) Zbl 1181.68203
Intrusion detection model for RFID system based on immune network. (Chinese. English summary) Zbl 1181.68025
Data-flow dependency-based trusted recovery method. (Chinese. English summary) Zbl 1181.68096
D-S theory-based intrusion detection system. (Chinese. English summary) Zbl 1180.68036
MSC:
68M10
Survey of network security visualization techniques. (Chinese. English summary) Zbl 1175.68040
MSC:
68M10
Intrusion detection system with hybrid detector. (Chinese. English summary) Zbl 1173.68352
MSC:
68M10
Blind intrusion detection algorithm based on digital whiff. (Chinese. English summary) Zbl 1173.68353
MSC:
68M10
Communication mechanism designed for distributed intrusion detection system. (Chinese. English summary) Zbl 1173.68333
Supervisal algorithm design of IDS using support vector regression. (Chinese. English summary) Zbl 1173.68363
MSC:
68M10
Intrusion detection based on unsupervised clustering and hybrid genetic algorithm. (Chinese. English summary) Zbl 1172.68313
Fast multi-pattern matching algorithm for intrusion detection. (Chinese. English summary) Zbl 1172.68321
FPGA based multi-tier artificial neural network processor for firewall implementation. (English) Zbl 1173.68644
A competitive neural network for intrusion detection systems. (English) Zbl 1171.68039
Le Thi, Hoai An (ed.) et al., Modelling, computation and optimization in information systems and management sciences. Second international conference MCO 2008, Metz, France - Luxembourg, September 8–10, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-87476-8/pbk). Communications in Computer and Information Science 14, 530-537 (2008).
MSC:
68T05
Efficient intrusion-detection using programmable agents based on attack graph patterns. (English) Zbl 1157.68447
Securing information and communications systems: principles, technologies and applications. (English) Zbl 1142.68031
Computer Security Series. Boston, MA: Artech House (ISBN 978-1-59693-228-9/hbk; 978-1-59693-229-6/ebook). xiv, 362 p. (2008).
A netflow based flow analysis and monitoring system in enterprise networks. (English) Zbl 1135.68310
MSC:
68M10
Security and trust for wireless autonomic networks. Systems and control methods. (English) Zbl 1293.68045
Fuzzy decision tree based inference techniques for network forensic analysis. (English) Zbl 1174.68654
A vulnerabilities analysis and corresponding middleware security extensions for securing NGN applications. (English) Zbl 1147.68376
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. (English) Zbl 1119.68189
A framework for protecting a SIP-based infrastructure against malformed message attacks. (English) Zbl 1118.68325
Fast packet inspection using state-based Bloom filter engine. (Chinese. English summary) Zbl 1112.68324
MSC:
68M10
Using the danger model of immune systems for distributed defense in modern data networks. (English) Zbl 1112.68009
MSC:
68M10
CuPIDS: An exploration of highly focused, co-processor-based information system protection. (English) Zbl 1107.68525
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots. (English) Zbl 1107.68332
MSC:
68M10
eHIP: An energy-efficient hybrid intrusion prohibition system for cluster-based wireless sensor networks. (English) Zbl 1114.68316
MSC:
68M10
EC2ND 2006. Proceedings of the second European conference on computer network defence, in conjunction with the first workshop on digital forensics and incident analysis. (English) Zbl 1138.68315
London: Springer (ISBN 978-1-84628-749-7/pbk). viii, 125 p. (2007).
Improving the quality of alerts and predicting intruder’s next goal with Hidden Colored Petri-Net. (English) Zbl 1152.68471
Authors’ response. (English) Zbl 1248.94033
A discussion on “Detection of intrusions in information systems by sequential change-point methods” by Tartakovsky, Rozovskii, Blažek, and Kim. (English) Zbl 1248.94028
A discussion on “Detection of intrusions in information systems by sequential change-point methods” by Tartakovsky, Rozovskii, Blažek, and Kim. (English) Zbl 1248.94021
Filter Results by …
Document Type
- Journal Articles (99)
- Collection Articles (33)
- Books (11)
all
top 5
Author
- Laskov, Pavel (3)
- Blažek, Rudolf B. (2)
- Cuppens, Frédéric (2)
- Das, Amitabha (2)
- Jajodia, Sushil (2)
- Kim, Hongjoong (2)
- Qin, Zhiguang (2)
- Rozovskii, Boris L. (2)
- Tartakovsky, Alexander G. (2)
- Wang, Dawei (2)
- Zhu, Quanyan (2)
- Abbas, Waseem (1)
- Abraham, Ajith (1)
- Acampora, Giovanni (1)
- Agrawal, Hira (1)
- Aickelin, Uwe (1)
- Alagöz, Fatih (1)
- Alexandrov, Dmitriy E. (1)
- Alpcan, Tansu (1)
- Amir, Amihood (1)
- Ariu, Davide (1)
- Autrel, Fabien (1)
- Aydın, M. Ali (1)
- Bacşar, Tamer (1)
- Bansal, Shruti (1)
- Bao, Bi-Xian (1)
- Bao, Lihui (1)
- Baras, John S. (1)
- Barchinezhad, Soheila (1)
- Başar, Tamer (1)
- Basseville, Michèle (1)
- Behrens, Clifford (1)
- Belokosztolszki, András (1)
- Bentley, Peter J. (1)
- Bezobrazov, Sergei (1)
- Bicchi, Antonio (1)
- Bin, Liu (1)
- Blyth, Andrew (1)
- Borrell, Joan (1)
- Bos, Herbert (1)
- Bouguila, Nizar (1)
- Bridges, Susan M. (1)
- Bulavas, Viktoras (1)
- Burge, John (1)
- Busch, Christoph (1)
- Cai, Lidong (1)
- Cai, Shubin (1)
- Cai, Wenjun (1)
- Cannady, James (1)
- Cao, Yuanda (1)
- Carey, Nathan (1)
- Castillo, Sergio (1)
- Cervone, Guido (1)
- Ceylan, K. Gökhan (1)
- Chang, Ko-Ming (1)
- Chang, Liwu (1)
- Chauhan, Rashmi (1)
- Chen, Ing-Ray (1)
- Chen, Ke (1)
- Chen, Wun-Hwa (1)
- Chen, Xiuzhen (1)
- Chen, Yan (1)
- Chen, Yu (1)
- Chen, Yuanyan (1)
- Chen, Yuehui (1)
- Cheng, Yongxin (1)
- Cheng, Yuan (1)
- Cho, Yookun (1)
- Choi, Jin Young (1)
- Chovancová, Eva (1)
- Chow, Yang-Wai (1)
- Chowdhary, Ankur (1)
- Chuang, Lin (1)
- Čisar, Petar (1)
- Čisar, Sanja Maravić (1)
- Clough, Larry A. (1)
- Corchado, Emilio S. (1)
- Cui, Yong (1)
- Dagiuklas, Tasos (1)
- Dán, György (1)
- Dasarathy, Balakrishnan (1)
- Dass, Mayukh (1)
- Deliç, Hakan (1)
- Demirkol, Ilker (1)
- Deng, Feiqi (1)
- Deng, Yaping (1)
- Deo, Narsingh (1)
- Deswarte, Yves (1)
- Di, Xiaoqiang (1)
- Dohi, Tadashi (1)
- Domínguez, Enrique (1)
- Dong, Cun-xi (1)
- Du, Hongle (1)
- Du, Ye (1)
- Duan, Miyi (1)
- Dudláková, Zuzana (1)
- Ennert, Michal (1)
- Ersoy, Cem (1)
- Esmaili, Masoud (1)
- Eyers, David M. (1)
- and 306 more Authors
all
top 5
Serial
- Comput. Netw. (15)
- J. Comput. Appl. (15)
- J. Softw. (5)
- Wuhan Univ. J. Nat. Sci. (4)
- Stat. Methodol. (4)
- J. Parallel Distrib. Comput. (3)
- Pattern Recognition (3)
- Soft Comput. (3)
- J. Univ. Electron. Sci. Technol. China (3)
- J. Comput. Syst. Sci. (2)
- J. Discrete Math. Sci. Cryptography (2)
- J. Mach. Learn. Res. (2)
- Adv. Inf. Secur. (2)
- J. Appl. Math. Comput. Mech. (2)
- ACM Comput. Surv. (1)
- Comput. Electr. Eng. (1)
- Int. J. Syst. Sci. (1)
- Inf. Process. Lett. (1)
- J. Franklin Inst. (1)
- Automatica (1)
- Program. Comput. Softw. (1)
- Theor. Comput. Sci. (1)
- Inf. Comput. (1)
- Comput. Oper. Res. (1)
- Int. J. Intell. Syst. (1)
- Mach. Learn. (1)
- Discrete Math. Appl. (1)
- Congr. Numerantium (1)
- J. Artif. Intell. Res. (JAIR) (1)
- Eur. J. Control (1)
- Informatica, Vilnius (1)
- Sci. Iran. (1)
- J. Shenzhen Univ., Sci. Eng. (1)
- J. Harbin Inst. Technol. (N.S.) (1)
- Comput. Inform. (1)
- Sādhanā (1)
- Nat. Comput. (1)
- J. Jilin Univ., Sci. (1)
- J. Northeast. Univ., Nat. Sci. (1)
- J. Shandong Univ., Nat. Sci. (1)
- J. Beijing Univ. Technol. (1)
- J. Syst. Eng. Electron. (1)
- Syst. Eng. Electron. (1)
- Int. J. Semant. Comput. (1)
- Math. Model. Nat. Phenom. (1)
- Discrete Contin. Dyn. Syst., Ser. S (1)
- J. Control Sci. Eng. (1)
- Int. J. Artif. Intell. (1)
- Intell. Syst. Ref. Libr. (1)
- Asian J. Control (1)
- J. Jinan Univ., Nat. Sci. Med. Ed. (1)
- IFIP, Int. Fed. Inf. Process. (1)
all
top 3
Software
- Snort (3)
- UCI-ml (2)
- ADAM (1)
- ADEPTS (1)
- AMNESIA (1)
- AdaBoost.MH (1)
- AntNet (1)
- Asterisk (1)
- C4.5 (1)
- CARRADS (1)
- Chord (1)
- FDR2 (1)
- FIREMAN (1)
- GloMoSim (1)
- Gnort (1)
- Hamsa (1)
- Handel-C (1)
- Imbalanced-learn (1)
- LERS (1)
- LIBSVM (1)
- NFIDS (1)
- NSGA-II (1)
- OASIS (1)
- Polygraph (1)
- Python (1)
- SCUBA (1)
- SMOTE (1)
- SVMTorch (1)
- SVMlight (1)
- SWATT (1)
- Scikit (1)
- Statsmodels (1)
- TCPDUMP (1)
- VMWare (1)
- Whirlpool (1)
- XGBoost (1)
- eHIP (1)