Sciweavers

479 search results - page 3 / 96
» Intrusion Detection Based on Data Mining
Sort
View
78
Voted
ICDM
2002
IEEE
110views Data Mining» more  ICDM 2002»
15 years 6 months ago
Considering Both Intra-Pattern and Inter-Pattern Anomalies for Intrusion Detection
Ning Jiang, Kien A. Hua, Simon Sheu
SDM
2003
SIAM
124views Data Mining» more  SDM 2003»
15 years 3 months ago
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
Aleksandar Lazarevic, Levent Ertöz, Vipin Kum...
114
Voted
DBSEC
2001
115views Database» more  DBSEC 2001»
15 years 3 months ago
Randomly roving agents for intrusion detection
Agent based intrusion detection systems IDS have advantages such as scalability, recon gurability, and survivability. In this paper, we introduce a mobile-agent based IDS, called ...
Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth...
120
Voted
SAC
2004
ACM
15 years 7 months ago
Unsupervised learning techniques for an intrusion detection system
With the continuous evolution of the types of attacks against computer networks, traditional intrusion detection systems, based on pattern matching and static signatures, are incr...
Stefano Zanero, Sergio M. Savaresi
196
Voted
ICDE
2004
IEEE
151views Database» more  ICDE 2004»
16 years 3 months ago
Data Mining for Intrusion Detection: Techniques, Applications and Systems
Jian Pei, Shambhu J. Upadhyaya, Faisal Farooq, Ven...