1 |
X. Yao, 'Evolving Artificial Neural Networks,' Proceedings of the IEEE, vol. 87, no. 9, pp. 1423-1447, 1999
DOI
ScienceOn
|
2 |
T. F. Lunt, 'A Survey of Intrusion Detection Techniques,' Computers & Security, vol. 12, no. 4, pp. 405-418, June 1993
DOI
ScienceOn
|
3 |
W. Lee, S. Stolfo, and P.K. Chan, 'Learning Patterns from Unix Process Execution Traces for Intrusion Detection,' Proceedings of AAAI97 Workshop on AI Methods in Fraud and Risk Management, pp. 50-56, 1997
|
4 |
N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, 'Probabilistic Techniques for Intrusion Detection based on Computer Audit Data,' IEEE Transactions on Systems, Man, and Cybernetics, vol. 31, no. 4, pp. 266-274, 2001
DOI
ScienceOn
|
5 |
R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das, 'The 1999 DARPA Off-Line Intrusion Detection Evaluation,' Computer Networks, vol. 34, no. 4, pp. 579-595, 2000
DOI
ScienceOn
|
6 |
A. K. Ghosh, A. Schwartzbard, and M. Schatz, 'Learning Program Behavior Profiles for Intrusion Detection,' Proceedings if the 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pp. 51-62, Santa Clara, CA, April, 1999
|
7 |
S. A. Hofmeyr, A. Somayaji, and S. Forrest, 'Intrusion Detection Using Sequences of System Calls,' journal of Computer Security, vol. 6, pp 151-180, 1998
|
8 |
C. Warrender, S. Forrest, and B. Pearlmutter, 'Detecting Intrusions Using System Calls: Alternative Data Models,' Proceedings of IEEE Symposium on Security and Privacy, pp. 133-145, Oakland, CA, May 1999
DOI
|
9 |
S. Forrest, S. A. Hofmeyr, and A. Somayaji, 'A Sense of Self for Unix Processes,' Proceedinges of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120-128, 1996
DOI
|
10 |
A. K. Ghosh, C. C. Michael, and M. A. Schatz, 'A Real-Time Intrusion Detection System Based on Learning Program Behavior,' Proceedings of the Third International Workshop Recent Advances in Intrusion Detection, pp. 93-109, 2000
DOI
|
11 |
S. Forrest, S. A. Hofmeyr, and A. Somayaji, 'Computer Immunology,' Communications of the ACM, vol. 40, no. 10, pp. 88-96, 1997
DOI
ScienceOn
|
12 |
MIT Lincoln Laboratory, 'DARPA Intrusion Detection Evaluation', Available from
|
13 |
E. Eskin, W. Lee and S. J. Stolfo, 'Modeling System Calls for Intrusion Detection with Dynamic Window Sizes,' Proceedings of DARPA Information Survivability Conference and Exposition(DISCEX II), pp. 165-175, 2001
DOI
|
14 |
W. W. Cohen, 'Fast Effective Rule Induction,' Proceedings of the 12th International Conference on Machine Learning, pp. 115-123, Tahoe City, CA, 1995
|