×

Found 50 Documents (Results 1–50)

Evading machine learning based network intrusion detection systems with GANs. (English) Zbl 07526411

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 335-356 (2021).
MSC:  68M25 68T05 91A80
PDFBibTeX XMLCite
Full Text: DOI

Continuous authentication security games. (English) Zbl 07526405

Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 180-203 (2021).
MSC:  68M25 68T05 91A80
PDFBibTeX XMLCite
Full Text: DOI

Dimensionality reduction and visualization of network intrusion detection data. (English) Zbl 1443.68040

Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 441-455 (2019).
MSC:  68M25 68M10 68T05
PDFBibTeX XMLCite
Full Text: DOI Link

Network statistics in function of statistical intrusion detection. (English) Zbl 1209.68014

Rudas, Imre J.(ed) et al., Computational intelligence and informatics. Selected papers based on the presentations at the 10th international symposium of Hungarian researchers on computational intelligence and informatics, Budapest, Hungary, November 12–14, 2009. Berlin: Springer (ISBN 978-3-642-15219-1/hbk; 978-3-642-15220-7/ebook). Studies in Computational Intelligence 313, 27-35 (2010).
MSC:  68M10 68M99
PDFBibTeX XMLCite
Full Text: DOI

A deviation based outlier intrusion detection system. (English) Zbl 1207.68061

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 395-401 (2010).
MSC:  68M10 68T05 68M11
PDFBibTeX XMLCite
Full Text: DOI

Neural network and artificial immune systems for malware and network intrusion detection. (English) Zbl 1185.68526

Koronacki, Jacek (ed.) et al., Advances in machine learning II. Dedicated to the memory of Professor Ryszard S. Michalski. Berlin: Springer (ISBN 978-3-642-05178-4/hbk; 978-3-642-05179-1/ebook). Studies in Computational Intelligence 263, 485-513 (2010).
MSC:  68T05 68N99
PDFBibTeX XMLCite
Full Text: DOI

Tree-structure based hybrid computational intelligence. Theoretical foundations and applications. (English) Zbl 1195.68076

Intelligent Systems Reference Library 2. Berlin: Springer (ISBN 978-3-642-04738-1/hbk; 978-3-642-26120-6/pbk; 978-3-642-04739-8/ebook). xiv, 206 p. (2010).
PDFBibTeX XMLCite
Full Text: DOI

Learning program behavior for run-time software assurance. (English) Zbl 1191.68483

Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 135-142 (2009).
MSC:  68T05 68N99
PDFBibTeX XMLCite
Full Text: DOI

A competitive neural network for intrusion detection systems. (English) Zbl 1171.68039

Le Thi, Hoai An (ed.) et al., Modelling, computation and optimization in information systems and management sciences. Second international conference MCO 2008, Metz, France - Luxembourg, September 8–10, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-87476-8/pbk). Communications in Computer and Information Science 14, 530-537 (2008).
MSC:  68T05
PDFBibTeX XMLCite
Full Text: DOI

SVM based false alarm minimization scheme on intrusion prevention system. (English) Zbl 1175.68053

Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part V. Berlin: Springer (ISBN 3-540-34079-3/pbk). Lecture Notes in Computer Science 3984, 284-293 (2006).
MSC:  68M11 68T05
PDFBibTeX XMLCite
Full Text: DOI

An enhanced support vector machine model for intrusion detection. (English) Zbl 1196.68212

Wang, Guoyin (ed.) et al., Rough sets and knowledge technology. First international conference, RSKT 2006, Chongqing, China, July 24–26, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-36297-5/pbk). Lecture Notes in Computer Science 4062. Lecture Notes in Artificial Intelligence, 538-543 (2006).
MSC:  68T05 68M11
PDFBibTeX XMLCite
Full Text: DOI

Model generalization and its implications on intrusion detection. (English) Zbl 1126.68404

Ioannidis, John (ed.) et al., Applied cryptography and network security. Third international conference, ACNS 2005, New York, NY, USA, June 7–10, 2005. Proceedings. Berlin: Springer (ISBN 3-540-26223-7/pbk). Lecture Notes in Computer Science 3531, 222-237 (2005).
MSC:  68P25 94A60 68T05
PDFBibTeX XMLCite
Full Text: DOI

Significant feature selection using computational intelligent techniques for intrusion detection. (English) Zbl 1087.68506

Bandyopadhyay, Sanghamitra (ed.) et al., Advanced methods for knowledge discovery from complex data. London: Springer (ISBN 1-85233-989-6/hbk). Advanced Information and Knowledge Processing, 285-306 (2005).
MSC:  68M10 68T05
PDFBibTeX XMLCite

Managing computer networks security through self-organization: A complex system perspective. (English) Zbl 1082.68505

Di Marzo Serugendo, Giovanna (ed.) et al., Engineering self-organising systems. Nature-inspired approaches to software engineering. Berlin: Springer (ISBN 3-540-21201-9/pbk). Lecture Notes in Computer Science 2977. Lecture Notes in Artificial Intelligence, 124-138 (2004).
MSC:  68M10 68N99 68T05
PDFBibTeX XMLCite
Full Text: DOI

Intrusion detection using noisy training data. (English) Zbl 1108.68559

Laganà, Antonio (ed.) et al., Computational science and its applications — ICCSA 2004. International conference, Assisi, Italy, May 14–17, 2004. Proceedings, Part I. Berlin: Springer (ISBN 3-540-22054-2/pbk). Lecture Notes in Computer Science 3043, 547-556 (2004).
MSC:  68T05
PDFBibTeX XMLCite
Full Text: DOI

A blackboard-based learning intrusion detection system: A new approach. (English) Zbl 1039.68858

Chung, Paul W. H. (ed.) et al., Developments in applied artificial intelligence. 16th international conference on industrial and engineering applications of artificial intelligence and expert systems, IEA/AIE 2003, Loughborough, UK, June 23–26, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40455-4/pbk). Lect. Notes Comput. Sci. 2718, 385-390 (2003).
PDFBibTeX XMLCite
Full Text: Link

Modeling user behavior by integrating AQ learning with a database: Initial results. (English) Zbl 1088.68560

Kłopotek, Mieczysław A. (ed.) et al., Intelligent information systems 2002. Proceedings of the IIS’ 2002 symposium, Sopot, Poland, June 3–6, 2002. Heidelberg: Physica-Verlag (ISBN 3-7908-1509-8/pbk). Advances in Soft Computing, 43-56 (2002).
MSC:  68P15 68T05
PDFBibTeX XMLCite

Learning temporal regularities of user behavior for anomaly detection. (English) Zbl 0986.68918

Gorodetski, V. I. (ed.) et al., Information assurance in computer networks. Methods, models and architectures for network security. International workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2052, 143-152 (2001).
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software