Quintián, Héctor; Jove, Esteban; Casteleiro-Roca, José-Luis; Urda, Daniel; Arroyo, Ángel; Luis Calvo-Rolle, José; Herrero, Álvaro; Corchado, Emilio Advanced visualization of intrusions in flows by means of beta-Hebbian learning. (English) Zbl 07654002 Log. J. IGPL 30, No. 6, 1056-1073 (2022). MSC: 03-XX 68-XX PDF BibTeX XML Cite \textit{H. Quintián} et al., Log. J. IGPL 30, No. 6, 1056--1073 (2022; Zbl 07654002) Full Text: DOI OpenURL
Go, Gwang-Myong; Bu, Seok-Jun; Cho, Sung-Bae Insider attack detection in database with deep metric neural network with Monte Carlo sampling. (English) Zbl 07653996 Log. J. IGPL 30, No. 6, 979-992 (2022). MSC: 03-XX 68-XX PDF BibTeX XML Cite \textit{G.-M. Go} et al., Log. J. IGPL 30, No. 6, 979--992 (2022; Zbl 07653996) Full Text: DOI OpenURL
Dutta, Vibekananda; Pawlicki, Marek; Kozik, Rafał; Choraś, Michał Unsupervised network traffic anomaly detection with deep autoencoders. (English) Zbl 07653991 Log. J. IGPL 30, No. 6, 912-925 (2022). MSC: 03-XX 68-XX PDF BibTeX XML Cite \textit{V. Dutta} et al., Log. J. IGPL 30, No. 6, 912--925 (2022; Zbl 07653991) Full Text: DOI OpenURL
Jebuer, Tuka Kareem An IDS based on modified chaos Elman’s neural network approaches for securing mobile ad hoc networks against DDoS attack. (English) Zbl 07637302 J. Discrete Math. Sci. Cryptography 25, No. 8, 2759-2764 (2022). MSC: 68-XX 49K15 PDF BibTeX XML Cite \textit{T. K. Jebuer}, J. Discrete Math. Sci. Cryptography 25, No. 8, 2759--2764 (2022; Zbl 07637302) Full Text: DOI OpenURL
Deville, Yannick; Deville, Alain; Mansour, Ali; Ioana, Cornel Statistical intrusion detection and eavesdropping in quantum channels with coupling: multiple-preparation and single-preparation methods. (English) Zbl 1508.81356 Quantum Inf. Process. 21, No. 3, Paper No. 94, 16 p. (2022). MSC: 81P47 81P45 PDF BibTeX XML Cite \textit{Y. Deville} et al., Quantum Inf. Process. 21, No. 3, Paper No. 94, 16 p. (2022; Zbl 1508.81356) Full Text: DOI arXiv OpenURL
Dong, Yumin; Hu, Wanbin; Zhang, Jinlei; Chen, Min; Liao, Wei; Chen, Zhengquan Quantum beetle swarm algorithm optimized extreme learning machine for intrusion detection. (English) Zbl 1508.81442 Quantum Inf. Process. 21, No. 1, Paper No. 9, 26 p. (2022). MSC: 81P68 PDF BibTeX XML Cite \textit{Y. Dong} et al., Quantum Inf. Process. 21, No. 1, Paper No. 9, 26 p. (2022; Zbl 1508.81442) Full Text: DOI OpenURL
Kannari, Phanindra Reddy; Chowdary, Noorullah Shariff; Laxmikanth Biradar, Rajkumar An anomaly-based intrusion detection system using recursive feature elimination technique for improved attack detection. (English) Zbl 07579635 Theor. Comput. Sci. 931, 56-64 (2022). MSC: 68Qxx PDF BibTeX XML Cite \textit{P. R. Kannari} et al., Theor. Comput. Sci. 931, 56--64 (2022; Zbl 07579635) Full Text: DOI OpenURL
Li, Yue; Xu, Wusheng; Li, Wei; Li, Ang; Liu, Zengjin Research on hybrid intrusion detection method based on the ADASYN and ID3 algorithms. (English) Zbl 07513249 Math. Biosci. Eng. 19, No. 2, 2030-2042 (2022). MSC: 68-XX PDF BibTeX XML Cite \textit{Y. Li} et al., Math. Biosci. Eng. 19, No. 2, 2030--2042 (2022; Zbl 07513249) Full Text: DOI OpenURL
Zolbayar, Bolor-Erdene; Sheatsley, Ryan; Mcdaniel, Patrick; Weisman, Mike Evading machine learning based network intrusion detection systems with GANs. (English) Zbl 07526411 Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 335-356 (2021). MSC: 68M25 68T05 91A80 PDF BibTeX XML Cite \textit{B.-E. Zolbayar} et al., in: Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley \& Sons. 335--356 (2021; Zbl 07526411) Full Text: DOI OpenURL
Sarıtaş, Serkan; Shereen, Ezzeldin; Sandberg, Henrik; Dán, György Continuous authentication security games. (English) Zbl 07526405 Kamhoua, Charles A. (ed.) et al., Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley & Sons. 180-203 (2021). MSC: 68M25 68T05 91A80 PDF BibTeX XML Cite \textit{S. Sarıtaş} et al., in: Game theory and machine learning for cyber security. Piscataway, NJ: IEEE Press; Hoboken, NJ: John Wiley \& Sons. 180--203 (2021; Zbl 07526405) Full Text: DOI OpenURL
Alsoufi, Muaadh A.; Razak, Shukor; Siraj, Maheyzah Md; Al-rimy, Bander A.; Ali, Abdulalem; Nasser, Maged; Abdo, Salah A review of anomaly intrusion detection systems in IoT using deep learning techniques. (English) Zbl 07513754 Adv. Data Sci. Adapt. Anal. 13, No. 3-4, Article ID 2143001, 21 p. (2021). MSC: 62-XX PDF BibTeX XML Cite \textit{M. A. Alsoufi} et al., Adv. Data Sci. Adapt. Anal. 13, No. 3--4, Article ID 2143001, 21 p. (2021; Zbl 07513754) Full Text: DOI OpenURL
Vikas; Sagar, B. B.; Munjul, Manisha Security issues in wireless sensor network – a survey. (English) Zbl 07477598 J. Discrete Math. Sci. Cryptography 24, No. 5, 1415-1427 (2021). MSC: 68M18 PDF BibTeX XML Cite \textit{Vikas} et al., J. Discrete Math. Sci. Cryptography 24, No. 5, 1415--1427 (2021; Zbl 07477598) Full Text: DOI OpenURL
Kaushik, Ruchi; Singh, Vijander; Kumari, Rajani Multi-class SVM based network intrusion detection with attribute selection using infinite feature selection technique. (English) Zbl 07477552 J. Discrete Math. Sci. Cryptography 24, No. 8, 2137-2153 (2021). MSC: 68Mxx 15A06 15A09 18A10 17B10 17B15 18C10 18C05 18D35 PDF BibTeX XML Cite \textit{R. Kaushik} et al., J. Discrete Math. Sci. Cryptography 24, No. 8, 2137--2153 (2021; Zbl 07477552) Full Text: DOI OpenURL
Bulavas, Viktoras; Marcinkevičius, Virginijus; Rumiński, Jacek Study of multi-class classification algorithms’ performance on highly imbalanced network intrusion datasets. (English) Zbl 1485.68213 Informatica, Vilnius 32, No. 3, 441-475 (2021). MSC: 68T05 62H30 PDF BibTeX XML Cite \textit{V. Bulavas} et al., Informatica, Vilnius 32, No. 3, 441--475 (2021; Zbl 1485.68213) Full Text: DOI OpenURL
Om Prakash, P. G.; Maram, Balajee; Nalinipriya, G.; Cristin, R. Harmony search hawks optimization-based deep reinforcement learning for intrusion detection in IoT using nonnegative matrix factorization. (English) Zbl 07384798 Int. J. Wavelets Multiresolut. Inf. Process. 19, No. 4, Article ID 2050093, 24 p. (2021). MSC: 68M11 PDF BibTeX XML Cite \textit{P. G. Om Prakash} et al., Int. J. Wavelets Multiresolut. Inf. Process. 19, No. 4, Article ID 2050093, 24 p. (2021; Zbl 07384798) Full Text: DOI OpenURL
Fu, Shuai; Bouguila, Nizar A soft computing model based on asymmetric Gaussian mixtures and Bayesian inference. (English) Zbl 1490.68181 Soft Comput. 24, No. 7, 4841-4853 (2020). MSC: 68T05 62H30 PDF BibTeX XML Cite \textit{S. Fu} and \textit{N. Bouguila}, Soft Comput. 24, No. 7, 4841--4853 (2020; Zbl 1490.68181) Full Text: DOI OpenURL
Dong, Ruihong; Yan, Houhua; Zhang, Qiuyu; Li, Xueyong Distributed WSN intrusion detection model based on deep forest algorithm. (Chinese. English summary) Zbl 1474.94052 J. Lanzhou Univ. Technol. 46, No. 4, 103-109 (2020). MSC: 94A13 68M18 PDF BibTeX XML Cite \textit{R. Dong} et al., J. Lanzhou Univ. Technol. 46, No. 4, 103--109 (2020; Zbl 1474.94052) OpenURL
Amir, Amihood; Levy, Avivit; Porat, Ely; Riva Shalom, B. Online recognition of dictionary with one gap. (English) Zbl 1496.68382 Inf. Comput. 275, Article ID 104633, 22 p. (2020). MSC: 68W32 68R10 PDF BibTeX XML Cite \textit{A. Amir} et al., Inf. Comput. 275, Article ID 104633, 22 p. (2020; Zbl 1496.68382) Full Text: DOI OpenURL
Folino, Gianluigi; Pisani, Francesco Sergio; Pontieri, Luigi A cybersecurity framework for classifying non stationary data streams exploiting genetic programming and ensemble learning. (English) Zbl 07249934 Sergeyev, Yaroslav D. (ed.) et al., Numerical computations: theory and algorithms. Third international conference, NUMTA 2019, Crotone, Italy, June 15–21, 2019. Revised selected papers. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11973, 269-277 (2020). MSC: 65-XX PDF BibTeX XML Cite \textit{G. Folino} et al., Lect. Notes Comput. Sci. 11973, 269--277 (2020; Zbl 07249934) Full Text: DOI OpenURL
Ghosh, Debdas; Sharma, Akshay; Shukla, K. K.; Kumar, Amar; Manchanda, Kartik Globalized robust Markov perfect equilibrium for discounted stochastic games and its application on intrusion detection in wireless sensor networks. I. Theory. (English) Zbl 1435.68053 Japan J. Ind. Appl. Math. 37, No. 1, 283-308 (2020). MSC: 68M18 68M25 91A10 91A15 91A80 PDF BibTeX XML Cite \textit{D. Ghosh} et al., Japan J. Ind. Appl. Math. 37, No. 1, 283--308 (2020; Zbl 1435.68053) Full Text: DOI arXiv OpenURL
Zong, Wei; Chow, Yang-Wai; Susilo, Willy Dimensionality reduction and visualization of network intrusion detection data. (English) Zbl 1443.68040 Jang-Jaccard, Julian (ed.) et al., Information security and privacy. 24th Australasian conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11547, 441-455 (2019). MSC: 68M25 68M10 68T05 PDF BibTeX XML Cite \textit{W. Zong} et al., Lect. Notes Comput. Sci. 11547, 441--455 (2019; Zbl 1443.68040) Full Text: DOI Link OpenURL
Gang, Li An optimization detection algorithm for complex intrusion interference signal in mobile wireless network. (English) Zbl 1458.94089 Discrete Contin. Dyn. Syst., Ser. S 12, No. 4-5, 1371-1384 (2019). MSC: 94A12 94A13 42C40 PDF BibTeX XML Cite \textit{L. Gang}, Discrete Contin. Dyn. Syst., Ser. S 12, No. 4--5, 1371--1384 (2019; Zbl 1458.94089) Full Text: DOI OpenURL
Zhang, Yi Optimized detection algorithm of complex intrusion interference signal in mobile wireless network. (English) Zbl 1481.94065 J. Discrete Math. Sci. Cryptography 21, No. 3, 771-779 (2018). MSC: 94A13 90B18 PDF BibTeX XML Cite \textit{Y. Zhang}, J. Discrete Math. Sci. Cryptography 21, No. 3, 771--779 (2018; Zbl 1481.94065) Full Text: DOI OpenURL
Ahmadian Ramaki, Ali; Rasoolzadegan, Abbas; Javan Jafari, Abbas A systematic review on intrusion detection based on the hidden Markov model. (English) Zbl 07260735 Stat. Anal. Data Min. 11, No. 3, 111-134 (2018). MSC: 62-XX 68-XX PDF BibTeX XML Cite \textit{A. Ahmadian Ramaki} et al., Stat. Anal. Data Min. 11, No. 3, 111--134 (2018; Zbl 07260735) Full Text: DOI OpenURL
Mandal, Mriganka; Dutta, Ratna Efficient adaptively secure public-key trace and revoke from subset cover using Déjà Q framework. (English) Zbl 07124894 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11449, 468-489 (2018). MSC: 94A60 94A62 PDF BibTeX XML Cite \textit{M. Mandal} and \textit{R. Dutta}, Lect. Notes Comput. Sci. 11449, 468--489 (2018; Zbl 07124894) Full Text: DOI OpenURL
Song, Yong; Cai, Zhiping Normalized method of intrusion detection data based on information theory in big data environment. (Chinese. English summary) Zbl 1413.94029 J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 121-126 (2018). MSC: 94A13 94A15 PDF BibTeX XML Cite \textit{Y. Song} and \textit{Z. Cai}, J. Wuhan Univ., Nat. Sci. Ed. 64, No. 2, 121--126 (2018; Zbl 1413.94029) Full Text: DOI OpenURL
Ren, Weiwu; Zhang, Bochen; Di, Xiaoqiang; Lu, Yinan Density clustering anomaly intrusion detection algorithm based on ABC-DBSCAN. (Chinese. English summary) Zbl 1413.68126 J. Jilin Univ., Sci. 56, No. 1, 95-100 (2018). MSC: 68T20 68M15 90C27 PDF BibTeX XML Cite \textit{W. Ren} et al., J. Jilin Univ., Sci. 56, No. 1, 95--100 (2018; Zbl 1413.68126) Full Text: DOI OpenURL
Zheng, Jun; Zhou, Yujie Intrusion detection algorithm based on improved principal component analysis. (English) Zbl 1487.68078 J. Discrete Math. Sci. Cryptography 20, No. 5, 1007-1016 (2017). MSC: 68M25 62H25 PDF BibTeX XML Cite \textit{J. Zheng} and \textit{Y. Zhou}, J. Discrete Math. Sci. Cryptography 20, No. 5, 1007--1016 (2017; Zbl 1487.68078) Full Text: DOI OpenURL
Viswa Bharathy, A. M.; Mahabub Basha, A. A multi-class classification MCLP model with particle swarm optimization for network intrusion detection. (English) Zbl 1381.90101 Sādhanā 42, No. 5, 631-640 (2017). MSC: 90C59 68T10 62H30 90C29 90C05 68M10 PDF BibTeX XML Cite \textit{A. M. Viswa Bharathy} and \textit{A. Mahabub Basha}, Sādhanā 42, No. 5, 631--640 (2017; Zbl 1381.90101) Full Text: DOI Link OpenURL
Ram Prabha, V.; Latha, P. Enhanced multi-attribute trust protocol for malicious node detection in wireless sensor networks. (English) Zbl 1378.68018 Sādhanā 42, No. 2, 143-151 (2017). MSC: 68M12 PDF BibTeX XML Cite \textit{V. Ram Prabha} and \textit{P. Latha}, Sādhanā 42, No. 2, 143--151 (2017; Zbl 1378.68018) Full Text: DOI Link OpenURL
Ismail, Ziad; Kiennert, Christophe; Leneutre, Jean; Chen, Lin A game theoretical model for optimal distribution of network security resources. (English) Zbl 1453.91009 Rass, Stefan (ed.) et al., Decision and game theory for security. 8th international conference, GameSec 2017, Vienna, Austria, October 23–25, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10575, 234-255 (2017). MSC: 91A10 91A80 91B32 PDF BibTeX XML Cite \textit{Z. Ismail} et al., Lect. Notes Comput. Sci. 10575, 234--255 (2017; Zbl 1453.91009) Full Text: DOI OpenURL
Zhang, Heng; Qi, Yifei; Zhou, Huan; Zhang, Jian; Sun, Jing Testing and defending methods against DoS attack in state estimation. (English) Zbl 1370.93264 Asian J. Control 19, No. 4, 1295-1305 (2017). MSC: 93E10 93C55 93C05 PDF BibTeX XML Cite \textit{H. Zhang} et al., Asian J. Control 19, No. 4, 1295--1305 (2017; Zbl 1370.93264) Full Text: DOI OpenURL
Perháč, Ján; Mihályi, Daniel; Novitzká, Valerie Between syntax and semantics of resource oriented logic for IDS behavior description. (English) Zbl 07252035 J. Appl. Math. Comput. Mech. 15, No. 2, 105-118 (2016). MSC: 68N17 03F52 PDF BibTeX XML Cite \textit{J. Perháč} et al., J. Appl. Math. Comput. Mech. 15, No. 2, 105--118 (2016; Zbl 07252035) Full Text: DOI OpenURL
Li, Chang; Liao, Xiaofeng The impact of hybrid quarantine strategies and delay factor on viral prevalence in computer networks. (English) Zbl 1462.34112 Math. Model. Nat. Phenom. 11, No. 4, 105-119 (2016). MSC: 34K60 34K21 34K20 34K18 34K13 92D30 68M10 34K17 34K19 PDF BibTeX XML Cite \textit{C. Li} and \textit{X. Liao}, Math. Model. Nat. Phenom. 11, No. 4, 105--119 (2016; Zbl 1462.34112) Full Text: DOI OpenURL
Du, Hongle; Zhang, Yan; Zhang, Lin Intrusion detection on imbalanced dataset. (Chinese. English summary) Zbl 1374.68373 J. Shandong Univ., Nat. Sci. 51, No. 11, 50-57 (2016). MSC: 68T05 PDF BibTeX XML Cite \textit{H. Du} et al., J. Shandong Univ., Nat. Sci. 51, No. 11, 50--57 (2016; Zbl 1374.68373) OpenURL
Ghafouri, Amin; Abbas, Waseem; Laszka, Aron; Vorobeychik, Yevgeniy; Koutsoukos, Xenofon Optimal thresholds for anomaly-based intrusion detection in dynamical environments. (English) Zbl 1453.91032 Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 415-434 (2016). MSC: 91A43 91A80 68M25 PDF BibTeX XML Cite \textit{A. Ghafouri} et al., Lect. Notes Comput. Sci. 9996, 415--434 (2016; Zbl 1453.91032) Full Text: DOI arXiv OpenURL
Saravanan, K.; Senthilkumar, A. An insight review on Bloom filter and its variants with applications: an emerging hash based membership querying technique. (English) Zbl 1487.68085 J. Discrete Math. Sci. Cryptography 18, No. 3, 247-263 (2015). MSC: 68P05 68M18 PDF BibTeX XML Cite \textit{K. Saravanan} and \textit{A. Senthilkumar}, J. Discrete Math. Sci. Cryptography 18, No. 3, 247--263 (2015; Zbl 1487.68085) Full Text: DOI OpenURL
Sexton, Joseph; Storlie, Curtis; Neil, Joshua Attack chain detection. (English) Zbl 07260450 Stat. Anal. Data Min. 8, No. 5-6, 353-363 (2015). MSC: 62-XX 68-XX PDF BibTeX XML Cite \textit{J. Sexton} et al., Stat. Anal. Data Min. 8, No. 5--6, 353--363 (2015; Zbl 07260450) Full Text: DOI OpenURL
Ennert, Michal; Chovancová, Eva; Dudláková, Zuzana Testing of IDS model using several intrusion detection tools. (English) Zbl 07251873 J. Appl. Math. Comput. Mech. 14, No. 1, 55-62 (2015). MSC: 68M12 90B18 PDF BibTeX XML Cite \textit{M. Ennert} et al., J. Appl. Math. Comput. Mech. 14, No. 1, 55--62 (2015; Zbl 07251873) Full Text: DOI OpenURL
Kuang, Fangjun; Zhang, Siyang; Jin, Zhong; Xu, Weihong A novel SVM by combining kernel principal component analysis and improved chaotic particle swarm optimization for intrusion detection. (English) Zbl 1382.68196 Soft Comput. 19, No. 5, 1187-1199 (2015). MSC: 68T05 62H25 62H30 68M11 68T20 PDF BibTeX XML Cite \textit{F. Kuang} et al., Soft Comput. 19, No. 5, 1187--1199 (2015; Zbl 1382.68196) Full Text: DOI OpenURL
Costa, Kelton A. P.; Pereira, Luis A. M.; Nakamura, Rodrigo Y. M.; Pereira, Clayton R.; Papa, João P.; Xavier Falcão, Alexandre A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networks. (English) Zbl 1360.62323 Inf. Sci. 294, 95-108 (2015). MSC: 62H30 PDF BibTeX XML Cite \textit{K. A. P. Costa} et al., Inf. Sci. 294, 95--108 (2015; Zbl 1360.62323) Full Text: DOI OpenURL
Alexandrov, Dmitriy E. Cardinality estimates for some classes of regular languages. (English. Russian original) Zbl 1386.68083 Discrete Math. Appl. 25, No. 6, 323-337 (2015); translation from Diskretn. Mat. 27, No. 2, 3-21 (2015). MSC: 68Q45 PDF BibTeX XML Cite \textit{D. E. Alexandrov}, Discrete Math. Appl. 25, No. 6, 323--337 (2015; Zbl 1386.68083); translation from Diskretn. Mat. 27, No. 2, 3--21 (2015) Full Text: DOI OpenURL
Aspnes, James; Diamadi, Zoë; Yampolskiy, Aleksandr; Gjøsteen, Kristian; Peralta, René Spreading alerts quietly and the subgroup escape problem. (English) Zbl 1332.94054 J. Cryptology 28, No. 4, 796-819 (2015). MSC: 94A60 PDF BibTeX XML Cite \textit{J. Aspnes} et al., J. Cryptology 28, No. 4, 796--819 (2015; Zbl 1332.94054) Full Text: DOI OpenURL
Huang, Mao Lin; Lu, Liang Fu; Zhang, Xuyun Using arced axes in parallel coordinates geometry for high dimensional bigdata visual analytics in cloud computing. (English) Zbl 1319.68079 Computing 97, No. 4, 425-437 (2015). MSC: 68P20 68P30 PDF BibTeX XML Cite \textit{M. L. Huang} et al., Computing 97, No. 4, 425--437 (2015; Zbl 1319.68079) Full Text: DOI OpenURL
Sorokin, S. N. Intrusion detection method for denial of service attacks on the web-applications. (Russian. English summary) Zbl 07310238 Prikl. Diskretn. Mat. 2014, No. 1(23), 55-64 (2014). MSC: 68-XX 62-XX PDF BibTeX XML Cite \textit{S. N. Sorokin}, Prikl. Diskretn. Mat. 2014, No. 1(23), 55--64 (2014; Zbl 07310238) Full Text: MNR OpenURL
Yang, Xiaoming; Zhang, Xiang; Wang, Jiahao; Wu, Jin; Qin, Zhiguang RFID intrusion detection with finite automation. (Chinese. English summary) Zbl 1324.68009 J. Univ. Electron. Sci. Technol. China 43, No. 5, 775-780 (2014). MSC: 68M10 68M15 68Q45 PDF BibTeX XML Cite \textit{X. Yang} et al., J. Univ. Electron. Sci. Technol. China 43, No. 5, 775--780 (2014; Zbl 1324.68009) Full Text: DOI OpenURL
Stetsko, Andriy; Smolka, Tobiáš; Matyáš, Vashek; Stehlík, Martin Improving intrusion detection systems for wireless sensor networks. (English) Zbl 1404.94115 Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 343-360 (2014). MSC: 94A60 68P25 68M12 PDF BibTeX XML Cite \textit{A. Stetsko} et al., Lect. Notes Comput. Sci. 8479, 343--360 (2014; Zbl 1404.94115) Full Text: DOI OpenURL
Mafra, P. M.; Fraga, J. S.; Santin, A. O. Algorithms for a distributed IDS in MANETs. (English) Zbl 1311.68064 J. Comput. Syst. Sci. 80, No. 3, 554-570 (2014). MSC: 68P25 68W15 PDF BibTeX XML Cite \textit{P. M. Mafra} et al., J. Comput. Syst. Sci. 80, No. 3, 554--570 (2014; Zbl 1311.68064) Full Text: DOI OpenURL
Wahid, Alif; Leckie, Christopher; Zhou, Chenfeng Estimating the number of hosts corresponding to an intrusion alert while preserving privacy. (English) Zbl 1311.68067 J. Comput. Syst. Sci. 80, No. 3, 502-519 (2014). MSC: 68P25 PDF BibTeX XML Cite \textit{A. Wahid} et al., J. Comput. Syst. Sci. 80, No. 3, 502--519 (2014; Zbl 1311.68067) Full Text: DOI OpenURL
Fagiolini, Adriano; Bicchi, Antonio On the robust synthesis of logical consensus algorithms for distributed intrusion detection. (English) Zbl 1364.93260 Automatica 49, No. 8, 2339-2350 (2013). MSC: 93B50 93A14 93B35 93C62 93C65 PDF BibTeX XML Cite \textit{A. Fagiolini} and \textit{A. Bicchi}, Automatica 49, No. 8, 2339--2350 (2013; Zbl 1364.93260) Full Text: DOI Link OpenURL
Fan, Wentao; Bouguila, Nizar Infinite Dirichlet mixture models learning via expectation propagation. (English) Zbl 1308.62046 Adv. Data Anal. Classif., ADAC 7, No. 4, 465-489 (2013). MSC: 62F15 62H30 62G99 62M99 PDF BibTeX XML Cite \textit{W. Fan} and \textit{N. Bouguila}, Adv. Data Anal. Classif., ADAC 7, No. 4, 465--489 (2013; Zbl 1308.62046) Full Text: DOI OpenURL
Manshaei, Mohammad Hossein; Zhu, Quanyan; Alpcan, Tansu; Bacşar, Tamer; Hubaux, Jean-Pierre Game theory meets network security and privacy. (English) Zbl 1293.91042 ACM Comput. Surv. 45, No. 3, Paper No. 1, 39 p. (2013). MSC: 91A80 68M10 68-02 94A60 PDF BibTeX XML Cite \textit{M. H. Manshaei} et al., ACM Comput. Surv. 45, No. 3, Paper No. 1, 39 p. (2013; Zbl 1293.91042) Full Text: DOI OpenURL
Ni, Tongguang; Gu, Xiaoqing; Wang, Hongyuan; Li, Yu Real-time detection of application-layer DDoS attack using time series analysis. (English) Zbl 1291.93205 J. Control Sci. Eng. 2013, Article ID 821315, 6 p. (2013). MSC: 93C83 68M11 93E03 62H30 PDF BibTeX XML Cite \textit{T. Ni} et al., J. Control Sci. Eng. 2013, Article ID 821315, 6 p. (2013; Zbl 1291.93205) Full Text: DOI OpenURL
Liang, Xiannuan; Xiao, Yang Mobile sensor intrusion detection under any shape of curve. (English) Zbl 1286.94036 Math. Comput. Modelling 57, No. 11-12, 2904-2917 (2013). MSC: 94A13 68T40 PDF BibTeX XML Cite \textit{X. Liang} and \textit{Y. Xiao}, Math. Comput. Modelling 57, No. 11--12, 2904--2917 (2013; Zbl 1286.94036) Full Text: DOI OpenURL
Apon, Daniel; Katz, Jonathan; Malozemoff, Alex J. One-round multi-party communication complexity of distinguishing sums. (English) Zbl 1296.68072 Theor. Comput. Sci. 501, 101-108 (2013). MSC: 68Q25 68Q05 68M12 PDF BibTeX XML Cite \textit{D. Apon} et al., Theor. Comput. Sci. 501, 101--108 (2013; Zbl 1296.68072) Full Text: DOI arXiv OpenURL
Chwalinski, Pawel; Belavkin, Roman; Cheng, Xiaochun Detection of HTTP-GET attack with clustering and information theoretic measurements. (English) Zbl 1317.94098 Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 5th international symposium, FPS 2012, Montreal, QC, Canada, October 25–26, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37118-9/pbk). Lecture Notes in Computer Science 7743, 45-61 (2013). MSC: 94A60 68P25 PDF BibTeX XML Cite \textit{P. Chwalinski} et al., Lect. Notes Comput. Sci. 7743, 45--61 (2013; Zbl 1317.94098) Full Text: DOI OpenURL
Sindhu, Siva S. Sivatha; Geetha, S.; Kannan, A. Evolving optimised decision rules for intrusion detection using particle swarm paradigm. (English) Zbl 1314.68297 Int. J. Syst. Sci. 43, No. 12, 2334-2350 (2012). MSC: 68T20 68T05 68T10 PDF BibTeX XML Cite \textit{S. S. S. Sindhu} et al., Int. J. Syst. Sci. 43, No. 12, 2334--2350 (2012; Zbl 1314.68297) Full Text: DOI OpenURL
Kloft, Marius; Laskov, Pavel Security analysis of online centroid anomaly detection. (English) Zbl 1433.68357 J. Mach. Learn. Res. 13, 3681-3724 (2012). MSC: 68T05 62G10 PDF BibTeX XML Cite \textit{M. Kloft} and \textit{P. Laskov}, J. Mach. Learn. Res. 13, 3681--3724 (2012; Zbl 1433.68357) Full Text: arXiv Link OpenURL
Liang, Xiannuan; Xiao, Yang Studying the stochastic capturing of moving intruders by mobile sensors. (English) Zbl 1268.94014 Comput. Math. Appl. 64, No. 8, 2431-2449 (2012). MSC: 94A13 93C95 PDF BibTeX XML Cite \textit{X. Liang} and \textit{Y. Xiao}, Comput. Math. Appl. 64, No. 8, 2431--2449 (2012; Zbl 1268.94014) Full Text: DOI OpenURL
Acampora, Giovanni Exploiting timed automata based fuzzy controllers for designing adaptive intrusion detection systems. (English) Zbl 1255.68132 Soft Comput. 16, No. 7, 1183-1196 (2012). MSC: 68T10 68Q45 93C42 PDF BibTeX XML Cite \textit{G. Acampora}, Soft Comput. 16, No. 7, 1183--1196 (2012; Zbl 1255.68132) Full Text: DOI OpenURL
Sapozhnikov, A. Automation of the construction of models of normal program behavior. (English. Russian original) Zbl 1253.68098 Program. Comput. Softw. 38, No. 4, 210-217 (2012); translation from Programmirovanie 38, No. 4 (2012). MSC: 68N30 68N20 PDF BibTeX XML Cite \textit{A. Sapozhnikov}, Program. Comput. Softw. 38, No. 4, 210--217 (2012; Zbl 1253.68098); translation from Programmirovanie 38, No. 4 (2012) Full Text: DOI OpenURL
Dohi, Tadashi; Uemura, Toshikazu An adaptive mode control algorithm of a scalable intrusion tolerant architecture. (English) Zbl 1250.68062 J. Comput. Syst. Sci. 78, No. 6, 1751-1774 (2012). MSC: 68M10 62P99 94C12 PDF BibTeX XML Cite \textit{T. Dohi} and \textit{T. Uemura}, J. Comput. Syst. Sci. 78, No. 6, 1751--1774 (2012; Zbl 1250.68062) Full Text: DOI OpenURL
Polunchenko, Aleksey S.; Tartakovsky, Alexander G.; Mukhopadhyay, Nitis Nearly optimal change-point detection with an application to cybersecurity. (English) Zbl 1274.62515 Sequential Anal. 31, No. 3, 409-435 (2012). MSC: 62L10 62L15 62P30 PDF BibTeX XML Cite \textit{A. S. Polunchenko} et al., Sequential Anal. 31, No. 3, 409--435 (2012; Zbl 1274.62515) Full Text: arXiv OpenURL
Mcareavey, Kevin; Liu, Weiru; Miller, Paul; Mu, Kedian Measuring inconsistency in a network intrusion detection rule set based on Snort. (English) Zbl 1234.68376 Int. J. Semant. Comput. 5, No. 3 (2011). MSC: 68T37 68T27 68T35 PDF BibTeX XML Full Text: DOI OpenURL
Wang, Yun; Lun, Zhengdong Intrusion detection in a \(K\)-Gaussian distributed wireless sensor network. (English) Zbl 1231.68094 J. Parallel Distrib. Comput. 71, No. 12, 1598-1607 (2011). MSC: 68M14 PDF BibTeX XML Cite \textit{Y. Wang} and \textit{Z. Lun}, J. Parallel Distrib. Comput. 71, No. 12, 1598--1607 (2011; Zbl 1231.68094) Full Text: DOI OpenURL
Shen, Shigen; Li, Yuanjie; Xu, Hongyun; Cao, Qiying Signaling game based strategy of intrusion detection in wireless sensor networks. (English) Zbl 1231.68061 Comput. Math. Appl. 62, No. 6, 2404-2416 (2011). MSC: 68M12 91A80 PDF BibTeX XML Cite \textit{S. Shen} et al., Comput. Math. Appl. 62, No. 6, 2404--2416 (2011; Zbl 1231.68061) Full Text: DOI OpenURL
Zhu, Quanyan; Başar, Tamer Indices of power in optimal IDS default configuration: theory and examples. (English) Zbl 1349.68018 Baras, John S. (ed.) et al., Decision and game theory for security. Second international conference, GameSec 2011, College Park, MD, Maryland, USA, November 14–15, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25279-2/pbk). Lecture Notes in Computer Science 7037, 7-21 (2011). MSC: 68M10 90C27 91A12 91A80 PDF BibTeX XML Cite \textit{Q. Zhu} and \textit{T. Başar}, Lect. Notes Comput. Sci. 7037, 7--21 (2011; Zbl 1349.68018) Full Text: DOI arXiv OpenURL
Tang, Ji-yong; Song, Hua; Sun, Hao; Deng, Ya-ping Intrusion detection based on rough set theory and kernel matching pursuit. (Chinese. English summary) Zbl 1246.68188 J. Comput. Appl. 30, No. 5, 1202-1205 (2010). MSC: 68T05 PDF BibTeX XML Cite \textit{J.-y. Tang} et al., J. Comput. Appl. 30, No. 5, 1202--1205 (2010; Zbl 1246.68188) OpenURL
Huang, Xiao-wen; Zhang, Chi Techniques for intrusion detection based on adaptive intuitionistic fuzzy reasoning. (Chinese. English summary) Zbl 1246.68181 J. Comput. Appl. 30, No. 5, 1198-1201 (2010). MSC: 68T05 68T37 68M99 PDF BibTeX XML Cite \textit{X.-w. Huang} and \textit{C. Zhang}, J. Comput. Appl. 30, No. 5, 1198--1201 (2010; Zbl 1246.68181) OpenURL
Zhang, Ya-Ling; Han, Zhao-Guo; Ren, Jiao-Xia Method for network anomaly detection with multi-measure based on relative entropy theory. (Chinese. English summary) Zbl 1247.68080 J. Comput. Appl. 30, No. 7, 1771-1774 (2010). MSC: 68P25 PDF BibTeX XML Cite \textit{Y.-L. Zhang} et al., J. Comput. Appl. 30, No. 7, 1771--1774 (2010; Zbl 1247.68080) Full Text: DOI OpenURL
Chen, Ing-Ray; Wang, Yating; Wang, Ding-Chau Reliability of wireless sensors with code attestation for intrusion detection. (English) Zbl 1234.68039 Inf. Process. Lett. 110, No. 17, 778-786 (2010). MSC: 68M15 PDF BibTeX XML Cite \textit{I.-R. Chen} et al., Inf. Process. Lett. 110, No. 17, 778--786 (2010; Zbl 1234.68039) Full Text: DOI OpenURL
Guo, Dechao; Cai, Lidong Intrusion detection using wavelet neural networks with genetic and Levenberg-Marquardt algorithms. (Chinese. English summary) Zbl 1240.68179 J. Jinan Univ., Nat. Sci. Med. Ed. 31, No. 1, 24-28 (2010). MSC: 68T05 92B20 42C40 PDF BibTeX XML Cite \textit{D. Guo} and \textit{L. Cai}, J. Jinan Univ., Nat. Sci. Med. Ed. 31, No. 1, 24--28 (2010; Zbl 1240.68179) OpenURL
Ming, Zhong; Lin, Chaozhe; Cai, Shubin Parallel proximal support vector machine and its application in intrusion detection. (English) Zbl 1240.68203 J. Shenzhen Univ., Sci. Eng. 27, No. 3, 327-333 (2010). MSC: 68T05 PDF BibTeX XML Cite \textit{Z. Ming} et al., J. Shenzhen Univ., Sci. Eng. 27, No. 3, 327--333 (2010; Zbl 1240.68203) OpenURL
Xu, J.; Shelton, C. R. Intrusion detection using continuous time Bayesian networks. (English) Zbl 1210.68087 J. Artif. Intell. Res. (JAIR) 39, 745-774 (2010). MSC: 68T05 68M10 PDF BibTeX XML Cite \textit{J. Xu} and \textit{C. R. Shelton}, J. Artif. Intell. Res. (JAIR) 39, 745--774 (2010; Zbl 1210.68087) Full Text: DOI arXiv OpenURL
Čisar, Petar; Čisar, Sanja Maravić Network statistics in function of statistical intrusion detection. (English) Zbl 1209.68014 Rudas, Imre J.(ed) et al., Computational intelligence and informatics. Selected papers based on the presentations at the 10th international symposium of Hungarian researchers on computational intelligence and informatics, Budapest, Hungary, November 12–14, 2009. Berlin: Springer (ISBN 978-3-642-15219-1/hbk; 978-3-642-15220-7/ebook). Studies in Computational Intelligence 313, 27-35 (2010). MSC: 68M10 68M99 PDF BibTeX XML Cite \textit{P. Čisar} and \textit{S. M. Čisar}, Stud. Comput. Intell. 313, 27--35 (2010; Zbl 1209.68014) Full Text: DOI OpenURL
Takahashi, Daisuke; Xiao, Yang; Zhang, Yan; Chatzimisios, Periklis; Chen, Hsiao-Hwa IEEE 802.11 user fingerprinting and its applications for intrusion detection. (English) Zbl 1198.94164 Comput. Math. Appl. 60, No. 2, 307-318 (2010). MSC: 94A62 PDF BibTeX XML Cite \textit{D. Takahashi} et al., Comput. Math. Appl. 60, No. 2, 307--318 (2010; Zbl 1198.94164) Full Text: DOI OpenURL
Pareek, Vikas; Mishra, Aditi; Sharma, Arpana; Chauhan, Rashmi; Bansal, Shruti A deviation based outlier intrusion detection system. (English) Zbl 1207.68061 Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 395-401 (2010). MSC: 68M10 68T05 68M11 PDF BibTeX XML Cite \textit{V. Pareek} et al., Commun. Comput. Inf. Sci. 89, 395--401 (2010; Zbl 1207.68061) Full Text: DOI OpenURL
Subbulakshmi, T.; Shalinie, S. Mercy; Reddy, C. Suneel; Ramamoorthi, A. Detection and classification of DDoS attacks using fuzzy inference system. (English) Zbl 1210.68021 Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 242-252 (2010). MSC: 68M10 PDF BibTeX XML Cite \textit{T. Subbulakshmi} et al., Commun. Comput. Inf. Sci. 89, 242--252 (2010; Zbl 1210.68021) Full Text: DOI OpenURL
Sangeetha, S.; Haripriya, S.; Priya, S. G. Mohana; Vaidehi, V.; Srinivasan, N. Fuzzy rule-base based intrusion detection system on application layer. (English) Zbl 1210.68020 Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 27-36 (2010). MSC: 68M10 PDF BibTeX XML Cite \textit{S. Sangeetha} et al., Commun. Comput. Inf. Sci. 89, 27--36 (2010; Zbl 1210.68020) Full Text: DOI OpenURL
Fisch, Dominik; Kastl, Ferdinand; Sick, Bernhard Novelty-aware attack recognition - intrusion detection with organic computing techniques. (English) Zbl 1202.68081 Hinchey, Mike (ed.) et al., Distributed, parallel and biologically inspired systems. 7th IFIP TC 10 working conference, DIPES 2010, and 3rd IFIP TC 10 international conference biologically-inspired collaborative computing, BICC 2010, held as part of WCC 2010, Brisbane, Australia, September 20–23, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15233-7/hbk; 978-3-642-15234-4/ebook). IFIP Advances in Information and Communication Technology 329, 242-253 (2010). MSC: 68M99 68M14 PDF BibTeX XML Cite \textit{D. Fisch} et al., IFIP Adv. Inf. Commun. Technol. 329, 242--253 (2010; Zbl 1202.68081) Full Text: DOI OpenURL
Laskov, Pavel; Lippmann, Richard Machine learning in adversarial environments. (English) Zbl 1470.68131 Mach. Learn. 81, No. 2, 115-119 (2010). MSC: 68T05 68M11 91A80 PDF BibTeX XML Cite \textit{P. Laskov} and \textit{R. Lippmann}, Mach. Learn. 81, No. 2, 115--119 (2010; Zbl 1470.68131) Full Text: DOI OpenURL
Verma, Nischal; Trousset, François; Poncelet, Pascal; Masseglia, Florent Intrusion detections in collaborative organizations by preserving privacy. (English) Zbl 1198.68086 Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 235-247 (2010). MSC: 68M10 PDF BibTeX XML Cite \textit{N. Verma} et al., Stud. Comput. Intell. 292, 235--247 (2010; Zbl 1198.68086) Full Text: DOI OpenURL
Singh, Goverdhan; Masseglia, Florent; Fiot, Céline; Marascu, Alice; Poncelet, Pascal Mining common outliers for intrusion detection. (English) Zbl 1202.68122 Guillet, F. (ed.) et al., Advances in knowledge discovery and management. Selected papers based on the presentations at the “Extraction et gestion des connaissances” conference 2009 (EGC), Strasbourg, France, January 2009. Berlin: Springer (ISBN 978-3-642-00579-4/hbk). Studies in Computational Intelligence 292, 217-234 (2010). MSC: 68P05 68M99 68T10 PDF BibTeX XML Cite \textit{G. Singh} et al., Stud. Comput. Intell. 292, 217--234 (2010; Zbl 1202.68122) Full Text: DOI OpenURL
Li, Zhichun; Gao, Yan; Chen, Yan HiFIND: a high-speed flow-level intrusion detection approach with DoS resiliency. (English) Zbl 1204.68019 Comput. Netw. 54, No. 8, 1282-1299 (2010). MSC: 68M10 PDF BibTeX XML Cite \textit{Z. Li} et al., Comput. Netw. 54, No. 8, 1282--1299 (2010; Zbl 1204.68019) Full Text: DOI OpenURL
Joseph, John Felix Charles; Das, Amitabha; Lee, Bu-Sung; Seet, Boon-Chong CARRADS: cross layer based adaptive real-time routing attack detection system for MANETS. (English) Zbl 1202.68031 Comput. Netw. 54, No. 7, 1126-1141 (2010). MSC: 68M10 PDF BibTeX XML Cite \textit{J. F. C. Joseph} et al., Comput. Netw. 54, No. 7, 1126--1141 (2010; Zbl 1202.68031) Full Text: DOI OpenURL
Meisel, Michael; Pappas, Vasileios; Zhang, Lixia A taxonomy of biologically inspired research in computer networking. (English) Zbl 1202.68038 Comput. Netw. 54, No. 6, 901-916 (2010). MSC: 68M10 PDF BibTeX XML Cite \textit{M. Meisel} et al., Comput. Netw. 54, No. 6, 901--916 (2010; Zbl 1202.68038) Full Text: DOI OpenURL
Golovko, Vladimir; Bezobrazov, Sergei; Kachurka, Pavel; Vaitsekhovich, Leanid Neural network and artificial immune systems for malware and network intrusion detection. (English) Zbl 1185.68526 Koronacki, Jacek (ed.) et al., Advances in machine learning II. Dedicated to the memory of Professor Ryszard S. Michalski. Berlin: Springer (ISBN 978-3-642-05178-4/hbk; 978-3-642-05179-1/ebook). Studies in Computational Intelligence 263, 485-513 (2010). MSC: 68T05 68N99 PDF BibTeX XML Cite \textit{V. Golovko} et al., Stud. Comput. Intell. 263, 485--513 (2010; Zbl 1185.68526) Full Text: DOI OpenURL
Chen, Yuehui; Abraham, Ajith Tree-structure based hybrid computational intelligence. Theoretical foundations and applications. (English) Zbl 1195.68076 Intelligent Systems Reference Library 2. Berlin: Springer (ISBN 978-3-642-04738-1/hbk; 978-3-642-26120-6/pbk; 978-3-642-04739-8/ebook). xiv, 206 p. (2010). Reviewer: Ruxandra Stoean (Craiova) MSC: 68T01 68T05 68T10 68T20 68T35 68U99 68-02 PDF BibTeX XML Cite \textit{Y. Chen} and \textit{A. Abraham}, Tree-structure based hybrid computational intelligence. Theoretical foundations and applications. Berlin: Springer (2010; Zbl 1195.68076) Full Text: DOI OpenURL
Tsai, Chih-Fong; Lin, Chia-Ying A triangle area based nearest neighbors approach to intrusion detection. (English) Zbl 1187.68508 Pattern Recognition 43, No. 1, 222-229 (2010). MSC: 68T10 68T05 PDF BibTeX XML Cite \textit{C.-F. Tsai} and \textit{C.-Y. Lin}, Pattern Recognition 43, No. 1, 222--229 (2010; Zbl 1187.68508) Full Text: DOI OpenURL
Jecheva, Veselina; Nikolova, Evgeniya Classification trees as a technique for creating anomaly-based intrusion detection systems. (English) Zbl 1198.94059 Serdica J. Comput. 3, No. 4, 335-358 (2009). MSC: 94A13 68T10 03C90 68M99 PDF BibTeX XML Cite \textit{V. Jecheva} and \textit{E. Nikolova}, Serdica J. Comput. 3, No. 4, 335--358 (2009; Zbl 1198.94059) Full Text: EuDML OpenURL
Bojanić, Slobodan; Pejović, Vukašin; Caffarena, Gabriel; Milovanović, Vladimir; Carreras, Carlos; Popović, Jelena Behavioural biometrics hardware based on bioinformatics matching. (English) Zbl 1191.68119 Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 171-178 (2009). MSC: 68M99 PDF BibTeX XML Cite \textit{S. Bojanić} et al., Adv. Intell. Soft Comput. 63, 171--178 (2009; Zbl 1191.68119) Full Text: DOI OpenURL
Herrero, Álvaro; Corchado, Emilio Multiagent systems for network intrusion detection: A review. (English) Zbl 1191.68727 Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 143-154 (2009). MSC: 68T42 68M10 PDF BibTeX XML Cite \textit{Á. Herrero} and \textit{E. Corchado}, Adv. Intell. Soft Comput. 63, 143--154 (2009; Zbl 1191.68727) Full Text: DOI OpenURL
Agrawal, Hira; Behrens, Clifford; Dasarathy, Balakrishnan; Fook, Leslie Lee Learning program behavior for run-time software assurance. (English) Zbl 1191.68483 Herrero, Álvaro (ed.) et al., Computational intelligence in security for information systems. CISIS’09, 2nd international workshop, Burgos, Spain, September 23–26, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04090-0/pbk; 978-3-642-04091-7/ebook). Advances in Intelligent and Soft Computing 63, 135-142 (2009). MSC: 68T05 68N99 PDF BibTeX XML Cite \textit{H. Agrawal} et al., Adv. Intell. Soft Comput. 63, 135--142 (2009; Zbl 1191.68483) Full Text: DOI OpenURL
Song, Tian; Wang, Dongsheng; Tang, Zhizhong A parameterized multilevel pattern matching architecture on FPGAs for network intrusion detection and prevention. (English) Zbl 1192.68609 Sci. China, Ser. F 52, No. 6, 949-963 (2009). MSC: 68T10 PDF BibTeX XML Cite \textit{T. Song} et al., Sci. China, Ser. F 52, No. 6, 949--963 (2009; Zbl 1192.68609) Full Text: DOI OpenURL
Om, Hari; Sarkar, Tapas K. Neural network based intrusion detection system for detecting changes in hardware profile. (English) Zbl 1184.68419 J. Discrete Math. Sci. Cryptography 12, No. 4, 451-466 (2009). MSC: 68T05 68M99 68P25 PDF BibTeX XML Cite \textit{H. Om} and \textit{T. K. Sarkar}, J. Discrete Math. Sci. Cryptography 12, No. 4, 451--466 (2009; Zbl 1184.68419) Full Text: DOI OpenURL
Panigrahi, Suvasini; Sural, Shamik Detection of database intrusion using a two-stage fuzzy system. (English) Zbl 1343.68070 Samarati, Pierangela (ed.) et al., Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). Lecture Notes in Computer Science 5735, 107-120 (2009). MSC: 68P15 68P25 PDF BibTeX XML Cite \textit{S. Panigrahi} and \textit{S. Sural}, Lect. Notes Comput. Sci. 5735, 107--120 (2009; Zbl 1343.68070) Full Text: DOI OpenURL
Zhang, Wei; Teng, Shao-hua; Fu, Xiu-fen Cooperative network intrusion detection based on data fusion. (Chinese. English summary) Zbl 1170.68333 J. Comput. Appl. 29, No. 1, 284-287 (2009). MSC: 68M10 68M99 PDF BibTeX XML Cite \textit{W. Zhang} et al., J. Comput. Appl. 29, No. 1, 284--287 (2009; Zbl 1170.68333) Full Text: DOI OpenURL
Li, Heng-jie Intrusion detection method based on rough set and adaptive boost. (Chinese. English summary) Zbl 1170.68408 J. Comput. Appl. 29, No. 1, 181-184 (2009). MSC: 68M99 68T05 PDF BibTeX XML Cite \textit{H.-j. Li}, J. Comput. Appl. 29, No. 1, 181--184 (2009; Zbl 1170.68408) Full Text: DOI OpenURL
He, Di; Leung, Henry Network intrusion detection using a stochastic resonance CFAR technique. (English) Zbl 1175.94051 Circuits Syst. Signal Process. 28, No. 3, 361-375 (2009). MSC: 94A13 93E10 PDF BibTeX XML Cite \textit{D. He} and \textit{H. Leung}, Circuits Syst. Signal Process. 28, No. 3, 361--375 (2009; Zbl 1175.94051) Full Text: DOI OpenURL
Perdisci, Roberto; Ariu, Davide; Fogla, Prahlad; Giacinto, Giorgio; Lee, Wenke McPAD: A multiple classifier system for accurate payload-based anomaly detection. (English) Zbl 1188.68045 Comput. Netw. 53, No. 6, 864-881 (2009). MSC: 68M10 PDF BibTeX XML Cite \textit{R. Perdisci} et al., Comput. Netw. 53, No. 6, 864--881 (2009; Zbl 1188.68045) Full Text: DOI OpenURL