Information Technology Reference
In-Depth Information
Regional Development Fund). The authors would also like to thank the vehicle inte-
rior manufacturer, Grupo Antolin Ingenieria S.A., within the framework of the
MAGNO2008 - 1028.- CENIT Project also funded by the MICINN, the Spanish Min-
istry of Science and Innovation PID 560300-2009-11 and the Junta de Castilla y Len
CCTT/10/BU/0002.
References
1. Computer Security Threat Monitoring and Surveillance. Technical Report. James P.
Anderson Co. (1980)
2. Denning, D.E.: An Intrusion-Detection Model. IEEE Transactions on Software Engineer-
ing 13(2), 222-232 (1987)
3. Chih-Fong, T., Yu-Feng, H., Chia-Ying, L., Wei-Yang, L.: Intrusion Detection by Ma-
chine Learning: A Review. Expert Systems with Applications 36(10), 11994-12000 (2009)
4. Abraham, A., Grosan, C., Martin-Vide, C.: Evolutionary Design of Intrusion Detection
Programs. International Journal of Network Security 4(3), 328-339 (2007)
5. Julisch, K.: Data Mining for Intrusion Detection: A Critical Review. In: Applications of
Data Mining in Computer Security. AIS, pp. 33-62. Kluwer Academic Publishers,
Dordrecht (2002)
6. Giacinto, G., Roli, F., Didaci, L.: Fusion of Multiple Classifiers for Intrusion Detection in
Computer Networks. Pattern Recognition Letters 24(12), 1795-1803 (2003)
7. Chebrolu, S., Abraham, A., Thomas, J.P.: Feature Deduction and Ensemble Design of In-
trusion Detection Systems. Computers & Security 24(4), 295-307 (2005)
8. Kim, H.K., Im, K.H., Park, S.C.: DSS for Computer Security Incident Response Applying
CBR and Collaborative Response. Expert Systems with Applications 37(1), 852-870
(2010)
9. Tajbakhsh, A., Rahmati, M., Mirzaei, A.: Intrusion Detection using Fuzzy Association
Rules. Applied Soft Computing 9(2), 462-469 (2009)
10. Sarasamma, S.T., Zhu, Q.M.A., Huff, J.: Hierarchical Kohonenen Net for Anomaly Detec-
tion in Network Security. IEEE Transactions on Systems Man and Cybernetics, Part
B 35(2), 302-312 (2005)
11. Herrero, Á., Corchado, E., Gastaldo, P., Zunino, R.: Neural Projection Techniques for the
Visual Inspection of Network Traffic. Neurocomputing 72(16-18), 3649-3658 (2009)
12. Zhang, C., Jiang, J., Kamel, M.: Intrusion Detection using Hierarchical Neural Networks.
Pattern Recognition Letters 26(6), 779-791 (2005)
13. Marchette, D.J.: Computer Intrusion Detection and Network Monitoring: A Statistical
Viewpoint. In: Information Science and Statistics. Springer, New York (2001)
14. Roesch, M.: Snort-Lightweight Intrusion Detection for Networks. In: 13th Systems Ad-
ministration Conference (LISA 1999), pp. 229-238 (1999)
15. Ranum, M.J.: Experiences Benchmarking Intrusion Detection Systems. NFR Security
Technical Publications (2001)
16. Corchado, E., Herrero, Á., Sáiz, J.M.: Testing CAB-IDS Through Mutations: On the Iden-
tification of Network Scans. In: Gabrys, B., Howlett, R.J., Jain, L.C. (eds.) KES 2006.
LNCS (LNAI), vol. 4252, pp. 433-441. Springer, Heidelberg (2006)
17. Corchado, E., Herrero, Á.: Neural Visualization of Network Traffic Data for Intrusion De-
tection. Applied Soft Computing 11(2), 2042-2056 (2011)
Search WWH ::




Custom Search