Abbes, T., Bouhoula, A., Rusinowitch, M.: Efficient decision tree for protocol analysis in intrusion detection. International Journal of Security and Networks 5(4), 220–235 (2010)
CrossRef
Google Scholar
Georgios, S., Sokratis, K.: Reducing false positives in intrusion detection systems. Computers and Security 29(1), 35–44 (2010)
CrossRef
Google Scholar
Karam, F.W., Jensen, T.: A Survey on QoS in Next Generation Networks. Advances in Information Sciences and Service Sciences 2(4), 91–102 (2010)
CrossRef
Google Scholar
Boujelbene, S., Mezghani, D., Ellouze, N.: Improving SVM by modifying kernel functions for speaker identification task. International Journal of Digital Content Technology and its Applications 4(6), 100–105 (2010)
CrossRef
Google Scholar
Janakiraman, S., Vasudevan, V.: An intelligent distributed intrusion detection system using genetic algorithm. Journal of Convergence Information Technology 4(1), 70–76 (2009)
Google Scholar
Zhang, Z., Shen, H.: Application of online training SVMs for realtime intrusion detection with different considerations. Computer Communications 28(12), 1428–1442 (2005)
CrossRef
Google Scholar
Peddabachigari, S., Abraham, A., Grosan, C.: Modeling intrusion detection system using hybrid intelligent systems. Journal of Network and Computer Applications 30(1), 114–132 (2007)
CrossRef
Google Scholar
Pal, O., Jain, P., Goyal, S.: Intrusion detection using graph support: a hybrid approach of supervised and unsupervised Techniques. International Journal of Advancements in Computing Technology 2(3), 114–118 (2010)
CrossRef
Google Scholar
Ahmed, P., Qais, Q., Christopher, W.: A survey of intrusion detection and prevention systems. Information Management and Computer Security 18(4), 277–290 (2010)
CrossRef
Google Scholar
Nitesh, G., Sotirios, Z.: Efficient hardware support for pattern matching in network intrusion detection. Computers and Security 29(7), 756–769 (2010)
CrossRef
Google Scholar
Zhuang, Z., Li, Y., Chen, Z.: Enhancing intrusion detection system with proximity information. International Journal of Security and Networks 5(4), 207–219 (2010)
CrossRef
Google Scholar
Nam, P., Hyun, S., Won, L.: Anomaly intrusion detection by clustering transactional audit streams in a host computer. Information Sciences 180(12), 2375–2389 (2010)
CrossRef
Google Scholar
Benfano, S., Lucas, V., Ning, W.: Hybrid pattern matching for trusted intrusion detection. Security and Communication Networks 4(1), 33–43 (2011)
CrossRef
Google Scholar
Zhou, C., Leckie, C., Karunasekera, S.: A survey of coordinated attacks and collaborative intrusion detection. Computers and Security 29(1), 124–140 (2010)
CrossRef
Google Scholar
Lee, W., Stolfo, S., Mok, K.: A data mining framework for building intrusion detection models. In: Proceeding of the IEEE Symposium on Security and Privacy, pp. 120–132 (1999)
Google Scholar
Asaka, M., Onabura, T., Inoue, S.: A new intrusion detection method based on discriminant analysis. IEICE Transactions on Information and Systems 84(5), 570–577 (2001)
Google Scholar
Sang, H., Won, S.: An anomaly intrusion detection method by clustering normal user behavior. Computers and Security 22(7), 596–612 (2003)
CrossRef
Google Scholar
Jing, J., Papavassiliou, S.: Enhancing network traffic prediction and anomaly detection via statistical network traffic separation and combination strategies. Computer Communications 29(10), 1627–1638 (2006)
CrossRef
Google Scholar
Ye, N., Zhang, Y., Borror, C.: Robustness of the Markov-chain model for cyber-attack detection. IEEE Transactions on Reliability 53(1), 116–123 (2004)
CrossRef
Google Scholar