Adaptive intrusion detection with data mining

@inproceedings{Hossain2003AdaptiveID,
  title={Adaptive intrusion detection with data mining},
  author={Mahmood Hossain and Susan M. Bridges and Rayford B. Vaughn},
  booktitle={SMC},
  year={2003}
}
Highly Cited
This paper has 47 citations. REVIEW CITATIONS

From This Paper

Topics from this paper.

Citations

Publications citing this paper.
Showing 1-10 of 26 extracted citations

Using Genetic Algorithm to Improve an Online Response System for Anomaly Traffic by Incremental Mining

International Symposium on Parallel and Distributed Processing with Applications • 2010
View 7 Excerpts
Highly Influenced

Using Incremental Mining to Generate Fuzzy Rules for Real-Time Network Intrusion Detection Systems

22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008) • 2008
View 4 Excerpts
Highly Influenced

A NOVEL APPROACH FOR DETECTING DDoS ATTACK IN H-IDS USING ASSOCIATION RULE

2018 IEEE International Conference on System, Computation, Automation and Networking (ICSCA) • 2018

SaFe-NeC: A scalable and flexible system for network data characterization

NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium • 2016
View 1 Excerpt

SeLINA: A Self-Learning Insightful Network Analyzer

IEEE Transactions on Network and Service Management • 2016
View 2 Excerpts

Similar Papers

Loading similar papers…