共 50 条
- [31] Evaluating credibility of shared messages among cooperative intrusion detection systems [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 395 - 400
- [32] Evaluating Performance of Intrusion Detection Systems under Different Configurations in SDN [J]. PROCEEDINGS OF THE 2023 INTERNATIONAL SYMPOSIUM ON THEORY, ALGORITHMIC FOUNDATIONS, AND PROTOCOL DESIGN FOR MOBILE NETWORKS AND MOBILE COMPUTING, MOBIHOC 2023, 2023, : 418 - 423
- [33] An approach to generating testing traffic in evaluating network intrusion detection systems [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS, AND INFORMATICS, VOL XVI, PROCEEDINGS, 2004, : 511 - 515
- [34] A Dataset for Evaluating Intrusion Detection Systems in IEEE 802.11 Wireless Networks [J]. 2014 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2014,
- [35] Evaluating the Impact of Data Preprocessing Techniques on the Performance of Intrusion Detection Systems [J]. Journal of Network and Systems Management, 2024, 32
- [36] A hybrid method to intrusion detection systems using HMM [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2005, 3816 : 389 - 396
- [37] Moving Dispersion Method for Statistical Anomaly Detection in Intrusion Detection Systems [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2009, 1 (02): : 71 - 90
- [38] Detection and Update Method for Attack Behavior Models in Intrusion Detection Systems [J]. PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2119 - 2124
- [39] A comprehensive approach to detect unknown attacks via intrusion detection alerts [J]. ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 247 - +
- [40] Managing intrusion-detection alerts based on fuzzy comprehensive evaluation [J]. Proceedings of the 8th Joint Conference on Information Sciences, Vols 1-3, 2005, : 140 - 143