Index of /papers/IDS/nids

[ICO]NameLast modifiedSizeDescription

[PARENTDIR]Parent Directory  -  
[TXT]indexdate.html2010-11-14 14:12 268  
[TXT]indexdate2.html2010-11-14 14:12 268  
[TXT]indexsize.html2010-11-14 14:12 268  
[TXT]indexsize2.html2010-11-14 14:12 268  
[   ]Combining-Knowledge-Discovery-and-Knowledge-Engineering-to-Build-IDS.pdf2006-11-01 16:23 19K 
[   ]A-Framework-For-An-Adaptive-Intrusion-Detection-System.pdf2006-11-01 16:23 52K 
[   ]Learning-Rules-for-Anomaly-Detection-of-Hostile-Network-Traffic.pdf2006-11-01 16:23 57K 
[   ]Towards-the-Scalable-Implementation-of-a-User-Level-Anomaly-Detection-System.pdf2006-11-01 16:23 59K 
[   ]Network-Traffic-Anomaly-Detection-based-on-Packet-Bytes.pdf2006-11-01 16:23 64K 
[   ]ANN-for-Misuse-Detection.pdf2006-11-01 16:23 70K 
[   ]Application-of-ANN-to-Misuse-Detection.pdf2006-11-01 16:23 70K 
[   ]Detecting-Novel-Scans-Through-Pattern-Anomaly-Detection.pdf2006-11-01 16:23 76K 
[   ]Audit-Data-Reduction-for-Intrusion-Detection.pdf2006-11-01 16:23 83K 
[   ]Using-Aritificial-Anomalies-to-Detect-Unknown-and-Known-Network-Intrusions.pdf2006-11-01 16:23 131K 
[   ]A-Data-Mining-Framework-for-Building-IDS.pdf2006-11-01 16:23 131K 
[   ]Correlating-Alerts-Using-Prerequistes-of-Intrusions.pdf2006-11-01 16:23 133K 
[   ]Advanced-Polymorphic-Worms.pdf2006-11-01 16:23 147K 
[   ]Bro-A-System-for-Detecting-Network-Intruders-in-RT.pdf2006-11-01 16:23 162K 
[   ]ADAM-Detecting-Intrusions-by-Data-Mining.pdf2006-11-01 16:23 163K 
[   ]An-Analysis-of-1999-DARPA-for-Network-Anomaly-Detection.pdf2006-11-01 16:23 164K 
[   ]Anomaly-Detection-of-Web-based-Attacks.pdf2006-11-01 16:23 169K 
[   ]Polygraph.pdf2006-11-01 16:23 171K 
[   ]Connection-History-Based-Anomaly-Detection.pdf2006-11-01 16:23 181K 
[   ]A-Framework-for-Constructing-Features-and-Models-for-IDS.pdf2006-11-01 16:23 183K 
[   ]ID-with-Unlabeled-Data-Using-Clustering.pdf2006-11-01 16:23 191K 
[   ]Honeycom.pdf2006-11-01 16:23 199K 
[   ]Language-based-Generation-and-Evaluation-of-NIDS-Signatures.pdf2006-11-01 16:23 210K 
[   ]A-Learning-Based-Approach-to-the-Detection-of-SQL-Attacks.pdf2006-11-01 16:23 212K 
[   ]NIDES-Summary.pdf2006-11-01 16:23 231K 
[   ]ID-Using-Ensemble-of-Soft-Computing-Paradigms.pdf2006-11-01 16:23 237K 
[   ]A-Geometric-Frameowkr-for-Unsupervised-Anomaly-Detection.pdf2006-11-01 16:23 238K 
[   ]Autograph.pdf2006-11-01 16:23 256K 
[   ]Detecting-Malicious-JavaScript-Code-in-Mozilla.pdf2006-11-01 16:23 277K 
[   ]Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf2006-11-01 16:23 279K 
[   ]IDS-using-Adaptive-Regression-Splines.pdf2006-11-01 16:23 299K 
[   ]Towards-Automatic-Generation-of-Vulnerability-Based-Signatures.pdf2006-11-01 16:23 321K 
[   ]Bayesian-Event-Classification-for-ID.pdf2006-11-01 16:23 365K 
[   ]Anomalous-Payload-based-NIDS.pdf2006-11-01 16:23 368K 
[   ]Anagram.pdf2006-11-01 16:23 375K 
[   ]A-Multi-model-Approach-to-the-Detection-of-Web-based-Attacks.pdf2006-11-01 16:23 442K 
[   ]Characteristics-of-Network-Flow-Anomalies.pdf2006-11-01 16:23 458K 
[   ]Adaptive-Model-Based-Monitoring-and-Threat-Detection.pdf2006-11-01 16:23 551K 
[   ]A-comparative-study-of-anomaly-detection-schemes-in-network-intrusion-detection.pdf2006-11-01 16:23 719K 
[   ]A-Framework-for-Classifying-DoS-Attacks.pdf2006-11-01 16:23 1.0M 
[   ]Detecting-Anomalous-Network-Traffic-with-Self-Organizing-Map.pdf2006-11-01 16:23 1.2M 
[   ]Mining_in_a_data-flow_environment_NIDS.pdf2006-11-01 16:23 1.2M 
[   ]Detecting-Viral-Propagations-Using-Email-Behaviour.pdf2006-11-01 16:23 1.3M 

Apache/2.4.52 (Ubuntu) Server at www2.packetstormsecurity.org Port 80