Index of /papers/IDS/nids
Name
Last modified
Size
Description
Parent Directory
-
Detecting-Viral-Propagations-Using-Email-Behaviour.pdf
2006-11-01 16:23
1.3M
Mining_in_a_data-flow_environment_NIDS.pdf
2006-11-01 16:23
1.2M
Detecting-Anomalous-Network-Traffic-with-Self-Organizing-Map.pdf
2006-11-01 16:23
1.2M
A-Framework-for-Classifying-DoS-Attacks.pdf
2006-11-01 16:23
1.0M
A-comparative-study-of-anomaly-detection-schemes-in-network-intrusion-detection.pdf
2006-11-01 16:23
719K
Adaptive-Model-Based-Monitoring-and-Threat-Detection.pdf
2006-11-01 16:23
551K
Characteristics-of-Network-Flow-Anomalies.pdf
2006-11-01 16:23
458K
A-Multi-model-Approach-to-the-Detection-of-Web-based-Attacks.pdf
2006-11-01 16:23
442K
Anagram.pdf
2006-11-01 16:23
375K
Anomalous-Payload-based-NIDS.pdf
2006-11-01 16:23
368K
Bayesian-Event-Classification-for-ID.pdf
2006-11-01 16:23
365K
Towards-Automatic-Generation-of-Vulnerability-Based-Signatures.pdf
2006-11-01 16:23
321K
IDS-using-Adaptive-Regression-Splines.pdf
2006-11-01 16:23
299K
Anomalous-Payload-based-Worm-Detection-and-Signature-Generation.pdf
2006-11-01 16:23
279K
Detecting-Malicious-JavaScript-Code-in-Mozilla.pdf
2006-11-01 16:23
277K
Autograph.pdf
2006-11-01 16:23
256K
A-Geometric-Frameowkr-for-Unsupervised-Anomaly-Detection.pdf
2006-11-01 16:23
238K
ID-Using-Ensemble-of-Soft-Computing-Paradigms.pdf
2006-11-01 16:23
237K
NIDES-Summary.pdf
2006-11-01 16:23
231K
A-Learning-Based-Approach-to-the-Detection-of-SQL-Attacks.pdf
2006-11-01 16:23
212K
Language-based-Generation-and-Evaluation-of-NIDS-Signatures.pdf
2006-11-01 16:23
210K
Honeycom.pdf
2006-11-01 16:23
199K
ID-with-Unlabeled-Data-Using-Clustering.pdf
2006-11-01 16:23
191K
A-Framework-for-Constructing-Features-and-Models-for-IDS.pdf
2006-11-01 16:23
183K
Connection-History-Based-Anomaly-Detection.pdf
2006-11-01 16:23
181K
Polygraph.pdf
2006-11-01 16:23
171K
Anomaly-Detection-of-Web-based-Attacks.pdf
2006-11-01 16:23
169K
An-Analysis-of-1999-DARPA-for-Network-Anomaly-Detection.pdf
2006-11-01 16:23
164K
ADAM-Detecting-Intrusions-by-Data-Mining.pdf
2006-11-01 16:23
163K
Bro-A-System-for-Detecting-Network-Intruders-in-RT.pdf
2006-11-01 16:23
162K
Advanced-Polymorphic-Worms.pdf
2006-11-01 16:23
147K
Correlating-Alerts-Using-Prerequistes-of-Intrusions.pdf
2006-11-01 16:23
133K
A-Data-Mining-Framework-for-Building-IDS.pdf
2006-11-01 16:23
131K
Using-Aritificial-Anomalies-to-Detect-Unknown-and-Known-Network-Intrusions.pdf
2006-11-01 16:23
131K
Audit-Data-Reduction-for-Intrusion-Detection.pdf
2006-11-01 16:23
83K
Detecting-Novel-Scans-Through-Pattern-Anomaly-Detection.pdf
2006-11-01 16:23
76K
Application-of-ANN-to-Misuse-Detection.pdf
2006-11-01 16:23
70K
ANN-for-Misuse-Detection.pdf
2006-11-01 16:23
70K
Network-Traffic-Anomaly-Detection-based-on-Packet-Bytes.pdf
2006-11-01 16:23
64K
Towards-the-Scalable-Implementation-of-a-User-Level-Anomaly-Detection-System.pdf
2006-11-01 16:23
59K
Learning-Rules-for-Anomaly-Detection-of-Hostile-Network-Traffic.pdf
2006-11-01 16:23
57K
A-Framework-For-An-Adaptive-Intrusion-Detection-System.pdf
2006-11-01 16:23
52K
Combining-Knowledge-Discovery-and-Knowledge-Engineering-to-Build-IDS.pdf
2006-11-01 16:23
19K
indexsize2.html
2010-11-14 14:12
268
indexsize.html
2010-11-14 14:12
268
indexdate2.html
2010-11-14 14:12
268
indexdate.html
2010-11-14 14:12
268
Apache/2.4.52 (Ubuntu) Server at www2.packetstormsecurity.org Port 80