Tài liệu tham khảo |
Loại |
Chi tiết |
[2] K. D. Lillywhite, “Feature construction using evolution-constructed fea- tures,” in PhD diss. Brigham Young University, 2012 |
Sách, tạp chí |
Tiêu đề: |
Feature construction using evolution-constructed fea-tures,” in "PhD diss |
|
[3] M. Ahmed and A. N. Mahmood, “Network ttaffic analysis based on collective anomaly detection,” in Industrial electronics and applications (ICIEA), 2014 IEEE 9th Conference on. IEEE, 2014, pp. 1141-1146 |
Sách, tạp chí |
Tiêu đề: |
Network ttaffic analysis based on collective anomaly detection,” in "Industrial electronics and applications (ICIEA), 2014 IEEE 9th Conference on |
|
[4] R. Abdulhammed, M. Faezipour, and K. M. Elleithy, “Network inttusion detection using hardware techniques: A review,” in Computer Science and Engineering Department University of Bridgeport, Bridgeport, CT, 2016 |
Sách, tạp chí |
Tiêu đề: |
Network inttusion detection using hardware techniques: A review,” in "Computer Science and Engineering Department University of Bridgeport, Bridgeport, CT |
|
[5] R. Bittner, E. Ruf, and A. Forin, “Dừect gpu/fpga communication via pci express,” in Cluster Computing, vol. 17, no. 2. Springer, 2014, pp. 339-348 |
Sách, tạp chí |
Tiêu đề: |
Dừect gpu/fpga communication via pci express,” in "Cluster Computing |
|
[6] Sysmantec, “Internet security threat report 2016,” https://www. symantcc.com/contcnt/dain/ symantec/docs/reports/istr- 21 - 2016-en. pdf/, [Online; accessed 22-April-2016] |
Sách, tạp chí |
Tiêu đề: |
Internet security threat report 2016 |
|
[7] PWC, “The global state of information security sur vey 2016,” http://www.pwc.com/gx/en/issues/cyber-security/ information- security-survey/download.html/,[Online; accessed 22-April-2016] |
Sách, tạp chí |
Tiêu đề: |
The global state of information security sur vey 2016 |
|
[8] c. Security, “Cisco security advisories and responses,” https://tools. cisco.com/security/center/publicationListing.x/, [Online; accessed 04- May-2016] |
Sách, tạp chí |
Tiêu đề: |
Cisco security advisories and responses |
|
[9] CISCO, “Cisco 2016 annual security report,” http://www.cisco.com/ c/en/us/products/security/annual_security_report.html/, [Online; accessed 04-May-2016] |
Sách, tạp chí |
Tiêu đề: |
Cisco 2016 annual security report |
|
[10] Symantec, “2017 report,” https://www.symantec.com/security-center/ threat-report, [Online; accessed 22-Oct-2017] |
Sách, tạp chí |
|
[11] INFOSEC, “10 most popular password cracking tools,” http://resources. infosecinstitute.com/10-popular-password-cracking-tools/, [Online; ac- cessed 25-April-2016] |
Sách, tạp chí |
Tiêu đề: |
10 most popular password cracking tools |
|
[12] A. Patel, Q. Qassim, and c. Wills, “A survey of intrusion detection and prevention systems,” in Information Management & Computer Security, vol. 18, no. 4. Emerald Group Publishing Limited, 2010, pp. 277-290 |
Sách, tạp chí |
Tiêu đề: |
A survey of intrusion detection and prevention systems,” in "Information Management & Computer Security |
|
[13] A. A. Ghorbani, w. Lu, and M. Tavallaee, “Evaluation criteria,” in Network intrusion detection and prevention: concepts and techniques, vol. 47.Springer Science & Business Media, 2009, pp. 161-166 |
Sách, tạp chí |
Tiêu đề: |
Evaluation criteria,” in "Network intrusion detection and prevention: concepts and techniques |
|
[14] N. Shukla and A. Vishwakarma, “A survey on anomaly-based network intrusion detection systems,” in International Journal of Scientific Research |
Sách, tạp chí |
Tiêu đề: |
A survey on anomaly-based network intrusion detection systems,” in |
|
[15] A. s. Raut and K. R. Singh, “Anomaly based intrusion detection-a review,” in International Journal on Network Security, vol. 5, no. 3. Association of Computer Electtonics and Electrical Engineers (ACEEE), 2014, pp. 7-12 |
Sách, tạp chí |
Tiêu đề: |
Anomaly based intrusion detection-a review,” in "International Journal on Network Security |
|
[16] A. Banerjee, p. Burlina, and c. Diehl, “A support vector method for anomaly detection in hyperspectral imagery,” in IEEE Transactions on Geoscience and Remote Sensing, vol. 44, no. 8. Citeseer, 2006, pp. 2282-2291 |
Sách, tạp chí |
Tiêu đề: |
A support vector method for anomaly detection in hyperspectral imagery,” in "IEEE Transactions on Geoscience and Remote Sensing |
|
[17] V. A. Sotiris, p. w. Tse, and M. G. Pecht, “Anomaly detection through a bayesian support vector machine,” in Reliability, IEEE Transactions on, vol. 59, no. 2. IEEE, 2010, pp. 277-286 |
Sách, tạp chí |
Tiêu đề: |
Anomaly detection through a bayesian support vector machine,” in "Reliability, IEEE Transactions on |
|
[18] s. Mascaro, A. E. Nicholso, and K. B. Korb, “Anomaly detection in vessel tracks using bayesian networks,” in International Journal of Approximate Reasoning, vol. 55, no. 1. Elsevier, 2014, pp. 84-98 |
Sách, tạp chí |
Tiêu đề: |
Anomaly detection in vessel tracks using bayesian networks,” in "International Journal of Approximate Reasoning |
|
[19] F. Johansson and G. Falkman, “Detection of vessel anomalies-a bayesian network approach,” in Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on. IEEE, 2007, pp. 395-400 |
Sách, tạp chí |
Tiêu đề: |
Detection of vessel anomalies-a bayesian network approach,” in "Intelligent Sensors, Sensor Networks and Information, 2007. ISSNIP 2007. 3rd International Conference on |
|
[20] N. A. Heard, D. J. Weston, K. Platanioti, D. J. Hand et al., “Bayesian anomaly detection methods for social networks,” in The Annals of Applied Statistics, vol. 4, no. 2. Institute of Mathematical Statistics, 2010, pp. 645- 662 |
Sách, tạp chí |
Tiêu đề: |
et al.," “Bayesian anomaly detection methods for social networks,” in "The Annals of Applied Statistics |
|
[21] X. Li, J. Han, s. Kim, and H. Gonzalez, “Roam: Rule-and motif-based anomaly detection in massive moving object data sets.” in SDM, vol. 7.SIAM, 2007, pp. 273-284 |
Sách, tạp chí |
Tiêu đề: |
Roam: Rule-and motif-based anomaly detection in massive moving object data sets.” in "SDM |
|