Search Results

There are 6516 results for: content related to: Data mining techniques for information security applications

  1. Multivariate correlation analysis and geometric linear similarity for real-time intrusion detection systems

    Security and Communication Networks

    Volume 8, Issue 7, 10 May 2015, Pages: 1193–1212, Abdelouahid Derhab and Abdelghani Bouras

    Article first published online : 8 JUL 2014, DOI: 10.1002/sec.1074

  2. Using particle swarm optimization in fuzzy association rules-based feature selection and fuzzy ARTMAP-based attack recognition

    Security and Communication Networks

    Volume 6, Issue 7, July 2013, Pages: 797–811, Mansour Sheikhan and Maryam Sharifi Rad

    Article first published online : 13 AUG 2012, DOI: 10.1002/sec.609

  3. An efficient class association rule-pruning method for unified intrusion detection system using genetic algorithm

    IEEJ Transactions on Electrical and Electronic Engineering

    Volume 8, Issue 2, March 2013, Pages: 164–172, Nannan Lu, Shingo Mabu, Tuo Wang and Kotaro Hirasawa

    Article first published online : 2 JAN 2013, DOI: 10.1002/tee.21836

  4. Intrusion Detection Techniques

    Standard Article

    The Internet Encyclopedia

    Peng Ning and Sushil Jajodia

    Published Online : 15 APR 2004, DOI: 10.1002/047148296X.tie097

  5. Role mining based on cardinality constraints

    Concurrency and Computation: Practice and Experience

    Ruixuan Li, Huaqing Li, Xiwu Gu, Yuhua Li, Wei Ye and Xiaopu Ma

    Article first published online : 5 FEB 2015, DOI: 10.1002/cpe.3456

  6. A novel sine-curve mobility model for intrusion detection in wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 13, Issue 17, 10 December 2013, Pages: 1555–1570, Yun Wang, Yoon Kah Leow and Jun Yin

    Article first published online : 10 NOV 2011, DOI: 10.1002/wcm.1202

  7. Role mining based on permission cardinality constraint and user cardinality constraint

    Security and Communication Networks

    Xiaopu Ma, Ruixuan Li, Hongwei Wang and Huaqing Li

    Article first published online : 16 DEC 2014, DOI: 10.1002/sec.1177

  8. Network Intrusion Detection Using Class Association Rule Mining Based on Genetic Network Programming

    IEEJ Transactions on Electrical and Electronic Engineering

    Volume 5, Issue 5, September 2010, Pages: 553–559, Ci Chen, Shingo Mabu, Kaoru Shimada and Kotaro Hirasawa

    Article first published online : 25 AUG 2010, DOI: 10.1002/tee.20572

  9. Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection

    Quality and Reliability Engineering International

    Volume 18, Issue 3, May/June 2002, Pages: 231–242, Xiangyang Li and Nong Ye

    Article first published online : 29 MAY 2002, DOI: 10.1002/qre.477

  10. Data stream mining in ubiquitous environments: state-of-the-art and current directions

    Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery

    Volume 4, Issue 2, March/April 2014, Pages: 116–138, Mohamed Medhat Gaber, João Gama, Shonali Krishnaswamy, João Bártolo Gomes and Frederic Stahl

    Article first published online : 24 FEB 2014, DOI: 10.1002/widm.1115

  11. Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection

    International Journal of Intelligent Systems

    Volume 15, Issue 8, August 2000, Pages: 687–703, Jianxiong Luo and Susan M. Bridges

    Article first published online : 30 JUN 2000, DOI: 10.1002/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X

  12. A stochastic learning automata-based solution for intrusion detection in vehicular ad hoc networks

    Security and Communication Networks

    Volume 4, Issue 6, June 2011, Pages: 666–677, Sudip Misra, P. Venkata Krishna and Kiran Isaac Abraham

    Article first published online : 9 JUN 2010, DOI: 10.1002/sec.200

  13. A lightweight intrusion detection framework for wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 10, Issue 4, April 2010, Pages: 559–572, Tran Hoang Hai, Eui-Nam Huh and Minho Jo

    Article first published online : 15 APR 2009, DOI: 10.1002/wcm.785

  14. Architecture and performance evaluation of a hybrid intrusion detection system for IP telephony

    Security and Communication Networks

    Volume 6, Issue 12, December 2013, Pages: 1539–1555, Bazara I. A. Barry and H. A. Chan

    Article first published online : 5 MAY 2010, DOI: 10.1002/sec.174

  15. TOGBAD—an approach to detect routing attacks in tactical environments

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 793–806, Elmar Gerhards-Padilla, Nils Aschenbruck and Peter Martini

    Article first published online : 13 JAN 2010, DOI: 10.1002/sec.185

  16. Information gathering with mobile agents for an intrusion detection system

    Systems and Computers in Japan

    Volume 30, Issue 2, February 1999, Pages: 31–37, Midori Asaka

    Article first published online : 9 MAR 1999, DOI: 10.1002/(SICI)1520-684X(199902)30:2<31::AID-SCJ4>3.0.CO;2-F

  17. Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2442–2462, Ganesh Reddy Karri and P. Santhi Thilagam

    Article first published online : 20 FEB 2014, DOI: 10.1002/sec.955

  18. GeoSec: quarantine zones for mobile ad hoc networks

    Security and Communication Networks

    Volume 2, Issue 3, May/June 2009, Pages: 271–288, André König, Matthias Hollick, Tronje Krop and Ralf Steinmetz

    Article first published online : 2 DEC 2008, DOI: 10.1002/sec.68

  19. Wireless Sensor Network Security

    Wireless and Mobile Network Security: Security Basics, Security in On-the-shelf and Emerging Technologies

    José-Marcos Nogueira, Hao-Chi Wong, Antonio A.F. Loureiro, Chakib Bekara, Maryline Laurent-Makanvicius, Ana Paula Ribeiro da Silva, Sérgio de Oliverira, Fernando A. Texiseira, Pages: 565–611, 2010

    Published Online : 5 JAN 2010, DOI: 10.1002/9780470611883.ch15

  20. Alamut: a high-performance network intrusion detection system in support of virtualized environments

    Security and Communication Networks

    Volume 6, Issue 11, November 2013, Pages: 1310–1318, Mohsen Sharifi, Hadi Salimi and Ebrahim Asadi

    Article first published online : 12 FEB 2013, DOI: 10.1002/sec.713