Contextual information fusion for intrusion detection: a survey and taxonomy
Published 2017 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Contextual information fusion for intrusion detection: a survey and taxonomy
Authors
Keywords
Context, Contextual information, Cyber-security, Netflows, Intrusion detection, Semantics
Journal
KNOWLEDGE AND INFORMATION SYSTEMS
Volume 52, Issue 3, Pages 563-619
Publisher
Springer Nature
Online
2017-02-17
DOI
10.1007/s10115-017-1027-3
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Queryable Semantics to Detect Cyber-Attacks: A Flow-Based Detection Approach
- (2018) Ahmed F. AlEroud et al. IEEE Transactions on Systems Man Cybernetics-Systems
- A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection
- (2016) Anna L. Buczak et al. IEEE Communications Surveys and Tutorials
- A multi-level intrusion detection method for abnormal network behaviors
- (2016) Soo-Yeon Ji et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- A Survey of Distance and Similarity Measures Used Within Network Intrusion Anomaly Detection
- (2015) David J. Weller-Fahy et al. IEEE Communications Surveys and Tutorials
- Efficient intrusion detection using representative instances
- (2013) Chun Guo et al. COMPUTERS & SECURITY
- VISUALIZATION AND CLUSTERING FOR SNMP INTRUSION DETECTION
- (2013) Raúl Sánchez et al. CYBERNETICS AND SYSTEMS
- A novel hybrid intrusion detection method integrating anomaly detection with misuse detection
- (2013) Gisung Kim et al. EXPERT SYSTEMS WITH APPLICATIONS
- Online Adaboost-Based Parameterized Methods for Dynamic Distributed Network Intrusion Detection
- (2013) Weiming Hu et al. IEEE Transactions on Cybernetics
- Intrusion detection in MANET using classification algorithms: The effects of cost and model selection
- (2012) Aikaterini Mitrokotsa et al. Ad Hoc Networks
- Decision tree based light weight intrusion detection using a wrapper approach
- (2011) Siva S. Sivatha Sindhu et al. EXPERT SYSTEMS WITH APPLICATIONS
- On context-aware co-clustering with metadata support
- (2011) Claudio Schifanella et al. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS
- A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering
- (2010) Gang Wang et al. EXPERT SYSTEMS WITH APPLICATIONS
- An Overview of IP Flow-Based Intrusion Detection
- (2010) A Sperotto et al. IEEE Communications Surveys and Tutorials
- Multi-granularity context model for dynamic Web service composition
- (2010) Wenjia Niu et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Histogram-based traffic anomaly detection
- (2010) Andreas Kind et al. IEEE Transactions on Network and Service Management
- Anomaly detection
- (2009) Varun Chandola et al. ACM COMPUTING SURVEYS
- A hybrid intrusion detection system design for computer network security
- (2009) M. Ali Aydın et al. COMPUTERS & ELECTRICAL ENGINEERING
- Intrusion detection by machine learning: A review
- (2009) Chih-Fong Tsai et al. EXPERT SYSTEMS WITH APPLICATIONS
- Processing intrusion detection alert aggregates with time series modeling
- (2009) Jouni Viinikka et al. Information Fusion
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAsk a Question. Answer a Question.
Quickly pose questions to the entire community. Debate answers and get clarity on the most important issues facing researchers.
Get Started