James Cannady

According to our database1, James Cannady authored at least 19 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Cyber Situation Awareness with Active Learning for Intrusion Detection.
CoRR, 2019

2017
Deep learning for prioritizing and responding to intrusion detection alerts.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Early stabilizing feature importance for TensorFlow deep neural networks.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

2016
The user attribution problem and the challenge of persistent surveillance of user activity in complex networks.
J. Comput. Secur., 2016

Enhanced detection of advanced malicious software.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016

2013
The detection of temporally distributed network attacks using an adaptive hierarchical neural network.
Proceedings of the Fifth World Congress on Nature and Biologically Inspired Computing, 2013

2012
Minimal dataset for Network Intrusion Detection Systems via MID-PCA: A hybrid approach.
Proceedings of the 6th IEEE International Conference on Intelligent Systems, 2012

2011
Object-Oriented Databases: Security Models.
Proceedings of the Encyclopedia of Information Assurance, 2011

2010
Detection of Distributed Attacks in Mobile Ad-hoc Networks using Self-organizing Temporal Neural Networks.
Proceedings of the ICAART 2010 - Proceedings of the International Conference on Agents and Artificial Intelligence, Volume 1, 2010

Not so fast flux networks for concealing scam servers.
Proceedings of the CRiSIS 2010, 2010

2009
Asset priority risk assessment using hidden markov models.
Proceedings of the 10th Conference on Information Technology Education, 2009

Distributed Detection of Attacks in Mobile Ad Hoc Networks Using Learning Vector Quantization.
Proceedings of the Third International Conference on Network and System Security, 2009

2005
Foundations of computer forensics: A technology for the fight against computer crime.
Comput. Law Secur. Rev., 2005

Self-Organizing Distributed Intrusion Detection in Mobile Ad Hoc Networks.
Proceedings of the Soft Computing as Transdisciplinary Science and Technology, 2005

2004
A self-adaptive negative selection approach for anomaly detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2004

2003
A Blackboard-Based Learning Intrusion Detection System: A New Approach.
Proceedings of the Developments in Applied Artificial Intelligence, 2003

LIDS: Learning Intrusion Detection System.
Proceedings of the Sixteenth International Florida Artificial Intelligence Research Society Conference, 2003

2001
The Application of Fuzzy ARTMAP in the Detection of Computer Network Attacks.
Proceedings of the Artificial Neural Networks, 2001

2000
Applying CMAC-Based On-Line Learning to Intrusion Detection.
Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks, 2000


  Loading...