-
1
-
-
0003482133
-
-
Intrusion. NetBooks
-
Amoroso, E. G. (1999), Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion. NetBooks, http://www.intrusion.net.
-
(1999)
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back
-
-
Amoroso, E.G.1
-
2
-
-
0003964874
-
Next-Generation IntrusionDetection Expert System (NIDES): A Summary
-
Computer Science Laboratory, SRI International
-
Anderson, D., Frivold, T., and Valdes, A. (1995), “Next-Generation IntrusionDetection Expert System (NIDES): A Summary,” Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International.
-
(1995)
Technical Report SRI-CSL-95-07
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
3
-
-
0003750241
-
-
Coast TR 98-05, Department of Computer Sciences, Purdue University
-
Balasubramaniyan, J., Garcia-Fernandez, J. O., Isacoff, D., Spafford, E. H., and Zamboni, D. (1998), “An Ar chitecture for Intrusion Detection using Autonomous Agents,” Coast TR 98-05, Department of Computer Sciences, Purdue University.
-
(1998)
An Ar Chitecture for Intrusion Detection Using Autonomous Agents
-
-
Balasubramaniyan, J.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.H.4
Zamboni, D.5
-
5
-
-
85011481945
-
MaximumLikelihoodfrom Incomplete Data via the EM
-
Dempster, A. P., Laird, N. M., and Rubin, D. B. (1977), “MaximumLikelihoodfrom Incomplete Data via the EM Algorithm” (with discussion), Journal of the Royal Statistical Society, Ser. B, 39, 1-38.
-
(1977)
Journal of the Royal Statistical Society, Ser. B
, vol.39
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
6
-
-
0032313923
-
Intrusion Detection using Sequences of System Calls
-
Hofmeyer, S. A., Somayaji, A., and Forrest, S. (1998), “Intrusion Detection using Sequences of System Calls,” Journalof ComputerSecurity, 6, 151-180.
-
(1998)
Journalof Computersecurity
, vol.6
, pp. 151-180
-
-
Hofmeyer, S.A.1
Somayaji, A.2
Forrest, S.3
-
8
-
-
0043280719
-
A New Smoothing-RegularizationApproachfor a Maximum-Likelihood Estimation Problem
-
Iusem, A. N., and Svaiter, B. F. (1994), “A New Smoothing-RegularizationApproachfor a Maximum-Likelihood Estimation Problem,” Applied Mathematics and Optimization: An International Journal, 29, 225-241.
-
(1994)
Applied Mathematics and Optimization: An International Journal
, vol.29
, pp. 225-241
-
-
Iusem, A.N.1
Svaiter, B.F.2
-
9
-
-
0003997741
-
-
Technical Report TR-94-16r1, Institute for Systems Research, University of Maryland
-
Lawrence, C. T., Zhou, J. L., and Tits, A. L. (1997), “User’s Guidefor CFSQPVersion 2. 5: A C Codefor Solving (Large Scale) Constrained Nonlinear (Minimax) Optimization Problems, Generating Iterates Satisfying All Inequality Constraints,” Technical Report TR-94-16r1, Institute for Systems Research, University of Maryland.
-
(1997)
Users Guidefor Cfsqpversion 2. 5: A C Codefor Solving (Large Scale) Constrained Nonlinear (Minimax) Optimization Problems, Generating Iterates Satisfying All Inequality Constraints
-
-
Lawrence, C.T.1
Zhou, J.L.2
Tits, A.L.3
-
11
-
-
0000029820
-
A Model for Highorder Markov Chains
-
Raftery, A. E. (1985), “A Model for Highorder Markov Chains,” Journal of the Royal Statistical Society, Ser. B, 47, 528-539.
-
(1985)
Journal of the Royal Statistical Society, Ser. B
, vol.47
, pp. 528-539
-
-
Raftery, A.E.1
-
12
-
-
21344497723
-
Estimation and Modeling Repeated Patterns in High Order Markov Chains with the Mixture Transition Distribution Model
-
Raftery, A. E., and Tavare, S. (1994), “Estimation and Modeling Repeated Patterns in High Order Markov Chains with the Mixture Transition Distribution Model,” AppliedStatistics, 43, 179-199.
-
(1994)
Appliedstatistics
, vol.43
, pp. 179-199
-
-
Raftery, A.E.1
Tavare, S.2
-
13
-
-
1942443747
-
-
Technical Report 95, National Institute of Statistical Sciences
-
Schonlau, M., DuMouchel, W., Ju, W. -H., Karr, A., Theus, M. andVardi, Y. (1999), “ComputerIntrusion:Detecting Masqueraders,” Technical Report 95, National Institute of Statistical Sciences.
-
(1999)
Computerintrusion:Detecting Masqueraders
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.4
Theus, M.5
Vardi, Y.6
-
14
-
-
0013425547
-
Intrusion Detection Based on Structural Zeros
-
Theus, M., and Schonlau, M. (1998), “Intrusion Detection Based on Structural Zeros,” Statistical Computing & GraphicsNewsletter, 9, 12-17.
-
(1998)
Statistical Computing & Graphicsnewsletter
, vol.9
, pp. 12-17
-
-
Theus, M.1
Schonlau, M.2
-
15
-
-
0001073106
-
Network Tomography: Estimating Source-Destination Traffic Intensities From Link Data
-
Vardi, Y. (1996), “Network Tomography: Estimating Source-Destination Traffic Intensities From Link Data,” Journal of the American Statistical association, 91, 365-377.
-
(1996)
Journal of the American Statistical association
, vol.91
, pp. 365-377
-
-
Vardi, Y.1
-
16
-
-
0000642087
-
From Image Deblurring to Optimal Investments: Maximum Likelihood Solutions for PositiveLinear Inverse Problems
-
Vardi, Y., and Lee, D. (1993), “From Image Deblurring to Optimal Investments: Maximum Likelihood Solutions for PositiveLinear Inverse Problems” (with discussion), Journal of the RoyalStatisticalSociety, Ser. B, 55, 569-612.
-
(1993)
(With Discussion), Journal Of The Royalstatisticalsociety, Ser. B
, vol.55
, pp. 569-612
-
-
Vardi, Y.1
Lee, D.2
-
17
-
-
0032639421
-
Detecting Intrusion Using SystemCalls: Alternative Data Models
-
Warrender, C., Forrest, S., and Pearlmutter, B. (1999), “Detecting Intrusion Using SystemCalls: Alternative Data Models,” in 1999 IEEE Symposium on Security and Privacy, pp. 133-145
-
(1999)
1999 IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|