-
1
-
-
0002511297
-
Predicting sequences of user actions
-
Published as AAAI Technical Report WS-98-07, AAAI Press, Menlo Park, California
-
B. D. Davidson and H. Hirsh. Predicting sequences of user actions. In Predicting the Future: AI Approaches to Time-Series Problems, papers from the 1998 AAAI Workshop, 27 July 1998, Madison, Wisconsin, pages 5-12. Published as AAAI Technical Report WS-98-07, AAAI Press, Menlo Park, California, 1998.
-
(1998)
Predicting the Future: AI Approaches to Time-Series Problems, Papers from the 1998 AAAI Workshop, 27 July 1998, Madison, Wisconsin
, pp. 5-12
-
-
Davidson, B.D.1
Hirsh, H.2
-
2
-
-
0002419948
-
Beyond independence: Conditions for the optimality of the simple Bayesian classifier
-
In L. Saitta, editor; July 1996, Bari, Italy. Morgan Kaufmann, San Francisco, California
-
P. Domingos and M. Pazzani. Beyond independence: conditions for the optimality of the simple Bayesian classifier. In L. Saitta, editor, 13th International Conference on Machine Learning (ICML-96), pages 105-112, 03-06 July 1996, Bari, Italy. Morgan Kaufmann, San Francisco, California, 1996.
-
(1996)
13th International Conference on Machine Learning (ICML-96)
, pp. 105-112
-
-
Domingos, P.1
Pazzani, M.2
-
3
-
-
0012297627
-
Computer intrusion detection based on Bayes factors for comparing command transition probabilities
-
Technical Report 91, National Institute of Statistical Sciences, Research Triangle Park, North Carolina 27709-4006
-
W. DuMouchel. Computer intrusion detection based on Bayes factors for comparing command transition probabilities. Technical Report 91, National Institute of Statistical Sciences, Research Triangle Park, North Carolina 27709-4006, 1999.
-
(1999)
-
-
Dumouchel, W.1
-
4
-
-
0012291134
-
A hybrid high-order markov chain model for computer intrusion detection
-
Technical Report 92, National Institute for Statistical Sciences, Research Triangle Park, North Carolina 27709-4006
-
W. Ju and Y. Vardi. A hybrid high-order markov chain model for computer intrusion detection. Technical Report 92, National Institute for Statistical Sciences, Research Triangle Park, North Carolina 27709-4006, 1999.
-
(1999)
-
-
Ju, W.1
Vardi, Y.2
-
5
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
August
-
T. Lane and C. E. Brodley. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security, 2(3):295-331, August 1999.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
6
-
-
0012291135
-
Spy case prompts computer search
-
05 March
-
V. Loeb. Spy case prompts computer search. Washington Post, 05 March 2001, page A01.
-
(2001)
Washington Post
-
-
Loeb, V.1
-
7
-
-
0027609384
-
A survey of intrusion-detection techniques
-
June
-
T. F. Lunt. A survey of intrusion-detection techniques. Computers & Security, 12(4):405-418, June 1993.
-
(1993)
Computers & Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
8
-
-
0023866666
-
A prototype real-time intrusion-detection expert system
-
18-21 April 1988, Oakland, California. IEEE Computer Society Press, Washington, DC
-
T. F. Lunt and R. Jagannathan. A prototype real-time intrusion-detection expert system. In IEEE Symposium on Security and Privacy, pages 59-66. 18-21 April 1988, Oakland, California. IEEE Computer Society Press, Washington, DC, 1988.
-
(1988)
IEEE Symposium on Security and Privacy
, pp. 59-66
-
-
Lunt, T.F.1
Jagannathan, R.2
-
10
-
-
0001673996
-
A comparison of event models for naive bayes text classification
-
Published as AAAI Technical Report WS-98-05, AAAI Press, Menlo Park, California
-
A. McCallum and K. Nigam. A comparison of event models for naive bayes text classification. In Learning for Text Categorization, papers from the 1998 AAAI Workshop, 27 July 1998, Madison, Wisconsin, pages 41-48. Published as AAAI Technical Report WS-98-05, AAAI Press, Menlo Park, California, 1998.
-
(1998)
Learning for Text Categorization, Papers from the 1998 AAAI Workshop, 27 July 1998, Madison, Wisconsin
, pp. 41-48
-
-
McCallum, A.1
Nigam, K.2
-
11
-
-
0004255908
-
-
McGraw-Hill, Boston, Massachusetts
-
T. M. Mitchell. Machine Learning. McGraw-Hill, Boston, Massachusetts, 1997.
-
(1997)
Machine Learning.
-
-
Mitchell, T.M.1
-
12
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
February
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, M. Theus, and Y. Vardi. Computer intrusion: Detecting masquerades. Statistical Science, 16(1):58-74, February 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
13
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
November
-
M. Schonlau and M. Theus. Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters, 76(1-2):33-38, November 2000.
-
(2000)
Information Processing Letters
, vol.76
, Issue.1-2
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
|