-
1
-
-
0025725905
-
Instance-based learning algorithms
-
Aha, D., Kibler, D., & Albert, M. (1991). Instance-based learning algorithms. Machine Learning, 6:1, 37-66.
-
(1991)
Machine Learning
, vol.6
, Issue.1
, pp. 37-66
-
-
Aha, D.1
Kibler, D.2
Albert, M.3
-
2
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
Technical Report (unnumbered), Fort Washington, PA: James P. Anderson Co.
-
Anderson, J. P. (1980). Computer security threat monitoring and surveillance. Technical Report (unnumbered), Fort Washington, PA: James P. Anderson Co.
-
(1980)
-
-
Anderson, J.P.1
-
3
-
-
0023453626
-
Learning regular sets from queries and counterexamples
-
Angulin, D. (1987). Learning regular sets from queries and counterexamples. Information and Computation, 75, 87-106.
-
(1987)
Information and Computation
, vol.75
, pp. 87-106
-
-
Angulin, D.1
-
5
-
-
0003750241
-
An architecture for intrusion detection using autonomous agents
-
Technical Report COAST TR 98/05, Wes Lafayette, IN: Purdue University, COAST Laboratory
-
Balasubramaniyan, J. S., Garcia-Fernandez, J. O., Isacoff, D., Spafford, E., & Zamboni, D. (1998). An architecture for intrusion detection using autonomous agents. Technical Report COAST TR 98/05, Wes Lafayette, IN: Purdue University, COAST Laboratory.
-
(1998)
-
-
Balasubramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
6
-
-
0030645963
-
Time-series similarity problems and well-separated geometric sets
-
Rochester, NY:ACM Press
-
Bollobás, B., Das, G., Gunopulos, D., & Mannila, H. (1997). Time-series similarity problems and well-separated geometric sets. In Thirteenth Annual ACM Symposium on Computational Geometry. Rochester, NY: ACM Press.
-
(1997)
Thirteenth Annual ACM Symposium on Computational Geometry
-
-
Bollobás, B.1
Das, G.2
Gunopoulos, D.3
Mannila, H.4
-
7
-
-
0028060705
-
Automating the hunt for volcanoes on venus
-
Los Alamitos, CA: IEEE Computer Society Press
-
Burl, M. C., Fayyad, U. M., Perona, P., Smyth, P., & Burl, M. P. (1994). Automating the hunt for volcanoes on Venus. In Proceedings of the 1994 Computer Vision and Pattern Recognition Conference (pp. 302-309). Los Alamitos, CA: IEEE Computer Society Press.
-
(1994)
Proceedings of the 1994 Computer Vision and Pattern Recognition Conference
, pp. 302-309
-
-
Burl, M.C.1
Fayyad, U.M.2
Perona, P.3
Smyth, P.4
Burl, M.P.5
-
9
-
-
0030130754
-
A multi-component nonlinear prediction system for the S&P 500 index
-
Chenoweth, T., & Obradovic, Z. (1996). A multi-component nonlinear prediction system for the S&P 500 index Neurocomputing, 10:3, 275-290.
-
(1996)
Neurocomputing
, vol.10
, Issue.3
, pp. 275-290
-
-
Chenoweth, T.1
Obradovic, Z.2
-
10
-
-
0013376454
-
-
Cis; San Jose, CA: Cisco Systems Inc.
-
Cis (1999). NetRanger 2.2.1 User Guide. Available on Cisco Documentation CD-ROM or at http://www.cisco.com/univercd/cc/td/doc/product/iaabu/netrangr/nr221ug/ index.htm. San Jose, CA: Cisco Systems Inc.
-
(1999)
NetRanger 2.2.1 User Guide
-
-
-
19
-
-
0029716418
-
A sense of self for UNIX processes
-
IEEE Computer Society Press
-
Forrest, S., Hofmeyr, S. A., Somayaji, A., & Longstaff, T. A. (1996). A sense of self for UNIX processes. In Proceedings of 1996 IEEE Symposium on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press.
-
(1996)
Proceedings of 1996 IEEE Symposium on Security and Privacy. Los Alamitos, CA
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
20
-
-
0031211090
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Freund, Y., & Schapire, R. E. (1997). A decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 55:1, 119-139.
-
(1997)
Journal of Computer and System Sciences
, vol.55
, Issue.1
, pp. 119-139
-
-
Freund, Y.1
Schapire, R.E.2
-
22
-
-
4243663339
-
Current computer virus threats, countermeasures, and strategic solutions
-
White paper, McAfee Associates
-
Gordon, S. (1996). Current computer virus threats, countermeasures, and strategic solutions. White paper, McAfee Associates.
-
(1996)
-
-
Gordon, S.1
-
23
-
-
0013420742
-
Using UNIX: Collected traces of 168 users
-
Technical Report 88/333/45, Alberta, Canada: University of Calgary, Department of Computer Science, Includes tar-format cartridge tape
-
Greenberg, S. (1988). Using UNIX: Collected traces of 168 users. Technical Report 88/333/45, Alberta, Canada: University of Calgary, Department of Computer Science, Includes tar-format cartridge tape.
-
(1988)
-
-
Greenberg, S.1
-
24
-
-
0024984013
-
A network security monitor
-
Heberlein, L. T., Dias, G. V., Levitt, K. N., Mukherjee, B., Wood, J., & Wolber, D. (1990). A network security monitor. In Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy (pp. 296-304).
-
(1990)
Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
25
-
-
0013325562
-
-
ISS; Atlanta, GA: Internet Security Systems
-
ISS (2000). RealSecure Product Datasheet. Available at http://www.iss.net/customer-care/resource-center/product-lit Atlanta, GA: Internet Security Systems.
-
(2000)
RealSecure Product Datasheet
-
-
-
26
-
-
0021494282
-
On the hidden Markov model and dynamic time warping for speech recognition - A unified view
-
Juang, B.-H. (1984). On the hidden Markov model and dynamic time warping for speech recognition - A unified view. AT&T Bell Laboratories Technical Journal, 63:7, 1213-1243.
-
(1984)
AT&T Bell Laboratories Technical Journal
, vol.63
, Issue.7
, pp. 1213-1243
-
-
Juang, B.-H.1
-
27
-
-
0003900915
-
An application of pattern matching in intrusion detection
-
Technical Report CSD-TR-94-013, West Lafayette, IN: Purdue University, Computer Science
-
Kumar, S., & Spafford, E. (1994). An application of pattern matching in intrusion detection. Technical Report CSD-TR-94-013, West Lafayette, IN: Purdue University, Computer Science.
-
(1994)
-
-
Kumar, S.1
Spafford, E.2
-
28
-
-
0028404750
-
Discrete sequence prediction and its applications
-
Laird, P., & Saul, R. (1994). Discrete sequence prediction and its applications. Machine Learning. 15:1, 43-68.
-
(1994)
Machine Learning
, vol.15
, Issue.1
, pp. 43-68
-
-
Laird, P.1
Saul, R.2
-
29
-
-
4243352332
-
Filtering techniques for rapid user classification
-
WS-98-07, Menlo Park, CA: AAAI Press
-
Lane, T. (1998). Filtering techniques for rapid user classification. WS-98-07, Menlo Park, CA: AAAI Press.
-
(1998)
-
-
Lane, T.1
-
31
-
-
0013425679
-
Machine learning techniques for the computer security domain of anomaly detection
-
Ph.D. thesis, W. Lafayette, IN: Purdue University, Electrical and Computer Engineering
-
Lane, T. (2000). Machine Learning Techniques for the Computer Security Domain of Anomaly Detection. Ph.D. thesis, W. Lafayette, IN: Purdue University, Electrical and Computer Engineering.
-
(2000)
-
-
Lane, T.1
-
32
-
-
0003027845
-
An application of machine learning to anomaly detection
-
Gaithersburg, MD: The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology
-
Lane, T., & Brodley, C. E. (1997a). An application of machine learning to anomaly detection. In Proceedings of the Twentieth National Information Systems Security Conference (Vol 1, pp. 366-380). Gaithersburg, MD: The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology.
-
(1997)
Proceedings of the Twentieth National Information Systems Security Conference
, vol.1
, pp. 366-380
-
-
Lane, T.1
Brodley, C.E.2
-
33
-
-
0013378353
-
Detecting the abnormal: Machine learning in computer security
-
Technical Report TR-ECE 97-1, W. Lafayette, IN: Purdue University, Electrical and Computer Engineering
-
Lane, T., & Brodley, C. E. (1997b). Detecting the abnormal: Machine learning in computer security. Technical Report TR-ECE 97-1, W. Lafayette, IN: Purdue University, Electrical and Computer Engineering.
-
(1997)
-
-
Lane, T.1
Brodley, C.E.2
-
36
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
Lane, T., & Brodley, C. E. (1999). Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security, 2:3, 295-331.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
38
-
-
85141038051
-
Mining audit data to build intrusion detection models
-
Menlo Prk, CA: AAAI Press
-
Lee, W., Stolfo, S. J., & Mok, K. W. (1998). Mining audit data to build intrusion detection models. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (pp. 66-72). Menlo Prk, CA: AAAI Press.
-
(1998)
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining
, pp. 66-72
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
40
-
-
0030287048
-
The expectation-maximization algorithm
-
(November)
-
Moon, T. K. (1996, November). The expectation-maximization algorithm. IEEE Signal Processing Magazine, 47-59.
-
(1996)
IEEE Signal Processing Magazine
, pp. 47-59
-
-
Moon, T.K.1
-
43
-
-
0028737501
-
Heterogeneous learning in the Doppelgänger user modeling system
-
Orwant, J. (1995). Heterogeneous learning in the Doppelgänger user modeling system. User Modeling and User-Adapted Interaction, 4:2, 107-130.
-
(1995)
User Modeling and User-Adapted Interaction
, vol.4
, Issue.2
, pp. 107-130
-
-
Orwant, J.1
-
45
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Gaithersburg, MD: The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology
-
Porras, P., & Neumann, P. (1997). EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the Twentieth National Information Systems Security Conference (pp. 353-365). Gaithersburg, MD: The National Institute of Standards and Technology and the National Computer Security Center, National Institute of Standards and Technology.
-
(1997)
Proceedings of the Twentieth National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.1
Neumann, P.2
-
49
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Rabiner, L. R. (1989). A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77:2.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
-
-
Rabiner, L.R.1
-
53
-
-
0026156490
-
A nearest hyperrectangular learning method
-
Salzberg, S. A nearest hyperrectangular learning method. Machine Learning, 6:3, 251-276.
-
(1991)
Machine Learning
, vol.6
, Issue.3
, pp. 251-276
-
-
Salzberg, S.1
-
54
-
-
0029365976
-
Locating protein coding regions in human DNA using a decision tree algorithm
-
Salzberg, S. (1995). Locating protein coding regions in human DNA using a decision tree algorithm. Journal of Computational Biology, 2:3, 473-485.
-
(1995)
Journal of Computational Biology
, vol.2
, Issue.3
, pp. 473-485
-
-
Salzberg, S.1
-
55
-
-
0013372364
-
Cross-validation, stacking, and bi-level methods for stacking: Meta-methods for classification learning
-
In P. Cheeseman, & W. Oldford (Eds.); New York: Springer-Verlag
-
Schaffer, C. (1994). Cross-validation, stacking, and bi-level methods for stacking: Meta-methods for classification learning. In P. Cheeseman, & W. Oldford (Eds.), Selecting models from data: Artificial intelligence and Statistics IV. New York: Springer-Verlag.
-
(1994)
Selecting Models from Data: Artificial Intelligence and Statistics IV
-
-
Schaffer, C.1
-
56
-
-
0013326380
-
-
Personal communication
-
Schonlau, M. (2000). Personal communication.
-
(2000)
-
-
Schonlau, M.1
-
58
-
-
0043148528
-
Testing for human perceptual categories in a physician-in-the-loop CBIR system for medical imagery
-
Shyu, C. R., Kak, A. C., Brodley, C. E., & Broderick, L. S. (1999). Testing for human perceptual categories in a physician-in-the-loop CBIR system for medical imagery. In Proc. IEEE Workshop of Content-Based Access of Image and Video Databases, Fort Collins, CO.
-
(1999)
Proc. IEEE Workshop of Content-Based Access of Image and Video Databases, Fort Collins, CO
-
-
Shyu, C.R.1
Kak, A.C.2
Brodley, C.E.3
Broderick, L.S.4
-
60
-
-
0028667329
-
Hidden Markov monitoring for fault detection in dynamic systems
-
Smyth, P. (1994a). Hidden Markov monitoring for fault detection in dynamic systems. Pattern Recognition, 27:1, 149-164.
-
(1994)
Pattern Recognition
, vol.27
, Issue.1
, pp. 149-164
-
-
Smyth, P.1
-
64
-
-
0013425547
-
Intrusion detection based on structural zeroes
-
Theus, M., & Schonlau, M. (1998). Intrusion detection based on structural zeroes. Statistical Computing & Graphics Newsletter, 9:1, 12-17.
-
(1998)
Statistical Computing & Graphics Newsletter
, vol.9
, Issue.1
, pp. 12-17
-
-
Theus, M.1
Schonlau, M.2
-
65
-
-
0037636215
-
Intrusion detection using variable-length audit trail patterns
-
Technical Report RZ 3164 (# 93210), Zurich, Switzerland: IBM Research
-
Wespi, A., Darcier, M., & Debar, H. (1999). Intrusion detection using variable-length audit trail patterns. Technical Report RZ 3164 (# 93210), Zurich, Switzerland: IBM Research.
-
(1999)
-
-
Wespi, A.1
Darcier, M.2
Debar, H.3
-
66
-
-
0343081513
-
Reduction techniques for exemplar-based learning algorithms
-
Wilson, D. R., & Martinez, T. R. (2000). Reduction techniques for exemplar-based learning algorithms. Machine Learning, 38:3, 257-268.
-
(2000)
Machine Learning
, vol.38
, Issue.3
, pp. 257-268
-
-
Wilson, D.R.1
Martinez, T.R.2
-
67
-
-
0642282135
-
Automated user modeling for intelligent interface
-
Yoshida, K., & Motoda, H. (1996). Automated user modeling for intelligent interface. International Journal of Human-Computer Interaction, 8:3, 237-258.
-
(1996)
International Journal of Human-Computer Interaction
, vol.8
, Issue.3
, pp. 237-258
-
-
Yoshida, K.1
Motoda, H.2
|