-
1
-
-
0003577150
-
-
New York: John Wiley & Sons, Inc.
-
Berry, M. J. A., & Linoff, G. (1997). Data mining techniques for marketing, sales, and customer support. New York: John Wiley & Sons, Inc.
-
(1997)
Data Mining Techniques for Marketing, Sales, and Customer Support
-
-
Berry, M.J.A.1
Linoff, G.2
-
3
-
-
0039409739
-
Neural networks applied in intrusion detection systems
-
Gold Coast, Australia
-
Bonifacio, J. M. Jr., Cansian, A. M., Carvalho, A. C. P. L. F., & Moreira, E. S. (1997). Neural networks applied in intrusion detection systems. Proceedings of the International Conference on Computational Intelligence and Multimedia Application. Gold Coast, Australia, 276-280.
-
(1997)
Proceedings of the International Conference on Computational Intelligence and Multimedia Application
, pp. 276-280
-
-
Bonifacio J.M., Jr.1
Cansian, A.M.2
Carvalho, A.C.P.L.F.3
Moreira, E.S.4
-
5
-
-
0030387631
-
Data mining: An overview from database perspective
-
Chen, M. S., Han, J., & Yu, S. (1996). Data mining: An overview from database perspective. IEEE Transactions on Knowledge and Data Engineering, 8, 866-883.
-
(1996)
IEEE Transactions on Knowledge and Data Engineering
, vol.8
, pp. 866-883
-
-
Chen, M.S.1
Han, J.2
Yu, S.3
-
6
-
-
0003282482
-
High confidence design for security
-
Chin, S. K. (1999). High confidence design for security. Communication of the ACM, 42(7), 33-37.
-
(1999)
Communication of the ACM
, vol.42
, Issue.7
, pp. 33-37
-
-
Chin, S.K.1
-
7
-
-
0028485121
-
A neural network system for forecasting method selection
-
Chu, C. H., & Widjaja, D. (1994). A neural network system for forecasting method selection. Decision Support Systems, 12, 13-24.
-
(1994)
Decision Support Systems
, vol.12
, pp. 13-24
-
-
Chu, C.H.1
Widjaja, D.2
-
8
-
-
0033277415
-
Special section: Data mining
-
Chung, H. M., & Gray, P. (1999). Special section: Data mining. Journal of Management Information Systems, 16(1), 11-16.
-
(1999)
Journal of Management Information Systems
, vol.16
, Issue.1
, pp. 11-16
-
-
Chung, H.M.1
Gray, P.2
-
9
-
-
0005248282
-
A comparative analysis of inductive learning algorithms
-
Chung, H. M., & Tam, K. Y. (1993). A comparative analysis of inductive learning algorithms. Intelligent Systems in Accounting, Finance and Management, 2 (1), 3-18.
-
(1993)
Intelligent Systems in Accounting, Finance and Management
, vol.2
, Issue.1
, pp. 3-18
-
-
Chung, H.M.1
Tam, K.Y.2
-
10
-
-
0026850007
-
A neural network component for an intrusion detection system
-
Oakland, CA: IEEE Computer Society Press
-
Debar, H., Becker, M., & Siboni, D.(1992). A neural network component for an intrusion detection system. Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy. Oakland, CA: IEEE Computer Society Press, 240-250.
-
(1992)
Proceedings of the 1992 IEEE Symposium on Research in Security and Privacy
, pp. 240-250
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
12
-
-
0030291564
-
A comparison of neural networks and linear scoring models in the credit union environment
-
Desai, V. S., Crook, J. N., & Overstreet, G. A. (1996). A comparison of neural networks and linear scoring models in the credit union environment. European Journal of Operational Research, 95, 24-37.
-
(1996)
European Journal of Operational Research
, vol.95
, pp. 24-37
-
-
Desai, V.S.1
Crook, J.N.2
Overstreet, G.A.3
-
13
-
-
0033116872
-
Business failure prediction using rough sets
-
Dimitras, A. I., Slowinski, R., Susmaga, R., & Zopounidis, C. (1999). Business failure prediction using rough sets. European Journal of Operational Research, 114, 263-280.
-
(1999)
European Journal of Operational Research
, vol.114
, pp. 263-280
-
-
Dimitras, A.I.1
Slowinski, R.2
Susmaga, R.3
Zopounidis, C.4
-
14
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
Durst, R., Champion, T., Witten, B., Miller, E., & Spagnuolo, L. (1999). Testing and evaluating computer intrusion detection systems. Communications of the ACM, 42(7), 53-61.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
15
-
-
0002188610
-
Neural network detection of management fraud using published financial data
-
Fanning, K., & Cogger, K. O. (1998). Neural network detection of management fraud using published financial data. Intelligent Systems in Accounting, Finance and Management, 7, 21-41.
-
(1998)
Intelligent Systems in Accounting, Finance and Management
, vol.7
, pp. 21-41
-
-
Fanning, K.1
Cogger, K.O.2
-
17
-
-
0002283033
-
From data mining to knowledge discovery in databases
-
Fayyad, U. M., Piatetsky-Shapiro, G., & Smyth, P. (1996). From data mining to knowledge discovery in databases. AI Magazine, 17(3), 37-54.
-
(1996)
AI Magazine
, vol.17
, Issue.3
, pp. 37-54
-
-
Fayyad, U.M.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
18
-
-
0029716418
-
A sense of self for UNIX processes
-
Oakland, CA: IEEE Computer Society Press
-
Forrest, S., Hofmeyr, S. A., Somayaji, A., & Longstaff, T. A. (1996). A sense of self for UNIX processes. Proceedings of the 1996 IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
19
-
-
0001351468
-
Using genetic algorithms to explore pattern recognition in the immune system
-
Forrest, S., Jovornik, B., Smith, R. E., & Perelson, A. S. (1993). Using genetic algorithms to explore pattern recognition in the immune system. Evolutionary Computation, 1(3), 191-211.
-
(1993)
Evolutionary Computation
, vol.1
, Issue.3
, pp. 191-211
-
-
Forrest, S.1
Jovornik, B.2
Smith, R.E.3
Perelson, A.S.4
-
20
-
-
0012292276
-
A neural network approach towards intrusion detection
-
Washington, D.C. Gaithersburg, MD: NIST
-
Fox, K. L., Henning, R. R., Reed, J. H., & Simonian, R. P. (1990) A neural network approach towards intrusion detection. Proceedings of the 13th National Computer Security Conference, Washington, D.C. Gaithersburg, MD: NIST, 125-134.
-
(1990)
Proceedings of the 13th National Computer Security Conference
, pp. 125-134
-
-
Fox, K.L.1
Henning, R.R.2
Reed, J.H.3
Simonian, R.P.4
-
22
-
-
0032167364
-
A hybrid intelligent system for predicting bank holding structures
-
Hashemi, R. R., Le Blanc, L. A., Rucks, C. T., & Rajaratnam, A. (1998). A hybrid intelligent system for predicting bank holding structures. European Journal of Operational Research, 109, 390-402.
-
(1998)
European Journal of Operational Research
, vol.109
, pp. 390-402
-
-
Hashemi, R.R.1
Le Blanc, L.A.2
Rucks, C.T.3
Rajaratnam, A.4
-
23
-
-
0002320533
-
Immunity by design: An artificial immune system
-
San Mateo, CA: Morgan Kaufmann
-
Hofmeyr, S. A., & Forrest, S. (1999). Immunity by design: An artificial immune system. Proceedings of Genetic and Evolutionary Computation Conference (GECCO '99). Vol. 2, San Mateo, CA: Morgan Kaufmann, 1289-1296.
-
(1999)
Proceedings of Genetic and Evolutionary Computation Conference (GECCO '99)
, vol.2
, pp. 1289-1296
-
-
Hofmeyr, S.A.1
Forrest, S.2
-
24
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S. A., Forrest, S., & Somayaji, A. (1998). Intrusion detection using sequences of system calls. Journal of Computer Security, 6, 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
25
-
-
0029361634
-
Security is fuzzy! Applying fuzzy logic to the multipolicy paradigm
-
Hosmer, H. H. (1995). Security is fuzzy! Applying fuzzy logic to the multipolicy paradigm. Computer Security Journal, 11(2), 35-45.
-
(1995)
Computer Security Journal
, vol.11
, Issue.2
, pp. 35-45
-
-
Hosmer, H.H.1
-
26
-
-
0012330853
-
Negative selection and niching by an artificial immune system for network intrusion detection
-
San Mateo, CA: Morgan Kaufmann
-
Kim, J., & Bentley, P. (1999). Negative selection and niching by an artificial immune system for network intrusion detection. A late-breaking paper submitted to Genetic and Evolutionary Computation Conference (GECCO '99). Vol. 2, San Mateo, CA: Morgan Kaufmann, 149-158.
-
(1999)
A Late-breaking Paper Submitted to Genetic and Evolutionary Computation Conference (GECCO '99)
, vol.2
, pp. 149-158
-
-
Kim, J.1
Bentley, P.2
-
27
-
-
0041189147
-
-
Computer Science Dept., Columbia University, New York, NY
-
Lee, W., & Stolfo, S. J. (2000). Data mining approaches for intrusion detection. Available at http://www.cs.columbia.edu/~sal/hpapers/USENIX/usenix.html, Computer Science Dept., Columbia University, New York, NY
-
(2000)
Data Mining Approaches for Intrusion Detection
-
-
Lee, W.1
Stolfo, S.J.2
-
28
-
-
0002774999
-
Learning patterns from Unix process execution traces for intrusion detection
-
Menlo Park, CA: AAAI Press
-
Lee, W., Stolfo, S. J., & Chan, P. K. (1999). Learning patterns from Unix process execution traces for intrusion detection. AAAI Workshop: AI Approaches to Fraud Detection and Risk Management. Menlo Park, CA: AAAI Press 50-56.
-
(1999)
AAAI Workshop: AI Approaches to Fraud Detection and Risk Management
, pp. 50-56
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
-
29
-
-
0003158868
-
Mining audit data to build intrusion detection models
-
R. Agrawal, P. E. Stolorz, & G. Piatetsky-Shapiro (Eds.) (KDD-98), Menlo Park, CA: AAAI Press
-
Lee, W., Stolfo, S. J., & Mok, K. W. (2000). Mining audit data to build intrusion detection models. In R. Agrawal, P. E. Stolorz, & G. Piatetsky-Shapiro (Eds.), Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), Menlo Park, CA: AAAI Press, 66-72.
-
(2000)
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining
, pp. 66-72
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
30
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Lippmann, R., & Cunningham, R. K. (2000). Improving intrusion detection performance using keyword selection and neural networks. Computer Networks, 34, 597-603
-
(2000)
Computer Networks
, vol.34
, pp. 597-603
-
-
Lippmann, R.1
Cunningham, R.K.2
-
31
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R., Haines, J. W., Fried, D. J., Korba, J., & Das, K. (2000). The 1999 DARPA off-line intrusion detection evaluation. Computer Networks, 34, 579-595.
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
32
-
-
0027609384
-
A survey of intrusion detection techniques
-
Lunt, T. F. (1993). A survey of intrusion detection techniques. Computer & Security, 12.
-
(1993)
Computer & Security
, vol.12
-
-
Lunt, T.F.1
-
33
-
-
0003451777
-
-
Technical Report, Computer Science Laboratory. Menlo Park, CA: SRI International
-
Lunt T. F., Tamaru A., Gilham F., Jagannathan R., Neumann P. G., Javitz H. S., Valdes A., & Garvey, T. D. (1992). A real-time intrusion detection expert system (IDES). Technical Report, Computer Science Laboratory. Menlo Park, CA: SRI International.
-
(1992)
A Real-time Intrusion Detection Expert System (IDES)
-
-
Lunt, T.F.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.G.5
Javitz, H.S.6
Valdes, A.7
Garvey, T.D.8
-
34
-
-
27244453070
-
GASSATA - A genetic algorithm as an alternative tool for security audit trails analysis
-
Louvain-la-Neuve, Belgium
-
Mé, L. (1998). GASSATA - A genetic algorithm as an alternative tool for security audit trails analysis. First International Workshop on the Recent Advances in Intrusion Detection (RAID98). Louvain-la-Neuve, Belgium. Available at http://www.zurich.ibm.com/~dac/Prog_RAID98/Table_of_content.html
-
(1998)
First International Workshop on the Recent Advances in Intrusion Detection (RAID98)
-
-
Mé, L.1
-
35
-
-
0002944481
-
Inducing rules for expert system development: An example using default and bankruptcy rules
-
Messier, W. F., & Hansen, J. V. (1988). Inducing rules for expert system development: An example using default and bankruptcy rules. Management Science 34(12), 1403-1415.
-
(1988)
Management Science
, vol.34
, Issue.12
, pp. 1403-1415
-
-
Messier, W.F.1
Hansen, J.V.2
-
37
-
-
0029405527
-
Rough sets
-
Pawlak, Z., Grzymala-Busse, J., Slowinski, R., & Ziarko, W. (1995). Rough sets. Communications of the ACM, 38(11), 89-95.
-
(1995)
Communications of the ACM
, vol.38
, Issue.11
, pp. 89-95
-
-
Pawlak, Z.1
Grzymala-Busse, J.2
Slowinski, R.3
Ziarko, W.4
-
39
-
-
0038323501
-
Live traffic analysis of TCP/IP gateways
-
San Diego, CA: Internet Society, March, 11-13
-
Porras, P. A., & Valdes, A. (1998). Live traffic analysis of TCP/IP gateways. Proceedings of the Network and Distributed System Security Symposium. San Diego, CA: Internet Society, March, 11-13, Available at http:// www.sdl.sri.com/papers/gateway98/
-
(1998)
Proceedings of the Network and Distributed System Security Symposium
-
-
Porras, P.A.1
Valdes, A.2
-
40
-
-
0001857179
-
Learning efficient classification procedures and their application to chess end games
-
R. S. Michalski, J. G. Carbonell, & T. M. Mitchell (Eds.), Palo Alto, CA: Tioga Publishing Company
-
Quinlan, J. R. (1984). Learning efficient classification procedures and their application to chess end games. In R. S. Michalski, J. G. Carbonell, & T. M. Mitchell (Eds.), Machine learning, An artificial intelligence approach. Palo Alto, CA: Tioga Publishing Company, 463-482.
-
(1984)
Machine Learning, An Artificial Intelligence Approach
, pp. 463-482
-
-
Quinlan, J.R.1
-
42
-
-
0000646059
-
Learning internal representations by error propagation
-
D. E. Rumelhart & J. L. McClelland (Eds.), Cambridge, MA: The MIT Press
-
Rumelhart, D. E., Hinton, G. E., & Williams, R. J. (1986). Learning internal representations by error propagation. In D. E. Rumelhart & J. L. McClelland (Eds.), Parallel distributed processing. Cambridge, MA: The MIT Press, 318-362.
-
(1986)
Parallel Distributed Processing
, pp. 318-362
-
-
Rumelhart, D.E.1
Hinton, G.E.2
Williams, R.J.3
-
43
-
-
0028333285
-
Using machine learning to monitor network performance
-
Oakland, CA: IEEE Press
-
Sasisekharan, R., Seshadri, V., & Weiss, S. M. (1994). Using machine learning to monitor network performance. IEEE Conference on Artificial Intelligence Applications. Oakland, CA: IEEE Press, 92-98.
-
(1994)
IEEE Conference on Artificial Intelligence Applications
, pp. 92-98
-
-
Sasisekharan, R.1
Seshadri, V.2
Weiss, S.M.3
-
44
-
-
0041189144
-
An evaluation of the corporate takeover model using neural networks
-
Sen, T. K., & Gibbs, A. M. (1994). An evaluation of the corporate takeover model using neural networks. Intelligent Systems in Accounting, Finance and Management, 3(4), 279-292.
-
(1994)
Intelligent Systems in Accounting, Finance and Management
, vol.3
, Issue.4
, pp. 279-292
-
-
Sen, T.K.1
Gibbs, A.M.2
-
45
-
-
0002673897
-
Application of the rough set approach to evaluation of bankruptcy risk
-
Slowinski, R., & Zopounidis, C. (1995). Application of the rough set approach to evaluation of bankruptcy risk. International Journal of Intelligent Systems in Accounting, Finance, and Management, 4(1), 27-41.
-
(1995)
International Journal of Intelligent Systems in Accounting, Finance, and Management
, vol.4
, Issue.1
, pp. 27-41
-
-
Slowinski, R.1
Zopounidis, C.2
-
46
-
-
0043216635
-
Prediction of company acquisition in Greece by means of the rough set approach
-
Slowinski, R., Zopounidis, C., & Dimitras, A. I. (1997). Prediction of company acquisition in Greece by means of the rough set approach. European Journal of Operations Research, 100, 1-15.
-
(1997)
European Journal of Operations Research
, vol.100
, pp. 1-15
-
-
Slowinski, R.1
Zopounidis, C.2
Dimitras, A.I.3
-
48
-
-
0033277434
-
Choosing data-mining methods for multiple classification: Representational and performance measure implication for decision support
-
Spangler, W., May, J. H., & Vargas, L. G. (1999). Choosing data-mining methods for multiple classification: Representational and performance measure implication for decision support. Journal of Management Information Systems, 16(1), 37-62.
-
(1999)
Journal of Management Information Systems
, vol.16
, Issue.1
, pp. 37-62
-
-
Spangler, W.1
May, J.H.2
Vargas, L.G.3
-
49
-
-
0002675748
-
Intrusion detection on distributed systems
-
Stillerman, M., Marceau, C., & Stillman, M. (1999). Intrusion detection on distributed systems. Communications of the ACM, 42(7), 62-69.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 62-69
-
-
Stillerman, M.1
Marceau, C.2
Stillman, M.3
-
50
-
-
0040595008
-
Function approximations and predictions: A comparative study
-
C. H. Dagl, M. Akay, O. Ersoy, B. Fernand, & A. Smith (Eds.), New York: ASME Press
-
Sun, X., Wang, Q., & Zhu, D. (1997). Function approximations and predictions: A comparative study. In C. H. Dagl, M. Akay, O. Ersoy, B. Fernand, & A. Smith (Eds.), Intelligent systems through artificial neural networks smart engineering systems, neural networks, fuzzy logic, data mining and evolutionary programming. Volume 7, New York: ASME Press.
-
(1997)
Intelligent Systems Through Artificial Neural Networks Smart Engineering Systems, Neural Networks, Fuzzy Logic, Data Mining and Evolutionary Programming
, vol.7
-
-
Sun, X.1
Wang, Q.2
Zhu, D.3
-
51
-
-
0033277431
-
Dynamics of modeling in data mining: Interpretive approach to bankruptcy prediction
-
Sung, T. K., Chang, N., & Lee, G. (1999). Dynamics of modeling in data mining: Interpretive approach to bankruptcy prediction. Journal of Management Information Systems, 16(1), 63-85.
-
(1999)
Journal of Management Information Systems
, vol.16
, Issue.1
, pp. 63-85
-
-
Sung, T.K.1
Chang, N.2
Lee, G.3
-
52
-
-
84997479670
-
Managerial applications of neural networks: The case of bank failure prediction
-
Tam, K., & Kiang, M. (1992). Managerial applications of neural networks: The case of bank failure prediction. Management Science, 38(1), 926-947.
-
(1992)
Management Science
, vol.38
, Issue.1
, pp. 926-947
-
-
Tam, K.1
Kiang, M.2
-
53
-
-
0032639421
-
Detecting intrusion using system calls: Alternative data models
-
Oakland, CA: IEEE Computer Society Press
-
Warrender, C., Forrest, S. & Pearlmutter, B. (1999). Detecting intrusion using system calls: Alternative data models. Proceedings of the IEEE Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 133-145.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
54
-
-
0001512820
-
An empirical comparison of pattern recognition, neural nets, and machine learning classification methods
-
San Francisco: Morgan Kaufmann
-
Weiss, S. M., & Kapouleas, I. (1989). An empirical comparison of pattern recognition, neural nets, and machine learning classification methods. Proceedings of the Eleventh International Joint Conference on Artificial Intelligence, San Francisco: Morgan Kaufmann, 781-787.
-
(1989)
Proceedings of the Eleventh International Joint Conference on Artificial Intelligence
, pp. 781-787
-
-
Weiss, S.M.1
Kapouleas, I.2
-
55
-
-
0028444978
-
Bankruptcy prediction using neural networks
-
Wilson, R. L., & Sharda, R. (1994). Bankruptcy prediction using neural networks. Decision Support Systems, 11, 545-557.
-
(1994)
Decision Support Systems
, vol.11
, pp. 545-557
-
-
Wilson, R.L.1
Sharda, R.2
-
56
-
-
0031476199
-
Connectionist approaches for solver selection in constrained project scheduling
-
Zhu, D., & Padman, R. (1997). Connectionist approaches for solver selection in constrained project scheduling. Annals of Operations Research, 72, 265-298.
-
(1997)
Annals of Operations Research
, vol.72
, pp. 265-298
-
-
Zhu, D.1
Padman, R.2
|