-
1
-
-
0035338003
-
A new intrusion detection method based on discriminant analysis
-
ASAKA, M., T. ONABUTA, T. INOUE, S. OKAZAWA and S. GOTO (2001) A new intrusion detection method based on discriminant analysis, IEICE Transactions on Information and Systems, E84D (5), 570-577.
-
(2001)
IEICE Transactions on Information and Systems
, vol.E84D
, Issue.5
, pp. 570-577
-
-
Asaka, M.1
Onabuta, T.2
Inoue, T.3
Okazawa, S.4
Goto, S.5
-
2
-
-
0003907293
-
-
Basingstoke: Macmillan Technical
-
BACE, R. (2000) Intrusion Detection, Basingstoke: Macmillan Technical.
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
3
-
-
0034223798
-
Classification and rule induction using rough set theory
-
BEYNON, M.J., B. CURRY and P.H. MORGAN (2000) Classification and rule induction using rough set theory, Expert Systems, 17 (3), 136-148.
-
(2000)
Expert Systems
, vol.17
, Issue.3
, pp. 136-148
-
-
Beynon, M.J.1
Curry, B.2
Morgan, P.H.3
-
5
-
-
0029716418
-
A sense of self for UNIX processes
-
New York: IEEE Computer Society
-
FORREST, S., S.A. HOFMEYR, A. SOMAYAJI and T.A. LONGSTAFF (1996) A sense of self for UNIX processes, in Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy, New York: IEEE Computer Society, 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Computer Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
6
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
HOFMEYER, S., S. FORREST and A. SOMAYAJI (1998) Intrusion detection using sequences of system calls, Journal of Computer Security, 6 (3), 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyer, S.1
Forrest, S.2
Somayaji, A.3
-
7
-
-
0010533951
-
The extraction of trading rules from stock market data using rough sets
-
KIM, K. and I. HAN (2001) The extraction of trading rules from stock market data using rough sets, Expert Systems, 18 (4), 194-202.
-
(2001)
Expert Systems
, vol.18
, Issue.4
, pp. 194-202
-
-
Kim, K.1
Han, I.2
-
8
-
-
0003144494
-
Rough sets: A tutorial
-
S. Pal and A. Skowron (eds), Berlin: Springer
-
KOMOROWSKI, J., Z. PAWLAK, L. POLKOWSKI and A. SKOWRON (1999) Rough sets: a tutorial, in Rough Fuzzy Hybridization, S. Pal and A. Skowron (eds), Berlin: Springer, 3-98.
-
(1999)
Rough Fuzzy Hybridization
, pp. 3-98
-
-
Komorowski, J.1
Pawlak, Z.2
Polkowski, L.3
Skowron, A.4
-
10
-
-
0242291228
-
The ROSETTA software system
-
L. Polkowski and A. Skowron (eds), Studies in Fuzziness and Soft Computing 19, Heidelberg: Physica
-
ØHRN, A., J. KOMOROWSKI, A. SKOWRON and P. SYNAK (1998) The ROSETTA software system, in Rough Sets in Knowledge Discovery 2: Applications, Case Studies and Software Systems, L. Polkowski and A. Skowron (eds), Studies in Fuzziness and Soft Computing 19, Heidelberg: Physica, 572-576.
-
(1998)
Rough Sets in Knowledge Discovery 2: Applications, Case Studies and Software Systems
, pp. 572-576
-
-
Øhrn, A.1
Komorowski, J.2
Skowron, A.3
Synak, P.4
-
13
-
-
0037636215
-
Intrusion detection using variable-length audit trail patterns
-
H. Debar, Me et al. (eds), No. 1907 in LNCS, Berlin: Springer
-
WESPI, A., M. DACIER and H. DEBAR (2000) Intrusion detection using variable-length audit trail patterns, in Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID 2000), H. Debar, Me et al. (eds), No. 1907 in LNCS, Berlin: Springer.
-
(2000)
Proceedings of the Third International Workshop on the Recent Advances in Intrusion Detection (RAID 2000)
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
-
15
-
-
0040431304
-
Data mining for network intrusion detection: A comparison of alternative methods
-
ZHU, D., G. PREMKUMAR, X. ZHANG and C. CHU (2001) Data mining for network intrusion detection: a comparison of alternative methods, Decision Sciences, 32 (4), 635-660.
-
(2001)
Decision Sciences
, vol.32
, Issue.4
, pp. 635-660
-
-
Zhu, D.1
Premkumar, G.2
Zhang, X.3
Chu, C.4
|