-
4
-
-
0038458235
-
Defending a computer system using autonomous agents
-
Technical Report CSD-TR-95-022
-
M. Crosbie and E. H. Spafford, "Defending a Computer System Using Autonomous Agents", Technical Report CSD-TR-95-022, 1995.
-
(1995)
-
-
Crosbie, M.1
Spafford, E.H.2
-
6
-
-
0026850007
-
A neural network component for an intrusion detection system
-
H. Debar, M. Becke, and D. Siboni, "A Neural Network Component for an Intrusion Detection System", Proc. IEEE Computer Society Symposium on Research in Security and Privacy, pp.240-250, 1992.
-
(1992)
Proc. IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 240-250
-
-
Debar, H.1
Becke, M.2
Siboni, D.3
-
7
-
-
0023294428
-
An intrusion-detection model
-
D. Denning, "An Intrusion-Detection Model", IEEE Transactions on Software Engineering, Vol. SE-13, No. 2, pp.222-232, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
9
-
-
0003798642
-
Making large-scale SVM learning practical
-
LS8-Report, University of Dortmund, LS VIII-Report
-
T. Joachims, "Making Large-Scale SVM Learning Practical", LS8-Report, University of Dortmund, LS VIII-Report, 2000.
-
(2000)
-
-
Joachims, T.1
-
10
-
-
0003583743
-
SVMlight is an implementation of support vector machines (SVMs) in C
-
University of Dortmund. Collaborative Research Center on Complexity Reduction in Multivariate Data (SFB475)
-
T. Joachims, "SVMlight is an Implementation of Support Vector Machines (SVMs) in C", http://ais.gmd.de/~thorsten/svm_light. University of Dortmund. Collaborative Research Center on Complexity Reduction in Multivariate Data (SFB475), 2000.
-
(2000)
-
-
Joachims, T.1
-
11
-
-
0004204715
-
A database of computer attacks for the evaluation of intrusion detection systems
-
Master's Thesis, Massachusetts Institute of Technology
-
K. Kendall, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems", Master's Thesis, Massachusetts Institute of Technology, 1998.
-
(1998)
-
-
Kendall, K.1
-
12
-
-
0003900915
-
An application of pattern matching in intrusion detection
-
Technical Report CSD-TR-94-013. Purdue University
-
S. Kumar, and E. H. Spafford, "An Application of Pattern Matching in Intrusion Detection", Technical Report CSD-TR-94-013. Purdue University, 1994.
-
(1994)
-
-
Kumar, S.1
Spafford, E.H.2
-
13
-
-
0034247240
-
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
-
John Wiley & Sons
-
J. Luo, and S. M. Bridges, "Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection", International Journal of Intelligent Systems, John Wiley & Sons, Vol. 15, No. 8, pp.687-704, 2000.
-
(2000)
International Journal of Intelligent Systems
, vol.15
, Issue.8
, pp. 687-704
-
-
Luo, J.1
Bridges, S.M.2
-
14
-
-
0036085392
-
Intrusion detection using neural networks and support vector machines
-
S. Mukkamala, G. Janoski, and A. H. Sung, "Intrusion Detection Using Neural Networks and Support Vector Machines", Proc. IEEE International Joint Conference on Neural Networks, pp.1702-1707, 2002
-
(2002)
Proc. IEEE International Joint Conference on Neural Networks
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.H.3
-
16
-
-
4244169431
-
Agent-based distributed learning applied to fraud detection
-
Technical Report, CUCS-014-99
-
L. Prodromidis and S. J. Stolfo, "Agent-Based Distributed Learning Applied to Fraud Detection", Technical Report, CUCS-014-99, 1999.
-
(1999)
-
-
Prodromidis, L.1
Stolfo, S.J.2
-
17
-
-
84898944587
-
Intrusion detection with neural networks
-
Cambridge, MA: MIT Press
-
J. Ryan, M. J. Lin, and R. Miikkulainen, "Intrusion Detection with Neural Networks", Advances in Neural Information Processing Systems, Vol. 10, Cambridge, MA: MIT Press, 1998.
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
18
-
-
0038480357
-
Cost-based modeling and evaluation for data mining with application to fraud and intrusion detection
-
J. Stolfo, F. Wei, W. Lee, A. Prodromidis, and P. K. Chan, "Cost-based Modeling and Evaluation for Data Mining with Application to Fraud and Intrusion Detection", Results from the JAM Project by Salvatore, 1999.
-
(1999)
Results from the JAM Project by Salvatore
-
-
Stolfo, J.1
Wei, F.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
19
-
-
0003450542
-
The nature of statistical learning theory
-
Springer
-
V. N. Vladimir, "The Nature of Statistical Learning Theory", Springer, 1995.
-
(1995)
-
-
Vladimir, V.N.1
-
20
-
-
0006890005
-
The development and analysis of intrusion detection algorithms
-
S.M. Thesis, Massachusetts Institute of Technology
-
S. E. Webster, "The Development and Analysis of Intrusion Detection Algorithms", S.M. Thesis, Massachusetts Institute of Technology, 1998.
-
(1998)
-
-
Webster, S.E.1
-
21
-
-
0242497418
-
-
http://kdd.ics.uci.edu/databases/kddcup99/task.htm.
-
-
-
-
22
-
-
0242414175
-
-
http://www.ll.mit.edu/IST/ideval/data/data_index.html
-
-
-
|