-
1
-
-
0025725905
-
Instance-based learning algorithms
-
D. Aha, D. Kibler, M. Albert. Instance-based learning algorithms. Machine learning, 6(1):37-66, 1991.
-
(1991)
Machine Learning
, vol.6
, Issue.1
, pp. 37-66
-
-
Aha, D.1
Kibler, D.2
Albert, M.3
-
3
-
-
0142222738
-
Detection and classification of intrusions and faults using sequences of system calls
-
December
-
J.B.D. Cabrera, L. Lewis, R.K. Mehra. Detection and Classification of Intrusions and Faults using Sequences of System Calls. SIGMOD Record, 30(4), pp 25-34. December 2001.
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 25-34
-
-
Cabrera, J.B.D.1
Lewis, L.2
Mehra, R.K.3
-
6
-
-
0012297627
-
Computer intrusion detection based on bayes factors for comparing command transition probabilities
-
In National Institute of Statistical Sciences Tech. Report 91, February
-
W. DuMouchel. Computer Intrusion Detection Based on Bayes Factors for Comparing Command Transition Probabilities. In National Institute of Statistical Sciences Tech. Report 91, February 1999.
-
(1999)
-
-
DuMouchel, W.1
-
10
-
-
0013425679
-
Machine learning techniques for the computer security domain of anomaly detection
-
Ph. D. Thesis, CERIAS TR 2000-12, Purdue University, August
-
T. Lane. Machine Learning Techniques for the Computer Security Domain of Anomaly Detection. Ph. D. Thesis, CERIAS TR 2000-12, Purdue University, August 2000.
-
(2000)
-
-
Lane, T.1
-
12
-
-
0242529343
-
Out of the NOC(a) and into the boardroom: Director and officer responsibility for information security
-
July 30
-
D. J. Langin. Out of the NOC(a) and Into the Boardroom: Director and Officer Responsibility for Information Security. July 30, 2001. URL: http://www.recourse.com/news/press/releases/r073001.html
-
(2001)
-
-
Langin, D.J.1
-
14
-
-
84964411176
-
Real time data mining-based intrusion detection
-
W. Lee, S. Stolfo, P. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, J. Zhang. Real Time Data Mining-based Intrusion Detection. In DARPA Information Survivability Conference and Exposition II. June 2001.
-
DARPA Information Survivability Conference and Exposition II. June 2001
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
18
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
February
-
M. Schonlau, W. DuMouchel, W. Ju, A. Karr, M. Theus, Y. Vardi. Computer Intrusion: Detecting Masquerades. Statistical Science, 16:1-17. February 2001.
-
(2001)
Statistical Science
, vol.16
, pp. 1-17
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.3
Karr, A.4
Theus, M.5
Vardi, Y.6
-
19
-
-
84955580290
-
An architecture for intrusion detection using autonomous agents
-
J. S. Subramaniyan, J. O. Garcia-Fernandez, D. Isacoff, E. Spafford, D. Zamboni. An Architecture for Intrusion Detection Using Autonomous Agents. In 14th Annual Computer Security Applications Conf, December 1998.
-
14th Annual Computer Security Applications Conf, December 1998
-
-
Subramaniyan, J.S.1
Garcia-Fernandez, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
20
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
Springer-Verlag; October
-
A. Valdes, K. Skinner. Adaptive, Model-based Monitoring for Cyber Attack Detection, Lecture Notes in CS, No. 1907, Springer-Verlag, pp. 80-92, October 2000.
-
(2000)
Lecture Notes in CS, No. 1907
, Issue.1907
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
22
-
-
24444453801
-
Using clustering to detect abnormal behavior in a distributed intrusion detection system
-
Unreleased Technical Report, Purdue University. August
-
D. Zamboni. Using clustering to detect abnormal behavior in a distributed intrusion detection system. Unreleased Technical Report, Purdue University. August, 2001.
-
(2001)
-
-
Zamboni, D.1
|