-
1
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Technical report, Carnegie Mellon University, January
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel and E. Stoner. State of the Practice of Intrusion Detection Technologies. Technical report, Carnegie Mellon University, January 2000. http://www.cert.org/archive/pdf/99tr028.pdf.
-
(2000)
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
Mchugh, J.4
Pickel, J.5
Stoner, E.6
-
2
-
-
0003907293
-
-
Macmillan Technical Publishing
-
R. Bace. Intrusion Detection. Macmillan Technical Publishing, 2000.
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
3
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
D. Barbará, J. Couto, S. Jajodia, L. Popyack and N. Wu. ADAM: Detecting Intrusions by Data Mining. In IEEE Workshop on Information Assurance and Security, 2001.
-
IEEE Workshop on Information Assurance and Security, 2001
-
-
Barbará, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
4
-
-
0038324535
-
-
D. Barbará and S. Jajodia, editors; Kluwer Academic Publisher, Boston
-
D. Barbará and S. Jajodia, editors. Applications of Data Mining in Computer Security. Kluwer Academic Publisher, Boston, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
-
7
-
-
0000537685
-
Conceptual clustering in a first order logic representation
-
G. Bisson. Conceptual Clustering in a First Order Logic Representation. In 10th European Conf. on Artificial Intelligence, pages 458-462, 1992.
-
(1992)
10th European Conf. on Artificial Intelligence
, pp. 458-462
-
-
Bisson, G.1
-
8
-
-
0242614019
-
Data mining for improving intrusion detection
-
E. Bloedorn, B. Hill, A. Christiansen, C. Skorupka, L. Talboot and J. Tivel. Data Mining for Improving Intrusion Detection, 2000. http://www.mitre.org/support/papers/tech_papers99_00/.
-
(2000)
-
-
Bloedorn, E.1
Hill, B.2
Christiansen, A.3
Skorupka, C.4
Talboot, L.5
Tivel, J.6
-
9
-
-
3142652076
-
IBM outsourced solution
-
J. Broderick - Editor
-
J. Broderick - Editor. IBM Outsourced Solution, 1998. http://www.infoworld.com/cgi-bin/displayTC.pl?/980504sb3-ibm.htm.
-
(1998)
-
-
-
10
-
-
85083464467
-
Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection
-
P. Chan and S. Stolfo. Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection. In 4th Int'l Conf. on Knowledge Discovery and Data Mining, pages 164-168, 1998.
-
(1998)
4th Int'l Conf. on Knowledge Discovery and Data Mining
, pp. 164-168
-
-
Chan, P.1
Stolfo, S.2
-
13
-
-
0034226287
-
A revised taxonomy for intrusion detection systems
-
H. Debar, M. Dacier and A. Wespi. A Revised Taxonomy for Intrusion Detection Systems, Annales des Télécommunications, 55(7-8):361-378, 2000.
-
(2000)
Annales des Télécommunications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
16
-
-
0343442766
-
Knowledge acquisition via incremental conceptual clustering
-
D. H. Fisher. Knowledge Acquisition Via Incremental Conceptual Clustering. Machine Learning, 2:139-172, 1987.
-
(1987)
Machine Learning
, vol.2
, pp. 139-172
-
-
Fisher, D.H.1
-
20
-
-
0034228041
-
ROCK: A robust clustering algorithm for categorical attributes
-
S. Guha, R. Rastogi, and K. Shim. ROCK: A Robust Clustering Algorithm for Categorical Attributes. Information Systems, 25(5):345-366, 2000.
-
(2000)
Information Systems
, vol.25
, Issue.5
, pp. 345-366
-
-
Guha, S.1
Rastogi, R.2
Shim, K.3
-
22
-
-
0002889848
-
Dynamic generation and refinement of concept hierarchies for knowledge discovery in databases
-
J. Han and Y. Fu. Dynamic Generation and Refinement of Concept Hierarchies for Knowledge Discovery in Databases. In Workshop on Knowledge Discovery in Databases, pages 157-168, 1994.
-
(1994)
Workshop on Knowledge Discovery in Databases
, pp. 157-168
-
-
Han, J.1
Fu, Y.2
-
23
-
-
0002479811
-
Exploration of the power of attribute-oriented induction in data mining
-
In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy, editors; AAAI Press/MIT Press
-
J. Han and Y. Fu. Exploration of the Power of Attribute-Oriented Induction in Data Mining. In U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy, editors Advances in Knowledge Discovery and Data Mining. AAAI Press/MIT Press, 1996.
-
(1996)
Advances in Knowledge Discovery and Data Mining
-
-
Han, J.1
Fu, Y.2
-
25
-
-
25544437096
-
Attribute-oriented induction and conceptual clustering
-
Technical Report Report C-1996-2, University of Helsinki
-
O. Heinonen and H. Mannila. Attribute-Oriented Induction and Conceptual Clustering. Technical Report Report C-1996-2, University of Helsinki, 1996.
-
(1996)
-
-
Heinonen, O.1
Mannila, H.2
-
26
-
-
25544433827
-
Mining event data for actionable patterns
-
In The Computer Measurement Group
-
J. L. Hellerstein and S. Ma. Mining Event Data for Actionable Patterns. In The Computer Measurement Group, 2000.
-
(2000)
-
-
Hellerstein, J.L.1
Ma, S.2
-
31
-
-
0011223337
-
A knowledge discovery methodology for telecommunication network alarm data
-
PhD thesis, University of Helsinky (Finland)
-
M. Klemettinen. A Knowledge Discovery Methodology for Telecommunication Network Alarm Data. PhD thesis, University of Helsinky (Finland), 1999.
-
(1999)
-
-
Klemettinen, M.1
-
32
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and S.J. Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security, 3(4):227-261, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
33
-
-
0034301662
-
A data mining analysis of RTID alarms
-
October
-
S. Manganaris, M. Christensen, D. Zerkle and K. Hermiz. A Data Mining Analysis of RTID Alarms. Computer Networks, 34(4), October 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
38
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
39
-
-
3142682919
-
Criteria for polynomial time (conceptual) clustering
-
L. Pitt and R. E. Reinke. Criteria for Polynomial Time (Conceptual) Clustering. Machine Learning, 2(4):371-396, 1987.
-
(1987)
Machine Learning
, vol.2
, Issue.4
, pp. 371-396
-
-
Pitt, L.1
Reinke, R.E.2
|