메뉴 건너뛰기




Volumn , Issue , 2004, Pages 276-285

Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage

Author keywords

Anomaly detection; Feature selection; Intrusion detection; Machine learning; User modeling; Windows 2000; Winnow algorithm

Indexed keywords

ALGORITHMS; COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE; DATA REDUCTION; MATHEMATICAL MODELS; PROBLEM SOLVING; SECURITY OF DATA; SENSORS;

EID: 12244298487     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1014052.1014084     Document Type: Conference Paper
Times cited : (37)

References (13)
  • 1
    • 33847156085 scopus 로고    scopus 로고
    • PNrule: A new framework for learning classifier models in data mining (A case-study in network intrusion detection,)
    • R. Agarwal & M. Joshi, PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection,) Proc. First SIAM Intl. Conf. on Data Mining, 2001.
    • (2001) Proc. First SIAM Intl. Conf. on Data Mining
    • Agarwal, R.1    Joshi, M.2
  • 5
    • 85166317163 scopus 로고    scopus 로고
    • Approaches to online learning and concept drift for user identification in computer security
    • T. Lane & C. Brodley, Approaches to Online Learning and Concept Drift for User Identification in Computer Security, Proc. KDD, pp 259-263, 1998.
    • (1998) Proc. KDD , pp. 259-263
    • Lane, T.1    Brodley, C.2
  • 8
    • 34250091945 scopus 로고    scopus 로고
    • Learning quickly when irrelevant attributes abound
    • N. Littlestone, Learning Quickly When Irrelevant Attributes Abound. Machine Learning 2, pp. 285-318.
    • Machine Learning , vol.2 , pp. 285-318
    • Littlestone, N.1
  • 9
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • T. Lunt, A Survey of Intrusion Detection Techniques, Computers and Security 12:4, pp. 405-418, 1993.
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.