-
1
-
-
20444496132
-
Correlation between netFlow system and network views for intrusion detection
-
C. Abaci, Y. Li, K. Lakkaraju, X. Yin, and W. Yurcik. Correlation Between NetFlow System and Network Views for Intrusion Detection In Workshop on Link Analysis, Counter-terrorism, and Privacy held in conjunction with the SIAM International Conference on Data Mining (ICDM), 2004.
-
(2004)
Workshop on Link Analysis, Counter-terrorism, and Privacy Held in Conjunction with the SIAM International Conference on Data Mining (ICDM)
-
-
Abaci, C.1
Li, Y.2
Lakkaraju, K.3
Yin, X.4
Yurcik, W.5
-
2
-
-
84944721192
-
Log correlation for intrusion detection: A proof of concept
-
C. Abad, J. Taylor, C. Sengul, W. Yurcik, Y. Zhou, and K. Rowe. Log correlation for intrusion detection: A proof of concept. In Annual Computer Security Applications Conference (ACSAC), 2003.
-
(2003)
Annual Computer Security Applications Conference (ACSAC)
-
-
Abad, C.1
Taylor, J.2
Sengul, C.3
Yurcik, W.4
Zhou, Y.5
Rowe, K.6
-
5
-
-
4544229404
-
Adam: Detecting intrusions by data mining
-
June
-
D. Barbara, J. Couto, S. Jajodia, L. Popyack, and N. Wu. Adam: Detecting intrusions by data mining. In Proceedings of the IEEE Workshop on Information Assurance and Security, June 2001.
-
(2001)
Proceedings of the IEEE Workshop on Information Assurance and Security
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
6
-
-
0029272732
-
Visualizing network data
-
R. A. Becker, S. G. Eick, and A. R. Wilks. Visualizing network data. IEEE Transactions on Visualization and Computer Graphics, 1(1):16-28, 1995.
-
(1995)
IEEE Transactions on Visualization and Computer Graphics
, vol.1
, Issue.1
, pp. 16-28
-
-
Becker, R.A.1
Eick, S.G.2
Wilks, A.R.3
-
14
-
-
0034322718
-
Network visualization with nam, the vint network animator
-
D. Estrin, M. Handley, J. Heidemann, S. McCanne, Y. Xu, and H. Yu. Network visualization with nam, the vint network animator. Computer, 33(11):63-68, 2000.
-
(2000)
Computer
, vol.33
, Issue.11
, pp. 63-68
-
-
Estrin, D.1
Handley, M.2
Heidemann, J.3
McCanne, S.4
Xu, Y.5
Yu, H.6
-
15
-
-
0012292276
-
A neural network approach towards intrusion detection
-
Harris Corporation, July
-
K. Fox, R. Henning, J. Reed, and R. Simonian. A neural network approach towards intrusion detection. Technical report, Harris Corporation, July 1990.
-
(1990)
Technical Report
-
-
Fox, K.1
Henning, R.2
Reed, J.3
Simonian, R.4
-
18
-
-
0025568642
-
Parallel coordinates: A tool for visualizing multidimensional geometry
-
IEEE Computer Society, October
-
A. Inselberg and B. Dimsdale. Parallel coordinates: a tool for visualizing multidimensional geometry. In IEEE Visualization '90 Proceedings, pages 361-378. IEEE Computer Society, October 1990.
-
(1990)
IEEE Visualization '90 Proceedings
, pp. 361-378
-
-
Inselberg, A.1
Dimsdale, B.2
-
19
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
J. M. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46(5):604-632, 1999.
-
(1999)
J. ACM
, vol.46
, Issue.5
, pp. 604-632
-
-
Kleinberg, J.M.1
-
21
-
-
20444484611
-
NVisionIP: NetFlow visualizations of system state for security situational awareness
-
K. Lakkaraju, W. Yurcik, A. Lee, R. Bearavolu, Y. Li, and X. Yin. NVisionIP: NetFlow Visualizations of System State for Security Situational Awareness. In ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC) held in conjunction with the 11th ACM Conference on Computer and Communications Security, 2004.
-
(2004)
ACM CCS Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC) Held in Conjunction with the 11th ACM Conference on Computer and Communications Security
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.3
Bearavolu, R.4
Li, Y.5
Yin, X.6
-
24
-
-
0005018009
-
Netflow services and applications
-
Cisco Systems
-
Netflow services and applications. Technical report, Cisco Systems, 1999.
-
(1999)
Technical Report
-
-
-
27
-
-
0003780986
-
The pagerank citation ranking: Bringing order to the web
-
Stanford Digital Library Technologies Project
-
L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford Digital Library Technologies Project, 1998.
-
(1998)
Technical Report
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
28
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks (Amsterdam, Netherlands: 1999), 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks (Amsterdam, Netherlands: 1999)
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
33
-
-
84860944164
-
-
Visuallinks suite, www.visualanalytics.com/Products/VL3-0Features.cfm.
-
-
-
-
34
-
-
84950434348
-
Hyperdimensional data analysis using parallel coordinates
-
E. Wegman. Hyperdimensional data analysis using parallel coordinates. Journal of the American Statistical Association, 85:664-675, 1990.
-
(1990)
Journal of the American Statistical Association
, vol.85
, pp. 664-675
-
-
Wegman, E.1
-
35
-
-
2442480533
-
VisFlowConnect: Providing security situational awareness by visualizing network traffic flows
-
X. Yin, W. Yurcik, Y. Li, K. Lakkaraju, and C. Abad. VisFlowConnect: Providing Security Situational Awareness by Visualizing Network Traffic Flows. In Workshop on Information Assurance (WIA04) held in conjunction with the 23rd IEEE International Performance Computing and Communications Conference (IPCCC), 2004.
-
(2004)
Workshop on Information Assurance (WIA04) Held in Conjunction with the 23rd IEEE International Performance Computing and Communications Conference (IPCCC)
-
-
Yin, X.1
Yurcik, W.2
Li, Y.3
Lakkaraju, K.4
Abad, C.5
-
36
-
-
20444477572
-
A prototype tool for visual data mining of network traffic for intrusion detection
-
W. Yurcik, J. Barlow, K. Lakkaraju, and J. Rosendale. A prototype tool for visual data mining of network traffic for intrusion detection. In 3rd IEEE International Conference on Data Mining (ICDM), Workshop on Data Mining for Computer Security (DMSEC), 2003.
-
(2003)
3rd IEEE International Conference on Data Mining (ICDM), Workshop on Data Mining for Computer Security (DMSEC)
-
-
Yurcik, W.1
Barlow, J.2
Lakkaraju, K.3
Rosendale, J.4
-
37
-
-
12344280878
-
Pagecluster: Mining conceptual link hierarchies from web log files for adaptive web site navigation
-
J. Zhu, J. Hong, and J. G. Hughes. Pagecluster: Mining conceptual link hierarchies from web log files for adaptive web site navigation. ACM Trans. Inter. Tech., 4(2): 185-208, 2004.
-
(2004)
ACM Trans. Inter. Tech.
, vol.4
, Issue.2
, pp. 185-208
-
-
Zhu, J.1
Hong, J.2
Hughes, J.G.3
|