-
1
-
-
0002419948
-
Beyond independence: Conditions for the optimality of the simple Bayesian classifier
-
L. Saitta, editor, 03-06 July 1996, Bari, Italy. Morgan Kaufmann, San Francisco, California
-
P. Domingos and M. Pazzani. Beyond independence: conditions for the optimality of the simple Bayesian classifier. In L. Saitta, editor, 13th International Conference on Machine Learning (ICML-96), pages 105-112, 03-06 July 1996, Bari, Italy. Morgan Kaufmann, San Francisco, California, 1996.
-
(1996)
13th International Conference on Machine Learning (ICML-96)
, pp. 105-112
-
-
Domingos, P.1
Pazzani, M.2
-
2
-
-
1542280292
-
Massive identity theft alleged: Credit fraud affects 30,000, authorities say
-
San Jose, California, 26 November
-
M. Fan. Massive identity theft alleged: Credit fraud affects 30,000, authorities say. San Jose Mercury News, San Jose, California, 26 November 2002.
-
(2002)
San Jose Mercury News
-
-
Fan, M.1
-
3
-
-
0013420742
-
Using Unix: Collected traces of 168 users
-
Department of Computer Science, University of Calgary, Calgary, Canada
-
S. Greenberg. Using Unix: Collected traces of 168 users. Technical report 88/333/45, Department of Computer Science, University of Calgary, Calgary, Canada. 1988.
-
(1988)
Technical Report 88/333/45
-
-
Greenberg, S.1
-
4
-
-
0012291135
-
Spy case prompts computer search
-
05 March
-
V. Loeb. Spy case prompts computer search. Washington Post, 05 March 2001, page A01.
-
(2001)
Washington Post
-
-
Loeb, V.1
-
5
-
-
0027609384
-
A survey of intrusion-detection techniques
-
June
-
T. F. Lunt. A survey of intrusion-detection techniques. Computers & Security, 2(4):405-418, June 1993.
-
(1993)
Computers & Security
, vol.2
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
6
-
-
0023866666
-
A prototype real-time intrusion-detection expert system
-
18-21 April 1988, Oakland, California. IEEE Computer Society Press, Washington, DC
-
T. F. Lunt and R. Jagannathan. A prototype real-time intrusion-detection expert system. In IEEE Symposium on Security and Privacy, pages 59-66, 18-21 April 1988, Oakland, California. IEEE Computer Society Press, Washington, DC, 1988.
-
(1988)
IEEE Symposium on Security and Privacy
, pp. 59-66
-
-
Lunt, T.F.1
Jagannathan, R.2
-
8
-
-
0036931591
-
Masquerade detection using truncated command lines
-
23-26 June 2002, Washington, DC, IEEE Computer Society, Los Alamitos, California
-
R. A. Maxion and T. N. Townsend. Masquerade detection using truncated command lines. In International Conference on Dependable Systems & Networks, pages 219-228, 23-26 June 2002, Washington, DC, IEEE Computer Society, Los Alamitos, California, 2002..
-
(2002)
International Conference on Dependable Systems & Networks
, pp. 219-228
-
-
Maxion, R.A.1
Townsend, T.N.2
-
10
-
-
0001673996
-
A comparison of event models for naive bayes text classification
-
papers from the 1998 AAAI Workshop, 27 July 1998, Madison, Wisconsin. Published as AAAI Technical Report WS-98-05, AAAI Press, Menlo Park, California
-
A. McCallum and K. Nigam. A comparison of event models for naive bayes text classification. In Learning for Text Categorization, papers from the 1998 AAAI Workshop, 27 July 1998, Madison, Wisconsin, pages 41-48. Published as AAAI Technical Report WS-98-05, AAAI Press, Menlo Park, California, 1998.
-
(1998)
Learning for Text Categorization
, pp. 41-48
-
-
McCallum, A.1
Nigam, K.2
-
11
-
-
0004255908
-
-
McGraw-Hill, Boston, Massachusetts
-
T. M. Mitchell. Machine Learning. McGraw-Hill, Boston, Massachusetts, 1997.
-
(1997)
Machine Learning
-
-
Mitchell, T.M.1
-
12
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
February
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, M. Theus, and Y. Vardi. Computer intrusion: Detecting masquerades. Statistical Science, 16(1):58-74, February 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Vardi, M.5
Theus, Y.6
-
13
-
-
0010886652
-
The insider threat to information systems: The psychology of the dangerous insider
-
Department of Defense Security Institute, Richmond, Virginia. September
-
E. D. Shaw, K. G. Ruby and J. M. Post. The insider threat to information systems: The psychology of the dangerous insider. Security Awareness Bulletin, 2-98, Department of Defense Security Institute, Richmond, Virginia. September 1998.
-
(1998)
Security Awareness Bulletin
, vol.2
-
-
Shaw, E.D.1
Ruby, K.G.2
Post, J.M.3
|