-
1
-
-
0006057021
-
-
New York: Schaum's Outline Series, McGraw-Hill
-
Balakrishnan, V. (1997). Graph theory. New York: Schaum's Outline Series, McGraw-Hill.
-
(1997)
Graph Theory
-
-
Balakrishnan, V.1
-
2
-
-
0038336923
-
-
Proceedings of the 2003 ACM Symposium on Applied Computing New York, NY: ACM Press
-
Barbará, D., Li, Y., Couto, J., Lin, J.-L., & Jajodia, S. (2003). Bootstrapping a data mining intrusion detection system. In Proceedings of the 2003 ACM Symposium on Applied Computing. New York, NY: ACM Press.
-
(2003)
Bootstrapping a Data Mining Intrusion Detection System
-
-
Barbará, D.1
Li, Y.2
Couto, J.3
Lin, J.-L.4
Jajodia, S.5
-
3
-
-
84936824655
-
Power and centrality: A family of measures
-
Bonacich, P. (1987). Power and centrality: A family of measures. American Journal of Sociology, 92, 1170-1182.
-
(1987)
American Journal of Sociology
, vol.92
, pp. 1170-1182
-
-
Bonacich, P.1
-
5
-
-
0029311990
-
-
Cambridge MA: Computing Systems, MIT Press
-
Burgess, M. (1995). A site configuration engine. Cambridge MA: Computing Systems, MIT Press, Vol. 8, p. 309.
-
(1995)
A Site Configuration Engine
, vol.8
, pp. 309
-
-
Burgess, M.1
-
9
-
-
30344486259
-
Probabilistic anomaly detection in distributed computer networks
-
(resubmitted)
-
Burgess, M. (resubmitted). Probabilistic anomaly detection in distributed computer networks. Science of Computer Programming.
-
Science of Computer Programming
-
-
Burgess, M.1
-
11
-
-
0242572726
-
Measuring host normality
-
Burgess, M., Haugerud, H., Reitan, T., & Straumsnes, S. (2001). Measuring host normality. ACM Transactions on Computing Systems. 20, 125-160.
-
(2001)
ACM Transactions on Computing Systems
, vol.20
, pp. 125-160
-
-
Burgess, M.1
Haugerud, H.2
Reitan, T.3
Straumsnes, S.4
-
15
-
-
84959060669
-
The architecture of NG-MON: A passive network monitoring system for high-speed IP networks
-
Han, S.-H., Kim, M.-S., Ju, H.-T., & Hong, J.-K. (2002). The architecture of NG-MON: A Passive Network Monitoring System for High-Speed IP Networks. In IFIP/IEEE 13th International Workshop on Distributed Systems: Operations and Management (DSOM 2002) (p. 16).
-
(2002)
IFIP/IEEE 13th International Workshop on Distributed Systems: Operations and Management (DSOM 2002)
, pp. 16
-
-
Han, S.-H.1
Kim, M.-S.2
Ju, H.-T.3
Hong, J.-K.4
-
16
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
Kleinberg, J. (1999). Authoritative sources in a hyperlinked environment. Journal of the ACM, 46, 604.
-
(1999)
Journal of the ACM
, vol.46
, pp. 604
-
-
Kleinberg, J.1
-
17
-
-
0003780986
-
The pagerank citation ranking: Bringing order to the Web
-
Stanford Digital Library Technologies Project
-
Page, L., Brin, S., Motwani, R., & Winograd, T. (1998). The PageRank citation Ranking: Bringing order to the Web. Technical report, Stanford Digital Library Technologies Project.
-
(1998)
Technical Report
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
18
-
-
80051517712
-
Implementing a generalized tool for network monitoring
-
Berkeley, CA: USENIX Association
-
Ranum, M. J., Landfield, K., Stolarchuk, M., Sienkiewicz, M., Lambeth, A., & Wall, E. (1997). Implementing a generalized tool for network monitoring. In Proceedings of the Eleventh Systems Administration Conference (LISA XI) (p. 1). Berkeley, CA: USENIX Association.
-
(1997)
Proceedings of the Eleventh Systems Administration Conference (LISA XI)
, pp. 1
-
-
Ranum, M.J.1
Landfield, K.2
Stolarchuk, M.3
Sienkiewicz, M.4
Lambeth, A.5
Wall, E.6
-
21
-
-
84957039800
-
Principles of a computer immune system
-
Somayaji, A., Hofmeyr, S., & Forrest, S. (1997). Principles of a computer immune system. New Security Paradigms Workshop, ACM (pp. 75-82).
-
(1997)
New Security Paradigms Workshop, ACM
, pp. 75-82
-
-
Somayaji, A.1
Hofmeyr, S.2
Forrest, S.3
-
23
-
-
15544374913
-
A survey of fault localization techniques in computer networks
-
(to appear)
-
Steinder, M. & Sethi, A. (2003). A survey of fault localization techniques in computer networks. Science of Computer Programming (to appear).
-
(2003)
Science of Computer Programming
-
-
Steinder, M.1
Sethi, A.2
-
24
-
-
15544377282
-
Data mining-based intrusion detectors: An overview of the columbia IDS project
-
Stolfo, S. J., Lee, W., Chan, P. K., Fan, W., & Eskin, E. (2001). Data mining-based intrusion detectors: An overview of the columbia IDS project. ACM SIGMOD, 30:4.
-
(2001)
ACM SIGMOD
, vol.30
, pp. 4
-
-
Stolfo, S.J.1
Lee, W.2
Chan, P.K.3
Fan, W.4
Eskin, E.5
|