메뉴 건너뛰기




Volumn , Issue , 2004, Pages 424-431

Recursive data mining for masquerade detection and author identification

Author keywords

Author identification; Intrusion detection; Masquerade detection; One class SVM; Recursive data mining

Indexed keywords

ALGORITHMS; AUTOMATA THEORY; COMPUTER CRIME; COMPUTER NETWORKS; ELECTRONIC MAIL; MARKOV PROCESSES; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 15944400613     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (64)

References (17)
  • 5
    • 15944396559 scopus 로고    scopus 로고
    • A CONCEPTOR: The network of neurally connected concept nests for knowledge representation
    • RPI
    • Konrad R. Fiakowski & Boleslaw K Szymanski, "A CONCEPTOR: the Network of Neurally Connected Concept Nests for Knowledge Representation", Technical Report, RPI 1996.
    • (1996) Technical Report
    • Fiakowski, K.R.1    Szymanski, B.K.2
  • 6
    • 33749590685 scopus 로고    scopus 로고
    • The myth of the double-blind review? Author identification using only citations
    • Shawndra Hill and Foster Provost, "The Myth of the Double-Blind Review? Author Identification Using Only Citations", SIGKDD Explorations, Volume 5, Issue 2 P179-184.
    • SIGKDD Explorations , vol.5 , Issue.2
    • Hill, S.1    Provost, F.2
  • 7
    • 0034187691 scopus 로고    scopus 로고
    • Data strip mining for the virtual design of pharmaceuticals with neural networks
    • May
    • Robert H. Kewley, Mark J. Embrechts, et al. "Data Strip Mining for the Virtual Design of Pharmaceuticals with Neural Networks", IEEE Transactions on Neural Networks, Volume 11, Issue 3, May 2000.
    • (2000) IEEE Transactions on Neural Networks , vol.11 , Issue.3
    • Kewley, R.H.1    Embrechts, M.J.2
  • 8
    • 0030653064 scopus 로고    scopus 로고
    • Authorship analysis: Identifying the author of a program
    • Submitted to
    • Ivan Krsul, Eugene H. Spafford, "Authorship Analysis: Identifying the Author of a Program", Submitted to Computers and Security.
    • Computers and Security
    • Krsul, I.1    Spafford, E.H.2
  • 10
    • 0008496059 scopus 로고
    • The unsupervised acquisition of a lexicon from continuous speech
    • AI Lab., MIT. Cambridge, Massachusetts
    • Carl de Marcken, "The Unsupervised Acquisition of a Lexicon from Continuous Speech", Technical Report A.I. Memo No. 1558, AI Lab., MIT. Cambridge, Massachusetts. 1995.
    • (1995) Technical Report A.I. Memo No. 1558 , vol.1558
    • De Marcken, C.1
  • 12
    • 0012282403 scopus 로고    scopus 로고
    • Computer intrusion: Detecting masquerades
    • February
    • Matthias Schonlau, W. Dumouchel, Wen-Hua Ju et al. "Computer Intrusion: Detecting Masquerades", Statistical Science, 16(1):58-74, February 2001.
    • (2001) Statistical Science , vol.16 , Issue.1 , pp. 58-74
    • Schonlau, M.1    Dumouchel, W.2    Ju, W.-H.3
  • 13
    • 0014757386 scopus 로고
    • A general method applicable to the search for similarities in the amino acid sequence of two proteins
    • Needleman, S. and Wunsch, C. "A general method applicable to the search for similarities in the amino acid sequence of two proteins", Journal of Molecular Biology, 48: 444-453, 1970.
    • (1970) Journal of Molecular Biology , vol.48 , pp. 444-453
    • Needleman, S.1    Wunsch, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.