-
1
-
-
0036367429
-
Querying and mining data streams: You only get one look
-
Wisconsin, June
-
M. Garofalakis, J. Gehrke, and R. Rastogi, "Querying and Mining Data Streams: You Only Get One Look", Proc. of ACM SIGMOD Tutorial, Wisconsin, pp.635, June 2002.
-
(2002)
Proc. of ACM SIGMOD Tutorial
, pp. 635
-
-
Garofalakis, M.1
Gehrke, J.2
Rastogi, R.3
-
2
-
-
2442617843
-
Issues in data stream management
-
June
-
L. Golab, and M.T. Ozsu, "Issues in Data Stream Management," SIGMOD Record, Vol.32, No.2, pp.5-14, June 2003.
-
(2003)
SIGMOD Record
, vol.32
, Issue.2
, pp. 5-14
-
-
Golab, L.1
Ozsu, M.T.2
-
3
-
-
2942640996
-
Data mining for network intrusion detection
-
P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, and P. Tan, "Data Mining for Network Intrusion Detection", Proc. of the National Science Foundation Workshop on Data Mining, pp.21-30, 2002.
-
(2002)
Proc. of the National Science Foundation Workshop on Data Mining
, pp. 21-30
-
-
Dokas, P.1
Ertoz, L.2
Kumar, V.3
Lazarevic, A.4
Srivastava, J.5
Tan, P.6
-
4
-
-
16244392017
-
Mining frequent patterns in data streams at multiple time granularities
-
H. Kargupta, A. Joshi, K. Sivakumar, and Y. Yesha (eds.), AAAI/MIT Press
-
C. Giannella, J.Han, J. Pei, X. Yan, and P. Yu, "Mining Frequent Patterns in Data Streams at Multiple Time Granularities", H. Kargupta, A. Joshi, K. Sivakumar, and Y. Yesha (eds.), Data Mining: Next Generation Challenges and Future Directions, AAAI/MIT Press, 2003.
-
(2003)
Data Mining: next Generation Challenges and Future Directions
-
-
Giannella, C.1
Han, J.2
Pei, J.3
Yan, X.4
Yu, P.5
-
5
-
-
0013114810
-
Mining in a data-flow environment: Experience in network intrusion detection
-
Aug.
-
L. Wenke, J. Salvatore, and Mok, K., "Mining in a Data-flow Environment: Experience in Network Intrusion Detection", Proc. of ACM-KDD, pp. 114-124, Aug.1999.
-
(1999)
Proc. of ACM-KDD
, pp. 114-124
-
-
Wenke, L.1
Salvatore, J.2
Mok, K.3
-
6
-
-
0039253846
-
Mining frequent patterns without candidate generation
-
J. Han, J. Pei, and Y. Yin. "Mining Frequent Patterns without Candidate Generation", Proc. ACM SIGMOD, pp.1-12, 2000.
-
(2000)
Proc. ACM SIGMOD
, pp. 1-12
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
7
-
-
16244406748
-
-
T. H. Ptacek and T. N. Newsham, "Secure Networks, Inc. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection", Available online at: http://www.insecure.org/stf/secnet_ids/secnet_ids.html
-
Secure Networks, Inc. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
8
-
-
16244406137
-
Network intrusion detection signatures
-
September
-
K. Kent Frederick, "Network Intrusion Detection Signatures", Security in Focus, September 2001, Available online at: http://www. securityfocus.com/infocus/1623
-
(2001)
Security in Focus
-
-
Frederick, K.K.1
-
9
-
-
0003466371
-
Internet protocol
-
Information Sciences Institute, September
-
RFC 791, Internet Protocol, Information Sciences Institute, September 1981, Available online at: http://www.rfc-editor.org/
-
(1981)
RFC
, vol.791
-
-
-
10
-
-
2542419686
-
Transmission control protocol
-
Information Sciences Institute, September
-
RFC 793, Transmission Control Protocol, Information Sciences Institute, September 1981, Available online at: http://www.rfc-editor.org/
-
(1981)
RFC
, vol.793
-
-
-
12
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
W. Lee, S. J. Stolfo, and K. W. Mok, "A Data Mining Framework for Building Intrusion Detection Models", In Proceedings of the IEEE Symposium on Security and Privacy, 1999, Pg. 120-132.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
13
-
-
35448931869
-
Discovering generalized episodes using minimal occurrences
-
Aug.
-
H. Mannila, and H. Toivonen, "Discovering Generalized Episodes using Minimal Occurrences", Proc. ACM-KDD, pp.146-151, Aug. 1996.
-
(1996)
Proc. ACM-KDD
, pp. 146-151
-
-
Mannila, H.1
Toivonen, H.2
-
14
-
-
16244362276
-
-
Symantec Corporation, "Security Response: Attack Signatures", Available Online at: http://securityresponse.symantec.com/avcenter/nis_ids/
-
Security Response: Attack Signatures
-
-
-
16
-
-
0027621699
-
Mining association rules between sets of items in large datasets
-
R. Agrawal, T. Imilienski, and A. Swami, "Mining Association Rules Between Sets of Items in Large Datasets", Proc. of ACM SIGMOD, pp.207-216, 1993.
-
(1993)
Proc. of ACM SIGMOD
, pp. 207-216
-
-
Agrawal, R.1
Imilienski, T.2
Swami, A.3
-
17
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
H.Debar, L.Me and F. Wu (Eds.), LNCS 1907, Springer-Verlag
-
A. Valdes and K. Skinner, "Adaptive, Model-Based Monitoring for Cyber Attack Detection", Proc. of RAID, H.Debar, L.Me and F. Wu (Eds.), LNCS 1907, Springer-Verlag, pp. 80-92, 2000.
-
(2000)
Proc. of RAID
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
20
-
-
16244418951
-
-
Computer Science Department, Columbia University, New York, June
-
W. Lee, S. Stolfo, and K.W. Mok, "A Data Mining Framewrk for Adaptive Intrusion Detection", Computer Science Department, Columbia University, New York, June 1998
-
(1998)
A Data Mining Framewrk for Adaptive Intrusion Detection
-
-
Lee, W.1
Stolfo, S.2
Mok, K.W.3
-
21
-
-
0038633423
-
Clustering data streams: Theory and practice
-
Sudipto Guha, et al, "Clustering Data Streams: Theory and Practice", IEEE TKDE, Vol.15, No. 3, pp. 515-528, 2003.
-
(2003)
IEEE TKDE
, vol.15
, Issue.3
, pp. 515-528
-
-
Guha, S.1
-
22
-
-
16244381051
-
Mining dynamics of data streams in multidimensional space
-
Japan, Dec.
-
J. Han, "Mining Dynamics of Data Streams in Multidimensional Space", Proc. of IEEE ICDM Keynote Speech, Japan, Dec. 2002.
-
(2002)
Proc. of IEEE ICDM Keynote Speech
-
-
Han, J.1
-
23
-
-
4544306385
-
Online mining of changes from data streams: Research problems and preliminary results
-
San Diego, CA
-
G. Dong, J. Han, L. Lakshmanan, J. Pei, H. Wang and Philip Yu, "Online Mining of changes from Data Streams: Research Problems and Preliminary Results", Proc. of ACM SIGMOD MPDS, San Diego, CA, 2003.
-
(2003)
Proc. of ACM SIGMOD MPDS
-
-
Dong, G.1
Han, J.2
Lakshmanan, L.3
Pei, J.4
Wang, H.5
Yu, P.6
|