-
1
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
April
-
T. Bass, "Intrusion detection systems and multisensor data fusion," Communications of the ACM, 43(4), pp. 99-105, April 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
2
-
-
0003704318
-
-
Irvine, CA: University of California, Department of Information and Computer Science
-
S. Hettich, S.D. Bay, The UCI KDD Archive. Irvine, CA: University of California, Department of Information and Computer Science, http://kdd.ics.uci.edu, 1999.
-
(1999)
The UCI KDD Archive
-
-
Hettich, S.1
Bay, S.D.2
-
3
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory," ACM Transactions on Information and System Security, 3(4), pp. 262-294, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
4
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Chapter 4, D. Barbara and S. Jajodia (editors), Kluwer, ISBN 1-4020-7054-3
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," in Applications of Data Mining in Computer Security, Chapter 4, D. Barbara and S. Jajodia (editors), Kluwer, ISBN 1-4020-7054-3, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
5
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
W. Lee, S. Stolfo, K. Mok, "A data mining framework for building intrusion detection models," Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
6
-
-
0036079805
-
Host-Based intrusion detection using Self-Organizing Maps
-
May 12-17
-
Lichodzijewski P., Zincir-Heywood A.N., Heywood M.I., "Host-Based intrusion detection using Self-Organizing Maps," IEEE International Joint Conference on Neural Networks, pp. 1714-1719, May 12-17, 2002.
-
(2002)
IEEE International Joint Conference on Neural Networks
, pp. 1714-1719
-
-
Lichodzijewski, P.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
7
-
-
0141574623
-
-
Information Systems Technology Group. 25 March
-
The 1998 intrusion detection off-line evaluation plan. MIT Lincoln Lab., Information Systems Technology Group. http://www.11.mit.edu/IST/ideval/docs/1998/id98-eval-11.txt, 25 March 1998.
-
(1998)
The 1998 Intrusion Detection Off-line Evaluation Plan
-
-
-
9
-
-
4544256305
-
-
Bro user manual, http://www.icir.org/vern/bro-manual/index.html
-
Bro User Manual
-
-
-
10
-
-
0003410791
-
-
Springer-Verlag, ISBN 3-540-67921-9
-
rd Ed., Springer-Verlag, ISBN 3-540-67921-9, 2000.
-
(2000)
rd Ed.
-
-
Kohonen, T.1
-
11
-
-
84974743850
-
Fuzzy model identification based on cluster estimation
-
S.L. Chiu, "Fuzzy model identification based on cluster estimation," Journal of Intelligent and Fuzzy Systems, 2, pp. 267-278, 1994.
-
(1994)
Journal of Intelligent and Fuzzy Systems
, vol.2
, pp. 267-278
-
-
Chiu, S.L.1
-
12
-
-
0141574622
-
-
Laboratory of Computer and Information Science Neural Networks Research Centre
-
Software Packages from Helsinki University of Technology, Laboratory of Computer and Information Science Neural Networks Research Centre, http://www.cis.hut.fi/research/software.shtml
-
Software Packages from Helsinki University of Technology
-
-
|