-
2
-
-
0001907967
-
Support vector machines: Hype or hallelujah?
-
K. Bennett and C. Campbell. Support vector machines: Hype or hallelujah? SIGKDD Explorations, 2:1-13, 2000.
-
(2000)
SIGKDD Explorations
, vol.2
, pp. 1-13
-
-
Bennett, K.1
Campbell, C.2
-
4
-
-
84944736505
-
Intrusion detection: A bioinformatics approach
-
Las Vegas, NE
-
S. Coull, J. Branch, B. Szymanski, and E. Breimer. "Intrusion detection: A bioinformatics approach". In Proceedings of the Nineteenth Annual Computer Security Applications Conference, pages 24-34, Las Vegas, NE, 2003.
-
(2003)
Proceedings of the Nineteenth Annual Computer Security Applications Conference
, pp. 24-34
-
-
Coull, S.1
Branch, J.2
Szymanski, B.3
Breimer, E.4
-
7
-
-
0003893616
-
Requirements and model for IDES - A real-time intrusion detection system
-
Computer Science Laboratory, SRI International, Menlo Park, CA
-
D. E. Denning and P. G. Neumann. "Requirements and model for IDES - A real-time intrusion detection system". Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, 1985.
-
(1985)
Technical Report
-
-
Denning, D.E.1
Neumann, P.G.2
-
9
-
-
0038825045
-
Anomaly detection using call stack information
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong. "Anomaly detection using call stack information". In Proceedings of IEEE Symposium on Security and Privacy, pages 62-78, 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 62-78
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
10
-
-
0031258214
-
Computer immunology
-
S. Forrest, S. A. Hofmeyr, and A. Somayaji. "Computer immunology". Communications of the ACM, 40(10):88-96, 1997.
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
11
-
-
58149321460
-
Boosting a weak learning algorithm by majority
-
Y. Freund. Boosting a Weak Learning Algorithm by Majority. Information and Computation, 121(2):256-285, 1995.
-
(1995)
Information and Computation
, vol.121
, Issue.2
, pp. 256-285
-
-
Freund, Y.1
-
15
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. "Intrusion detection using sequences of system calls". Journal of Computer Security, 6(3):151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
16
-
-
0036505670
-
A comparison of methods for multi-class support vector machines
-
C. Hsu and C. Lin. "A comparison of methods for multi-class support vector machines". IEEE Transactions on Neural Networks, 13:415-425, 2002.
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, pp. 415-425
-
-
Hsu, C.1
Lin, C.2
-
18
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras. "State transition analysis: A rule-based intrusion detection approach". Software Engineering, 21(3):181-199, 1995.
-
(1995)
Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
23
-
-
0036095845
-
Enhancing profiles for anomaly detection using time granularities
-
Y. Li, N. Wu, S. Jajodia, and X. S. Wang. "Enhancing profiles for anomaly detection using time granularities". Journal of Computer Security, 10(2):137-157, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.2
, pp. 137-157
-
-
Li, Y.1
Wu, N.2
Jajodia, S.3
Wang, X.S.4
-
24
-
-
0003451777
-
A real-time intrusion detection expert system IDES - Final report
-
SRI Computer Science Laboratory, SRI International, February
-
T. F. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, P. G. Neumann, H. S. Javitz, A. Valdes, and T. D. Garvey. "A real-time intrusion detection expert system IDES - Final report". Technical Report SRI-CSL-92-05, SRI Computer Science Laboratory, SRI International, February 1992.
-
(1992)
Technical Report
, vol.SRI-CSL-92-05
-
-
Lunt, T.F.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Neumann, P.G.5
Javitz, H.S.6
Valdes, A.7
Garvey, T.D.8
-
25
-
-
0034593307
-
Characterizing the behavior of a program using multiple-length N-grams
-
ACM Press
-
C. Marceau. "Characterizing the behavior of a program using multiple-length N-grams". In Proceedings of the 2000 Workshop on New Security Paradigms, pages 101-110. ACM Press, 2000.
-
(2000)
Proceedings of the 2000 Workshop on New Security Paradigms
, pp. 101-110
-
-
Marceau, C.1
-
27
-
-
84944239503
-
Using finite automata to mine execution data for intrusion detection: A preliminary report
-
C. Michael and A. Ghosh. "Using finite automata to mine execution data for intrusion detection: A preliminary report". Lecture Notes in Computer Science, 1907:66-80, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1907
, pp. 66-80
-
-
Michael, C.1
Ghosh, A.2
-
33
-
-
84880692052
-
A brief introduction to boosting
-
R. E. Schapire. A brief introduction to boosting. In IJCAI, pages 1401-1406, 1999.
-
(1999)
IJCAI
, pp. 1401-1406
-
-
Schapire, R.E.1
-
34
-
-
0012282403
-
-
February
-
M. Schonlau, W. DuMouchel, W. Ju, A. F. Karr, M. Theus, and Y. Vardi. "Computer intrusion: Detecting masquerades". 16(1):58-74. February 2001.
-
(2001)
Computer Intrusion: Detecting Masquerades
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
44
-
-
0003201842
-
A Markov chain model of temporal behavior for anomaly detection
-
N. Ye. "A Markov chain model of temporal behavior for anomaly detection". In Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, 2000, pages 171-174, 2000.
-
(2000)
Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, 2000
, pp. 171-174
-
-
Ye, N.1
|