-
2
-
-
0003726645
-
-
M.S. Dissertaion, Purdue University, Purdue, IN, December
-
K. E. Price, "Host-based misuse detection and conventional operating system's audit data collection," M.S. Dissertaion, Purdue University, Purdue, IN, December 1997.
-
(1997)
Host-based Misuse Detection and Conventional Operating System's Audit Data Collection
-
-
Price, K.E.1
-
3
-
-
0003027845
-
An application of machine learning to anomaly detection
-
Washington, DC, October
-
T. Lane and C. E. Brodley, "An application of machine learning to anomaly detection," In Proceedings of the National Information Systems Security Conference, pp. 366-380, Washington, DC, October 1997.
-
(1997)
Proceedings of the National Information Systems Security Conference
, pp. 366-380
-
-
Lane, T.1
Brodley, C.E.2
-
5
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
Santa Clara, USA, April
-
A. K. Ghosh, A. Schwartzbard and M. Schatz, "Learning program behavior profiles for intrusion detection," In Proceedings of Workshop on Intrusion Detection and Network Monitoring, pp. 51-62, Santa Clara, USA, April 1999.
-
(1999)
Proceedings of Workshop on Intrusion Detection and Network Monitoring
, pp. 51-62
-
-
Ghosh, A.K.1
Schwartzbard, A.2
Schatz, M.3
-
7
-
-
0013459754
-
Host-based intrusion detection using dynamic and static behavioral models
-
December
-
D. Y. Yeung and Y. Ding. "Host-based intrusion detection using dynamic and static behavioral models," The Journal of the Pattern Recognition society, December 2001.
-
(2001)
The Journal of the Pattern Recognition Society
-
-
Yeung, D.Y.1
Ding, Y.2
-
8
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, no. 2, pp. 257-286, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
9
-
-
0022594196
-
An introduction to hidden Markov models
-
January
-
L. R. Rabiner and B.H. Juang, "An introduction to hidden Markov models," IEEE ASSP Magazine, pp. 4-16, January 1986.
-
(1986)
IEEE ASSP Magazine
, pp. 4-16
-
-
Rabiner, L.R.1
Juang, B.H.2
-
10
-
-
0006062387
-
Generation of application level audit data via library interposition
-
COAST Laboratory, Purdue University, West Lafaytte, IN, October
-
B. A. Kuperman and Eugene H. Spafford. "Generation of application level audit data via library interposition", CERIAS TR 99-11, COAST Laboratory, Purdue University, West Lafaytte, IN, October 1998.
-
(1998)
CERIAS TR 99-11
-
-
Kuperman, B.A.1
Spafford, E.H.2
-
12
-
-
24044475779
-
Intrusion Detection Using Ensemble of Soft Computing Paradigms
-
Springer Verlag, Germany
-
S. Mukkamala, A. H. Sung and A. Abraham, "Intrusion Detection Using Ensemble of Soft Computing Paradigms," Third International Conference on Intelligent Systems Design and Applications, Intelligent Systems Design and Applications, Advances in Soft Computing, Springer Verlag, Germany, pp. 239-248, 2003.
-
(2003)
Third International Conference on Intelligent Systems Design and Applications, Intelligent Systems Design and Applications, Advances in Soft Computing
, pp. 239-248
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
13
-
-
77952371959
-
Ensemble Learning for Intrusion Detection in Computer Networks
-
September
-
L. Didaci, G. Giacinto and F. Roli, "Ensemble Learning for Intrusion Detection in Computer Networks," In Proceedings of the Workshop on Machine Learning, Methods and Applications, held in the context of the 8th Meeting of the Italian Association of Artificial Intelligence (AI*IA), pp. 10-13, September, 2002.
-
(2002)
Proceedings of the Workshop on Machine Learning, Methods and Applications, Held in the Context of the 8th Meeting of the Italian Association of Artificial Intelligence (AI*IA)
, pp. 10-13
-
-
Didaci, L.1
Giacinto, G.2
Roli, F.3
-
14
-
-
72149106875
-
Anomaly detection of computer usage using artificial intelligence techniques
-
Springer
-
J. H. Choy and S. B. Cho, "Anomaly detection of computer usage using artificial intelligence techniques, " Lecture Notes in Computer Scinece 2112 , pp. 31-43, Springer 2001.
-
(2001)
Lecture Notes in Computer Scinece 2112
, pp. 31-43
-
-
Choy, J.H.1
Cho, S.B.2
|