-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
J. P. Anderson Co., Ft. Washington, Pennsylvania, Apr
-
J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, J. P. Anderson Co., Ft. Washington, Pennsylvania, Apr 1980.
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
2
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
T. Bass. Intrusion detection systems and multisensor data fusion. Comm. of the ACM, 43(4):99-105, 2000.
-
(2000)
Comm. of the ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
5
-
-
84989525001
-
Indexing by latent semantic analysis
-
S. C. Deerwester, S. T. Dumais, T. K. Landauer, G. W. Furnas, and R. A. Harshman. Indexing by latent semantic analysis. Journal of the American Society of Information Science, 41(6):391-407, 1990.
-
(1990)
Journal of the American Society of Information Science
, vol.41
, Issue.6
, pp. 391-407
-
-
Deerwester, S.C.1
Dumais, S.T.2
Landauer, T.K.3
Furnas, G.W.4
Harshman, R.A.5
-
6
-
-
0003200953
-
Artificial intelligence and intrusion detection: Current and future directions
-
Baltimore, MD
-
J. Frank. Artificial intelligence and intrusion detection: Current and future directions. In Proc. of the 17th Nat'l Computer Security Conf., Baltimore, MD, 1994.
-
(1994)
Proc. of the 17th Nat'l Computer Security Conf.
-
-
Frank, J.1
-
12
-
-
84893405732
-
Data clustering: A review
-
A. K. Jain, M. N. Murty, and P. J. Flynn. Data clustering: A review. ACM Computing Surv., 31(3):264-323, 1999.
-
(1999)
ACM Computing Surv.
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
15
-
-
0003410791
-
-
Springer-Verlag, Berling, 3 edition
-
T. Kohonen. Self-Organizing Maps. Springer-Verlag, Berling, 3 edition, 2001.
-
(2001)
Self-organizing Maps
-
-
Kohonen, T.1
-
16
-
-
2442537609
-
NSOM: A real-time network-based intrusion detection system using self-organizing maps
-
Dept. of Applied Science, University of California, Davis
-
K. Labib and R. Vemuri. NSOM: A real-time network-based intrusion detection system using self-organizing maps. Technical report, Dept. of Applied Science, University of California, Davis, 2002.
-
(2002)
Technical Report
-
-
Labib, K.1
Vemuri, R.2
-
17
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
T. Lane and C. Brodley. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. on Information and System Security, 2(3):295-331, 1999.
-
(1999)
ACM Trans. on Information and System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.2
-
18
-
-
0010563817
-
-
PhD thesis, Dept. Computer Science, University of Aarhus, DK-8000 Aarhus C, Denmark, Oct
-
R. Larsen. Lanczos bidiagonalization with partial reorthogonalization, PhD thesis, Dept. Computer Science, University of Aarhus, DK-8000 Aarhus C, Denmark, Oct 1998.
-
(1998)
Lanczos Bidiagonalization with Partial Reorthogonalization
-
-
Larsen, R.1
-
20
-
-
0013114810
-
Mining in a data-flow environment: Experience in network intrusion detection
-
S. Chaudhuri and D. Madigan, editors
-
W. Lee, S. Stolfo, and K. Mok. Mining in a data-flow environment: Experience in network intrusion detection. In S. Chaudhuri and D. Madigan, editors, Proc. of the 5th Int'l Conf. on Knowledge Discovery and Data Mining, pages 114-124, 1999.
-
(1999)
Proc. of the 5th Int'l Conf. on Knowledge Discovery and Data Mining
, pp. 114-124
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
21
-
-
0006100649
-
Smashing the stack for fun and profit
-
E. A. Levy. Smashing the stack for fun and profit. Phrack magazine, 7(49), Nov 1996.
-
(1996)
Phrack Magazine
, vol.7
, Issue.49
-
-
Levy, E.A.1
-
24
-
-
0344008570
-
Detecting novel attacks by identifying anomalous network packet headers
-
Florida Institute of Technology
-
M. Mahoney and P. Chan. Detecting novel attacks by identifying anomalous network packet headers. Technical Report CS-2001-2, Florida Institute of Technology, 2001.
-
(2001)
Technical Report
, vol.CS-2001-2
-
-
Mahoney, M.1
Chan, P.2
-
25
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. on Information and System Security, 3(4):262-294, 2000.
-
(2000)
ACM Trans. on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
27
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Calgary, Canada
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection, Technical Report T2R-0Y6, Secure Networks, Calgary, Canada, 1998.
-
(1998)
Technical Report
, vol.T2R-0Y6
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
29
-
-
2442552627
-
Cluster selection in divisive clustering algorithms
-
S. Savaresi, D. L. Boley, S. Bittanti, and G. Gazzaniga. Cluster selection in divisive clustering algorithms. In Proc. of the 2nd SIAM Int'l Conf. on Data Mining, pages 299-314, 2002.
-
(2002)
Proc. of the 2nd SIAM Int'l Conf. on Data Mining
, pp. 299-314
-
-
Savaresi, S.1
Boley, D.L.2
Bittanti, S.3
Gazzaniga, G.4
-
32
-
-
0034592923
-
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms
-
Aug
-
K. Yamanishi, J. ichi Takeuchi, G. J. Williams, and P. Milne. On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. In Proc. of the 6th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining, pages 320-324, Aug 2000.
-
(2000)
Proc. of the 6th ACM SIGKDD Int'l Conf. on Knowledge Discovery and Data Mining
, pp. 320-324
-
-
Yamanishi, K.1
Ichi Takeuchi, J.2
Williams, G.J.3
Milne, P.4
|