-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
James P. Anderson Co
-
Anderson, J.P.: Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co (1980).
-
(1980)
Technical Report
-
-
Anderson, J.P.1
-
3
-
-
0242614019
-
Data Mining for Improving Intrusion Detection
-
MITRE
-
Bloedorn, E., Hill, B., Christiansen, A., Skorupka, C., Talbot, L., Tivel, J.: Data Mining for Improving Intrusion Detection. Technical report, MITRE (2000).
-
(2000)
Technical Report
-
-
Bloedorn, E.1
Hill, B.2
Christiansen, A.3
Skorupka, C.4
Talbot, L.5
Tivel, J.6
-
4
-
-
85149612939
-
Fast effective rule induction
-
In Prieditis, A., Russell, S., eds.: Tahoe City, CA, Morgan Kaufmann
-
Cohen, W.W.: Fast effective rule induction. In Prieditis, A., Russell, S., eds.: Proceedings of the 12th International Conference on Machine Learning, Tahoe City, CA, Morgan Kaufmann (1995) 115-123.
-
(1995)
Proceedings of the 12th International Conference on Machine Learning
, pp. 115-123
-
-
Cohen, W.W.1
-
7
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
Recent Advances in Intrusion Detection (RAID2001). Springer-Verlag
-
Debar, H., Wespi, A.: Aggregation and correlation of intrusion-detection alerts. In: Recent Advances in Intrusion Detection (RAID2001). Volume 2212 of Lecture Notes in Computer Science., Springer-Verlag (2001) 85-103.
-
(2001)
Lecture Notes in Computer Science.
, vol.2212
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
11
-
-
0345438685
-
ROC graphs: Note and practical considerations for researchers (HPL-2003-4)
-
HP Laboratories
-
Fawcett, T.: ROC graphs: Note and practical considerations for researchers (HPL-2003-4). Technical report, HP Laboratories (2003).
-
(2003)
Technical Report
-
-
Fawcett, T.1
-
12
-
-
0034499376
-
A Note on the Utility of Incremental Learning
-
Giraud-Carrier, C.: A Note on the Utility of Incremental Learning. AI Communications 13 (2000) 215-223.
-
(2000)
AI Communications
, vol.13
, pp. 215-223
-
-
Giraud-Carrier, C.1
-
18
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
Lee, W., Fan, W., Miller, M., Stolfo, S.J., Zadok, E.: Toward cost-sensitive modeling for intrusion detection and response. Journal of Computer Security 10 (2002) 5-22.
-
(2002)
Journal of Computer Security
, vol.10
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
19
-
-
0034301517
-
The 1999 DARPA Off-Line Intrusion Detection Evaluation
-
Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The 1999 DARPA Off-Line Intrusion Detection Evaluation. Computer Networks: The International Journal of Computer and Telecommunications Networking 34 (2000) 579-595.
-
(2000)
Computer Networks: the International Journal of Computer and Telecommunications Networking
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
20
-
-
84958970105
-
The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
-
Recent Advances in Intrusion Detection (RAID2002). Springer-Verlag
-
Lippmann, R., Webster, S., Stetson, D.: The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In: Recent Advances in Intrusion Detection (RAID2002). Volume 2516 of Lecture Notes in Computer Science., Springer-Verlag (2002) 307-326.
-
(2002)
Lecture Notes in Computer Science.
, vol.2516
, pp. 307-326
-
-
Lippmann, R.1
Webster, S.2
Stetson, D.3
-
21
-
-
35248857893
-
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
-
Recent Advances in Intrusion Detection (RAID2003). Springer-Verlag
-
Mahoney, M.V., Chan, P.K.: An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection. In: Recent Advances in Intrusion Detection (RAID2003). Volume 2820 of Lecture Notes in Computer Science., Springer-Verlag (2003) 220-237.
-
(2003)
Lecture Notes in Computer Science.
, vol.2820
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
22
-
-
84884637057
-
Incremental learning with partial instance memory
-
Proceedings of Foundations of Intelligent Systems: 13th International Symposium, ISMIS 2002. Springer-Verlag
-
Maloof, M.A., Michalski, R.S.: Incremental learning with partial instance memory. In: Proceedings of Foundations of Intelligent Systems: 13th International Symposium, ISMIS 2002. Volume 2366 of Lecture Notes in Artificial Intelligence., Springer-Verlag (2002) 16-27.
-
(2002)
Lecture Notes in Artificial Intelligence.
, vol.2366
, pp. 16-27
-
-
Maloof, M.A.1
Michalski, R.S.2
-
23
-
-
0034301662
-
A Data Mining Analysis of RTID Alarms
-
Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.: A Data Mining Analysis of RTID Alarms. Computer Networks: The International Journal of Computer and Telecommunications Networking 34 (2000) 571-577.
-
(2000)
Computer Networks: the International Journal of Computer and Telecommunications Networking
, vol.34
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
25
-
-
84944239811
-
The 1998 Lincoln Laboratory IDS Evaluation. A critique
-
Recent Advances in Intrusion Detection (RAID2000). Springer-Verlag
-
McHugh, J.: The 1998 Lincoln Laboratory IDS Evaluation. A critique. In: Recent Advances in Intrusion Detection (RAID2000). Volume 1907 of Lecture Notes in Computer Science., Springer-Verlag (2000) 145-161.
-
(2000)
Lecture Notes in Computer Science.
, vol.1907
, pp. 145-161
-
-
McHugh, J.1
-
28
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
Recent Advances in Intrusion Detection (RAID2002). Springer-Verlag
-
Morin, B., Mé, L., Debar, H., Ducasse, M.: M2D2: A formal data model for IDS alert correlation. In: Recent Advances in Intrusion Detection (RAID2002). Volume 2516 of Lecture Notes in Computer Science., Springer-Verlag (2002) 115-137.
-
(2002)
Lecture Notes in Computer Science.
, vol.2516
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducasse, M.4
-
29
-
-
0035283313
-
Robust classification for impresice environments
-
Provost, F., Fawcett, T.: Robust classification for impresice environments. Machine Learning Journal 42 (2001) 203-231.
-
(2001)
Machine Learning Journal
, vol.42
, pp. 203-231
-
-
Provost, F.1
Fawcett, T.2
-
33
-
-
84947759699
-
Inducing cost-sensitive trees via instance weighting
-
Proceedings of The Second European Symposium on Principles of Data Mining and Knowledge Discovery. Springer-Verlag
-
Ting, K.: Inducing cost-sensitive trees via instance weighting. In: Proceedings of The Second European Symposium on Principles of Data Mining and Knowledge Discovery. Volume 1510 of Lecture Notes in AI., Springer-Verlag (1998) 139-147.
-
(1998)
Lecture Notes in AI.
, vol.1510
, pp. 139-147
-
-
Ting, K.1
-
34
-
-
84947603083
-
Probabilistic alert correlation
-
Recent Advances in Intrusion Detection (RAID2001). Springer-Verlag
-
Valdes, A., Skinner, K.: Probabilistic alert correlation. In: Recent Advances in Intrusion Detection (RAID2001). Volume 2212 of Lecture Notes in Computer Science., Springer-Verlag (2001) 54-68.
-
(2001)
Lecture Notes in Computer Science.
, vol.2212
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
35
-
-
84947286061
-
Measuring false-positive by automated real-time correlated hacking behavior analysis
-
Volume 2200 of Lecture Notes in Computer Science., Springer-Verlag
-
Wang, J., Lee, I.: Measuring false-positive by automated real-time correlated hacking behavior analysis. In: Information Security 4th International Conference. Volume 2200 of Lecture Notes in Computer Science., Springer-Verlag (2001) 512.
-
(2001)
Information Security 4th International Conference
, pp. 512
-
-
Wang, J.1
Lee, I.2
|