-
3
-
-
0029716418
-
A sense of self for unix process
-
Forrest, S., Hofmeyr, S. A., Somayaji, A., Logstaff, T. A.: A Sense of Self for Unix process, Proceedings of 1996 IEEE Symposium on Computer Security and Privacy. (1996) 120-128
-
(1996)
Proceedings of 1996 IEEE Symposium on Computer Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Logstaff, T.A.4
-
4
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection system
-
Ilgun, K., Kemmerer, R. A., Porras, P. A.: State Transition Analysis: A Rule-Based Intrusion Detection System. IEEE Transactions on Software Engineering, 21(3). (1995) 181-199
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
5
-
-
0026154682
-
The SRI IDES statistical anomaly detector
-
Oakland, CA. SRI International. (May)
-
Javitz, H. S., Valdes, A.: The SRI IDES Statistical Anomaly Detector. In IEEE Symposium on Security and Privacy, Oakland, CA. SRI International. (May 1991)
-
(1991)
IEEE Symposium on Security and Privacy
-
-
Javitz, H.S.1
Valdes, A.2
-
6
-
-
0036321445
-
Use of K-nearest neighbor classifier for intrusion detection
-
Yihua, L., Vemuri, V. R.: Use of K-Nearest Neighbor classifier for intrusion detection. Computers & Security 21(5). (2002) 439-448
-
(2002)
Computers & Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Yihua, L.1
Vemuri, V.R.2
-
8
-
-
0033295259
-
A system for detecting network intruders in real-time
-
Paxson, V., Bro,: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24). (1999) 2435-2463
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
Bro2
-
10
-
-
0036643492
-
Mining hybrid sequential patterns and sequential rules
-
Yen-Liang, C., Shih-Sheng, C., Ping-Yu H.: Mining hybrid sequential patterns and sequential rules. Information Systems V 27, 5. (2002) 345-362
-
(2002)
Information Systems
, vol.27
, Issue.5
, pp. 345-362
-
-
Yen-Liang, C.1
Shih-Sheng, C.2
Ping-Yu, H.3
-
11
-
-
0029212693
-
Mining sequential patterns
-
Taipei, Taiwan, IEEE Computer Society
-
Agrawal, R., Srikant, R.: Mining sequential patterns. Proceedings of the 7th International Conference on Data Engineering, Taipei, Taiwan, IEEE Computer Society. (1995) 3-14
-
(1995)
Proceedings of the 7th International Conference on Data Engineering
, pp. 3-14
-
-
Agrawal, R.1
Srikant, R.2
-
12
-
-
0032028932
-
Efficient data mining for path traversal patterns
-
Chen, M.S., Park, J.S., Yu, P.S.: Efficient data mining for path traversal patterns, IEEE Trans Knowledge Data Eng, 10(2). (1998) 209-221
-
(1998)
IEEE Trans Knowledge Data Eng
, vol.10
, Issue.2
, pp. 209-221
-
-
Chen, M.S.1
Park, J.S.2
Yu, P.S.3
-
13
-
-
0039253846
-
Mining frequent patterns without candidate
-
Dallas, Texas, ACM Press, New York
-
Han, J., Pei, j., Yin, Y.: Mining frequent patterns without candidate, in proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, Texas, ACM Press, New York. (2000) 1-12
-
(2000)
Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data
, pp. 1-12
-
-
Han, J.1
Pei, J.2
Yin, Y.3
-
14
-
-
84883393843
-
-
DARPA Dataset: http://www.ll.mit.edu/IST/ideval/
-
DARPA Dataset
-
-
-
15
-
-
26444588073
-
-
Snort: http://www.snort.org/
-
-
-
-
16
-
-
0003539116
-
Snort - Lightweight intrusion detection system for networks
-
Roesch, M.: Snort - lightweight intrusion detection system for networks. In: Proceedings of USENIX LISA'99. (1999)
-
(1999)
Proceedings of USENIX LISA'99
-
-
Roesch, M.1
-
18
-
-
0034301662
-
A data mining analysis of RTID alarms
-
October
-
Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.: A Data Mining Analysis of RTID Alarms. Computer Networks, 34(4). (October 2000) 571-577
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
19
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting Intrusions by Data Mining. In IEEE Workshop on Information Assurance and Security. (2001)
-
(2001)
IEEE Workshop on Information Assurance and Security
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
20
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee, W., Stolfo, S. J.: A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security, 3(4). (2000) 227-261
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
|