-
1
-
-
0037986866
-
Detecting unusual program behavior using the statistical component of the Next-Generation Intrusion Detection Expert System (NIDES)
-
Computer Science Laboratory, SRI International
-
D. Anderson, T. Lunt, H. Javitz, A. Tamaru, and A. Valdes. Detecting Unusual Program Behavior Using the Statistical Component of the Next-Generation Intrusion Detection Expert System (NIDES). Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, 1995.
-
(1995)
Technical Report SRI-CSL-95-06
-
-
Anderson, D.1
Lunt, T.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
-
3
-
-
21844436336
-
Knowledge based (re-)clustering
-
Jerusalem, Israel, October
-
M. C. Clark, L. O. Hall, C. Li, and D. B. Goldgof. Knowledge based (re-)clustering. In The 12th International Conference on Pattern Recognition, pages 245-250, Jerusalem, Israel, October 1994.
-
(1994)
The 12th International Conference on Pattern Recognition
, pp. 245-250
-
-
Clark, M.C.1
Hall, L.O.2
Li, C.3
Goldgof, D.B.4
-
7
-
-
84861255899
-
-
IANA:Internet Assigned Number Authority. http://www.iana.org.
-
-
-
-
11
-
-
0141723181
-
-
KDD99. KDD Cup 1999 Data. http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html.
-
KDD Cup 1999 Data.
-
-
-
12
-
-
0142095451
-
NSOM: A real-time network-based intrusion detection system using self-organizing maps
-
submitted
-
K. Labib and R. Vemuri. NSOM: A real-time network-based intrusion detection system using self-organizing maps. Networks Security, submitted, 2002.
-
(2002)
Networks Security
-
-
Labib, K.1
Vemuri, R.2
-
13
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
W. Lee and S. Stolfo. A framework for constructing features and models for intrusion detection systems. Transactions on Information and System Security, 3(4):227-261, 2000.
-
(2000)
Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
15
-
-
0142063407
-
Novelty detection: A review part 1: Statistical approaches
-
Dec.
-
M. Markou and S. Singh. Novelty detection: A review part 1: Statistical approaches. Signal Processing, 83(12):2481-2497, Dec. 2003.
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2481-2497
-
-
Markou, M.1
Singh, S.2
-
16
-
-
0142126712
-
Novelty detection: A review part 2: Neural network-based approaches
-
Dec.
-
M. Markou and S. Singh. Novelty detection: A review part 2: Neural network-based approaches. Signal Processing, 83(12):2499-2521, Dec. 2003.
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2499-2521
-
-
Markou, M.1
Singh, S.2
-
17
-
-
0004149270
-
-
McGraw-Hill/Irwin, New York
-
J. Neter, M. H. Kutner, W. Wasserman, and C. J. Nachtschiem. Applied Linear Statistical Models, 4th Ed. McGraw-Hill/Irwin, New York, 1996.
-
(1996)
Applied Linear Statistical Models, 4th Ed.
-
-
Neter, J.1
Kutner, M.H.2
Wasserman, W.3
Nachtschiem, C.J.4
-
20
-
-
0003260777
-
Transmission control protocol - DARPA internet program protocol specification
-
STD 7, USC/Information Sciences Institute, September
-
J. Postel. Transmission Control Protocol - DARPA Internet Program Protocol Specification. STD 7, RFC 793, USC/Information Sciences Institute, September 1981.
-
(1981)
RFC
, vol.793
-
-
Postel, J.1
-
21
-
-
85090433665
-
Snort - Lightweight intrusion detecion for networks
-
Nov
-
M. Roesch. Snort - lightweight intrusion detecion for networks. In Proceedings of USENIX LISA, Nov 1999.
-
(1999)
Proceedings of USENIX LISA
-
-
Roesch, M.1
-
24
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
Florida, Nov.
-
M.-L. Shyu, S.-C. Chen, K. Sarinnapakorn, and L. Chang. A novel anomaly detection scheme based on principal component classifier. In Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM'03), pages 172-179, Florida, Nov. 2003.
-
(2003)
Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in Conjunction with the Third IEEE International Conference on Data Mining (ICDM'03)
, pp. 172-179
-
-
Shyu, M.-L.1
Chen, S.-C.2
Sarinnapakorn, K.3
Chang, L.4
-
26
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. Hoagland, and J. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1-2): 105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
|