-
1
-
-
0032090765
-
Automatic subspace clustering of high dimensional data for data mining applications
-
AGRAWAL, R., GEHRKE, J., GUNOPULOS, D., AND RAGHAVAN, P. 1998. Automatic subspace clustering of high dimensional data for data mining applications. In ACM SIGMOD International Conference on Management of Data, 94-105.
-
(1998)
ACM SIGMOD International Conference on Management of Data
, pp. 94-105
-
-
Agrawal, R.1
Gehrke, J.2
Gunopulos, D.3
Raghavan, P.4
-
2
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Carnegie Mellon University
-
ALLEN, J., CHRISTIE, A., FITHEN, W., McHuGH, J., PICKEL, J., AND STONER, E. 2000. State of the practice of intrusion detection technologies. Tech. Rep., Carnegie Mellon University. http://www.cert.org/archive/pdf/99tr028.pdf.
-
(2000)
Tech. Rep.
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
3
-
-
85180737978
-
A lightweight tool for detecting web server attacks
-
ALMGREN, M., DEBAR, H., AND DACIER, M. 2000. A lightweight tool for detecting web server attacks. In Network and Distributed System Security Symposium (NDSS 2000), 157-170.
-
(2000)
Network and Distributed System Security Symposium (NDSS 2000)
, pp. 157-170
-
-
Almgren, M.1
Debar, H.2
Dacier, M.3
-
5
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
AXELSSON, S. 2000. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security 3, 3, 186-205.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
6
-
-
0003907293
-
-
Macmillan Technical Publishing
-
BACE, R. 2000. Intrusion Detection. Macmillan Technical Publishing.
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
10
-
-
0242614019
-
-
BLOEDORN, E., HILL, B., CHRISTIANSEN, A., SKORUPKA, C., TALBOOT, L., AND TIVEL, J. 2000. Data mining for improving intrusion detection, http://www.mitre.org/support/papers/tech_papers99_00/.
-
(2000)
Data Mining for Improving Intrusion Detection
-
-
Bloedorn, E.1
Hill, B.2
Christiansen, A.3
Skorupka, C.4
Talboot, L.5
Tivel, J.6
-
11
-
-
0028375730
-
Alarm correlation and fault identification in communication networks
-
BOULOUTAS, A., CALO, S., AND FINKEL, A. 1994. Alarm correlation and fault identification in communication networks. IEEE Transactions on Communications 42, 2-4, 523-533.
-
(1994)
IEEE Transactions on Communications
, vol.42
, Issue.2-4
, pp. 523-533
-
-
Bouloutas, A.1
Calo, S.2
Finkel, A.3
-
15
-
-
85083464467
-
Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection
-
CHAN, P. AND STOLFO, S. 1998. Toward scalable learning with non-uniform class and cost distributions: A case study in credit card fraud detection. In 4th International Conference on Knowledge Discovery and Data Mining, 164-168.
-
(1998)
4th International Conference on Knowledge Discovery and Data Mining
, pp. 164-168
-
-
Chan, P.1
Stolfo, S.2
-
16
-
-
0034275407
-
Efficient rule-based attribute-oriented induction for data mining
-
CHEUNG, D., HWANG, H., FU, A., AND HAN, J. 2000. Efficient rule-based attribute-oriented induction for data mining. Journal of Intelligent Information Systems 15, 2, 175-200.
-
(2000)
Journal of Intelligent Information Systems
, vol.15
, Issue.2
, pp. 175-200
-
-
Cheung, D.1
Hwang, H.2
Fu, A.3
Han, J.4
-
21
-
-
0034226287
-
A revised taxonomy for intrusion detection systems
-
DEBAR, H., DACIER, M., AND WESPI, A. 2000. A revised taxonomy for intrusion detection systems. Annales des Télécommunications 55, 7-8, 361-378.
-
(2000)
Annales des Télécommunications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
23
-
-
85139983802
-
Supervised and unsupervised discretization of continuous features
-
DOUGHERTY, J., KOHAVI, R., AND SAHAMI, M. 1995. Supervised and unsupervised discretization of continuous features. In. Proceedings of the 12th International Conference on Machine Learning, 194-202.
-
(1995)
Proceedings of the 12th International Conference on Machine Learning
, pp. 194-202
-
-
Dougherty, J.1
Kohavi, R.2
Sahami, M.3
-
26
-
-
0002738566
-
Knowledge discovery in databases: An attribute-oriented approach
-
HAN, J., CAI, Y., AND CERCONE, N. 1992. Knowledge discovery in databases: An attribute-oriented approach. In 18th International Conference on Very Large Databases, 547-559.
-
(1992)
18th International Conference on Very Large Databases
, pp. 547-559
-
-
Han, J.1
Cai, Y.2
Cercone, N.3
-
27
-
-
0027542839
-
Data-driven discovery of quantitative rules in relational databases
-
HAN, J., CAI, Y., AND CERCONE, N. 1993. Data-driven discovery of quantitative rules in relational databases. IEEE Transactions on Knowledge and Data Engineering 5, 1, 29-40.
-
(1993)
IEEE Transactions on Knowledge and Data Engineering
, vol.5
, Issue.1
, pp. 29-40
-
-
Han, J.1
Cai, Y.2
Cercone, N.3
-
31
-
-
0005266923
-
Towards a practical alarm correlation system
-
A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London
-
HOUCK, K., CALO, S., AND FINKEL, A. 1995. Towards a practical alarm correlation system. In 4th International Symposium on Integrated Network Management. A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London, 226-237.
-
(1995)
4th International Symposium on Integrated Network Management
, pp. 226-237
-
-
Houck, K.1
Calo, S.2
Finkel, A.3
-
32
-
-
0027150412
-
USTAT: A real-time intrusion detection system for UNIX
-
Oakland, CA
-
ILUNG, K. 1993. USTAT: A real-time intrusion detection system for UNIX. In IEEE Symposium on Security and Privacy, Oakland, CA, 16-28.
-
(1993)
IEEE Symposium on Security and Privacy
, pp. 16-28
-
-
Ilung, K.1
-
35
-
-
0003065998
-
Real-time telecommunication network management: Extending event correlation with temporal constraints
-
A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London
-
JAKOBSON, G. AND WEISSMAN, M. D. 1995. Real-time telecommunication network management: Extending event correlation with temporal constraints. In 4th International Symposium on Integrated Network Management. A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London, 290-301.
-
(1995)
4th International Symposium on Integrated Network Management
, pp. 290-301
-
-
Jakobson, G.1
Weissman, M.D.2
-
40
-
-
0003414571
-
-
Dependable Computing and Fault-Tolerant Systems. Springer-Verlag, Vienna
-
LAPRIE, J., Ed. 1992. Dependability: Basic Concepts and Terminology. Dependable Computing and Fault-Tolerant Systems, vol. 5. Springer-Verlag, Vienna.
-
(1992)
Dependability: Basic Concepts and Terminology
, vol.5
-
-
Laprie, J.1
-
41
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
LEE, W. AND STOLFO, S. J. 2000. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3, 4, 227-261.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
42
-
-
0027727530
-
A case-based reasoning approach to the resolution of faults in communication networks
-
H.-G. Hegering and Y. Yemini, Eds. North Holland, Amsterdam
-
LEWIS, L. 1993. A case-based reasoning approach to the resolution of faults in communication networks. In 3th International Symposium on Integrated Network Management. H.-G. Hegering and Y. Yemini, Eds. North Holland, Amsterdam, 671-682.
-
(1993)
3th International Symposium on Integrated Network Management
, pp. 671-682
-
-
Lewis, L.1
-
44
-
-
84958970105
-
The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
-
LNCS. Springer Berlin, Verlag
-
LIPPMANN, R., WEBSTER, S., AND STETSON, D. 2002. The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection. In 5th Workshop on Recent Advances in Intrusion Detection (RAID). LNCS, vol. 2516. Springer Berlin, Verlag, 307-326.
-
(2002)
5th Workshop on Recent Advances in Intrusion Detection (RAID)
, vol.2516
, pp. 307-326
-
-
Lippmann, R.1
Webster, S.2
Stetson, D.3
-
45
-
-
0038323597
-
-
M.S. Thesis, Simon Fraser University, Canada
-
LU, Y. 1997. Concept hierarchy in data mining: Specification, generation, and implementation. M.S. Thesis, Simon Fraser University, Canada.
-
(1997)
Concept Hierarchy in Data Mining: Specification, Generation, and Implementation
-
-
Lu, Y.1
-
46
-
-
0034301662
-
A data mining analysis of RTID alarms
-
MANGANARIS, S., CHRISTENSEN, M., ZERKLE, D., AND HERMIZ, K. 2000. A data mining analysis of RTID alarms. Computer Networks 34, 4, 571-577.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
47
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
MCHUGH, J. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3, 4, 262-294.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
51
-
-
84883386223
-
Abstraction-based intrusion detection in distributed environments
-
NING, P., JAJODIA, S., AND WANG, X. 2001. Abstraction-based intrusion detection in distributed environments. ACM Transactions on Information and System Security 4, 4, 407-452.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.4
, pp. 407-452
-
-
Ning, P.1
Jajodia, S.2
Wang, X.3
-
52
-
-
0002358483
-
Event correlation using rule and object based techniques
-
A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London
-
NYGATE, Y. A. 1995. Event correlation using rule and object based techniques. In 4th International Symposium on Integrated Network Management. A. S. Sethi, Y. Raynaud, and F. Faure-Vincent, Eds. Chapman & Hall, London, 278-289.
-
(1995)
4th International Symposium on Integrated Network Management
, pp. 278-289
-
-
Nygate, Y.A.1
-
55
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
PAXSON, V. 1999. Bro: A system for detecting network intruders in real-time. Computer Networks 31, 23/24, 2435-2463.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
56
-
-
0023347137
-
A probabilistic causal model for diagnostic problem solving -Part I: Diagnostic strategy
-
PENG, Y. AND REGGIA, J. A. 1987a. A probabilistic causal model for diagnostic problem solving -Part I: Diagnostic strategy. IEEE Transactions on Syst. Man Cybern. 17, 3, 395-404.
-
(1987)
IEEE Transactions on Syst. Man Cybern.
, vol.17
, Issue.3
, pp. 395-404
-
-
Peng, Y.1
Reggia, J.A.2
-
57
-
-
84939750950
-
A probabilistic causal model for diagnostic problem solving -Part I: Integrating symbolic causal inference with numeric probabilistic inference
-
PENG, Y. AND REGGIA, J. A. 1987b. A probabilistic causal model for diagnostic problem solving -Part I: Integrating symbolic causal inference with numeric probabilistic inference. IEEE Trans. Syst. Man. Cybern. 17, 2, 146-162.
-
(1987)
IEEE Trans. Syst. Man. Cybern.
, vol.17
, Issue.2
, pp. 146-162
-
-
Peng, Y.1
Reggia, J.A.2
-
58
-
-
3142545814
-
Architecture and Revised Model of MAFTIA
-
University of Newcastle upon Tyne
-
POWELL, D. AND STROUD, R. 2001. Architecture and Revised Model of MAFTIA. Tech. Rep. CS-TR-749, University of Newcastle upon Tyne.
-
(2001)
Tech. Rep.
, vol.CS-TR-749
-
-
Powell, D.1
Stroud, R.2
-
60
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc.
-
PTACEK, T. H. AND NEWSHAM, T. N. 1998. Insertion, evasion, and denial of service: Eluding network intrusion detection. Tech. Rep., Secure Networks, Inc.
-
(1998)
Tech. Rep.
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
62
-
-
0024480920
-
Development and application of a metric on semantic nets
-
RADA, R., MILL, H., BICKNELL, E., AND BLETTNER, M. 1989. Development and application of a metric on semantic nets. IEEE Transactions on Syst. Man Cybern. 19, 1, 17-30.
-
(1989)
IEEE Transactions on Syst. Man Cybern.
, vol.19
, Issue.1
, pp. 17-30
-
-
Rada, R.1
Mill, H.2
Bicknell, E.3
Blettner, M.4
-
63
-
-
0002016474
-
Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language
-
RESNIK, P. 1999. Semantic similarity in a taxonomy: An information-based measure and its application to problems of ambiguity in natural language. Journal of Artificial Intelligence Research 11, 95-130.
-
(1999)
Journal of Artificial Intelligence Research
, vol.11
, pp. 95-130
-
-
Resnik, P.1
-
64
-
-
0031684427
-
Combinatorial pattern discovery in biological sequences: The TEIRESIAS algorithm
-
RIGOUTSOS, I. AND FLORATOS, A. 1998. Combinatorial pattern discovery in biological sequences: The TEIRESIAS algorithm. Bioinformatics 14, 1, 55-67.
-
(1998)
Bioinformatics
, vol.14
, Issue.1
, pp. 55-67
-
-
Rigoutsos, I.1
Floratos, A.2
-
65
-
-
0033280865
-
A high-performance network intrusion detection system
-
SEKAR, R., GUANG, Y., VERMA, S., AND SHANBHAG, T. 1999. A high-performance network intrusion detection system. In 6th ACM Conference on Computer and Communications Security, 8-17.
-
(1999)
6th ACM Conference on Computer and Communications Security
, pp. 8-17
-
-
Sekar, R.1
Guang, Y.2
Verma, S.3
Shanbhag, T.4
-
66
-
-
0242529347
-
Practical automated detection of stealthy portscans
-
STANIFORD, S., HOAGLAND, J. A., AND MCALERNEY, J. M. 2000. Practical automated detection of stealthy portscans. In ACM Computer and Communications Security IDS Workshop, 1-7.
-
(2000)
ACM Computer and Communications Security IDS Workshop
, pp. 1-7
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
67
-
-
0004141908
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
TANENBAUM, A. S. 1996. Computer Networks. Prentice-Hall, Englewood Cliffs, NJ.
-
(1996)
Computer Networks
-
-
Tanenbaum, A.S.1
-
69
-
-
0030145369
-
High speed & robust event correlation
-
YEMINI, S., KLIGER, S., MOZES, E., YEMINI, Y., AND OHSIE, D. 1996. High speed & robust event correlation. IEEE Communications Magazine 34, 5, 82-90.
-
(1996)
IEEE Communications Magazine
, vol.34
, Issue.5
, pp. 82-90
-
-
Yemini, S.1
Kliger, S.2
Mozes, E.3
Yemini, Y.4
Ohsie, D.5
|