-
1
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
Agrawal, R.; Imielinski, T.; and Swami A. 1993. Mining association rules between sets of items in large databases. ACM SIGMOD, 207-216.
-
(1993)
ACM SIGMOD
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
2
-
-
0029716418
-
A sense of self for UNIX processes
-
Forrest, S.; Hofmeyr, S.; Somayaji, A.; and Longstaff, T. 1996. A Sense of Self for UNIX Processes. IEEE Symposium on Security and Privacy, 120-128.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
4
-
-
0142157009
-
On the detection of anomalous system call arguments
-
Kruegel, C.; Mutz, D.; Valeur, F.; and Vigna, G. 2003. On the Detection of Anomalous System Call Arguments, European Symposium on Research in Computer Security, 326-343.
-
(2003)
European Symposium on Research in Computer Security
, pp. 326-343
-
-
Kruegel, C.1
Mutz, D.2
Valeur, F.3
Vigna, G.4
-
6
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R.; Haines, J.; Fried, D.; Korba, J.; and Das, K. 2000. The 1999 DARPA Off-Line Intrusion Detection Evaluation. Computer Networks, 34:579-595.
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
8
-
-
0031684427
-
Combinatorial pattern discovery in biological sequences
-
Rigoutsos, I., and Floratos, A. 1998. Combinatorial pattern discovery in biological sequences. Bioinformatics, 14(1):55-67.
-
(1998)
Bioinformatics
, vol.14
, Issue.1
, pp. 55-67
-
-
Rigoutsos, I.1
Floratos, A.2
-
9
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Tan, K.M.C.; Killourhy, K.S.; and Maxion, R.A. 2002. Undermining an Anomaly-based Intrusion Detection System Using Common Exploits. RAID, 54-74.
-
(2002)
RAID
, pp. 54-74
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
10
-
-
0038011184
-
Mimicry attacks on host-based intrusion detection systems
-
Wagner, D., and Soto, P. 2002. Mimicry Attacks on Host-Based Intrusion Detection Systems. ACM CCS, 255-264.
-
(2002)
ACM CCS
, pp. 255-264
-
-
Wagner, D.1
Soto, P.2
-
12
-
-
20444507366
-
An intrusion-detection system based on the teiresias pattern-discovery algorithm
-
Wespi, A.; Dacier, M.; and Debar, H. 1999. An Intrusion-Detection System Based on the Teiresias Pattern-Discovery Algorithm. EICAR Conference, 1-15.
-
(1999)
EICAR Conference
, pp. 1-15
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
-
13
-
-
84944248021
-
Intrusion detection using variable-length audit trail patterns
-
Wespi, A.; Dacier, M.; and Debar, H. 2000. Intrusion detection using variable-length audit trail patterns. RAID, 110-129.
-
(2000)
RAID
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
-
14
-
-
0026187945
-
The zero-frequency problem: Estimating the probabilities of novel events in adaptive text compression
-
Witten, I., and Bell, T. 1991. The zero-frequency problem: estimating the probabilities of novel events in adaptive text compression. IEEE Trans. on Information Theory, 37(4):1085-1094.
-
(1991)
IEEE Trans. on Information Theory
, vol.37
, Issue.4
, pp. 1085-1094
-
-
Witten, I.1
Bell, T.2
|