-
1
-
-
21644478785
-
RACOON: Rapidly generating user command data for anomaly detection from customizable templates
-
Tucson, AZ, December
-
Chinchani, R., Muthukrishnan, A., Chandrasekaran, M., Upadhyaya, S.: RACOON: Rapidly generating user command data for anomaly detection from customizable templates. 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, December (2004)
-
(2004)
20th Annual Computer Security Applications Conference (ACSAC)
-
-
Chinchani, R.1
Muthukrishnan, A.2
Chandrasekaran, M.3
Upadhyaya, S.4
-
2
-
-
26944491562
-
An unsupervised algorithm for segmenting categorical timeseries into episodes
-
London, UK. September
-
Cohen, P., Heeringa, B., Adams, N. M.: An unsupervised algorithm for segmenting categorical timeseries into episodes. In: Proceedings of the ESP Exploratory Workshop on Pattern Detection and Discovery, London, UK. September (2002) 49-62
-
(2002)
Proceedings of the ESP Exploratory Workshop on Pattern Detection and Discovery
, pp. 49-62
-
-
Cohen, P.1
Heeringa, B.2
Adams, N.M.3
-
3
-
-
84944736505
-
Intrusion detection: A bioinformatics approach
-
Las Vegas, Nevada, December 8-12.
-
Coull, S., Branch, J., Szymanski, B., Breimer, E.: Intrusion detection: A bioinformatics approach. In: 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 8-12. (2003)
-
(2003)
19th Annual Computer Security Applications Conference
-
-
Coull, S.1
Branch, J.2
Szymanski, B.3
Breimer, E.4
-
4
-
-
0002511297
-
Predicting sequences of user actions
-
AAAI Technical Report WS-98-07, AAAI Press, Menlo Park, California
-
Davison, B. D., Hirsh, H.: Predicting sequences of user actions. Predicting the Future: AI Approaches to Time-Series Problems. AAAI Technical Report WS-98-07, AAAI Press, Menlo Park, California, (1998)
-
(1998)
Predicting the Future: AI Approaches to Time-series Problems
-
-
Davison, B.D.1
Hirsh, H.2
-
5
-
-
0013420742
-
Using unix: Collected traces of 168 users
-
Department of Computer Science, University of Calgary, Canada
-
Greenberg, S.: Using Unix: Collected traces of 168 users. Technical Report 88/333/45, Department of Computer Science, University of Calgary, Canada, (1988)
-
(1988)
Technical Report 88/333/45
-
-
Greenberg, S.1
-
6
-
-
33646848466
-
Investigating a possible flaw in a masquerade detection system
-
School of Computing Science, University of Newcastle
-
Killhourhy, K. S., Maxion, R. A.: Investigating a possible flaw in a masquerade detection system. Technical Report CS-TR: 869, School of Computing Science, University of Newcastle. (2004)
-
(2004)
Technical Report CS-TR: 869
-
-
Killhourhy, K.S.1
Maxion, R.A.2
-
7
-
-
17844372755
-
Empirical evaluation of SVM-based masquerade detection using UNIX commands
-
March
-
Kim, H.-S., Cha, S.-D.: Empirical evaluation of SVM-based masquerade detection using UNIX commands. Computers & Security, Vol. 24, March. (2005) 160-168
-
(2005)
Computers & Security
, vol.24
, pp. 160-168
-
-
Kim, H.-S.1
Cha, S.-D.2
-
8
-
-
0032218214
-
Temporal sequence learning and data reduction for anomaly detection
-
San Francisco, California, November 3-5
-
Lane, T., Brodley, C. E.: Temporal Sequence Learning and Data Reduction for Anomaly Detection. In: Proceedings of the Fifth ACM Conference on Computer and Communications Security, San Francisco, California, November 3-5. (1998) 150-158
-
(1998)
Proceedings of the Fifth ACM Conference on Computer and Communications Security
, pp. 150-158
-
-
Lane, T.1
Brodley, C.E.2
-
9
-
-
1942436338
-
Masquerade detection augmented with error analysis
-
March
-
Maxion, R. A., Townsend, T. N.: Masquerade detection augmented with error analysis. IEEE Transactions on Reliability, 53(1) March (2004) 124-147
-
(2004)
IEEE Transactions on Reliability
, vol.53
, Issue.1
, pp. 124-147
-
-
Maxion, R.A.1
Townsend, T.N.2
-
13
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
February
-
Schonlau, M., DuMouchel, W., Ju, W., Karr, A. F., Theus, M., Vardi, Y.: Computer intrusion: Detecting masquerades. Statistical Science, 16(1) February (2001) 58-74
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
14
-
-
0034325396
-
Detecting masqueraders in intrusion detection based on unpopular commands
-
November
-
Schonlau, M., Theus, M.: Detecting masqueraders in intrusion detection based on unpopular commands. Information Processing Letters, 76(1-2) November (2000) 33-38
-
(2000)
Information Processing Letters
, vol.76
, Issue.1-2
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
15
-
-
0015960104
-
The string-to-string correction problem
-
Wagner, R. A., Fisher, M. J.: The string-to-string correction problem. Journal of the ACM, Vol.21 (1974) 168-173
-
(1974)
Journal of the ACM
, vol.21
, pp. 168-173
-
-
Wagner, R.A.1
Fisher, M.J.2
|