-
1
-
-
0023294428
-
An intrusion-detection model
-
D. E. Denning, "An intrusion-detection model," IEEE Trans. Softw. Eng., vol. 13, no. 2, pp. 222-232, 1987.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
2
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Chalmers Univ., Mar.
-
S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Tech. Rep. 99-15, Chalmers Univ., Mar. 2000.
-
(2000)
Tech. Rep.
, vol.99
, Issue.15
-
-
Axelsson, S.1
-
3
-
-
85084160308
-
A study in using neural networks for anomaly and misuse detection
-
Washington, D.C.
-
A. Ghosh and A. Schwartzbard, "A study in using neural networks for anomaly and misuse detection," in 8th USENIX Security Symposium, (Washington, D.C.), pp. 141-151, 1999.
-
(1999)
8th USENIX Security Symposium
, pp. 141-151
-
-
Ghosh, A.1
Schwartzbard, A.2
-
4
-
-
0028430224
-
Network intrusion detection
-
B. Mukherjee, H. Heberlein, and K. Levitt, "Network intrusion detection," IEEE Network, vol. 8, no. 3, pp. 26-41, 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, H.2
Levitt, K.3
-
5
-
-
0029716418
-
A sense of self for unix processes
-
IEEE Computer Society
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for unix processes," in Proceedings of the 1996 IEEE Symposium on Security and Privacy, p. 120, IEEE Computer Society, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
6
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
W. Lee, S. J. Stolfo, and K. W. Mok, "A data mining framework for building intrusion detection models," in IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
7
-
-
0142049813
-
A software fault tree approach to requirement analysis of an intrusion detection system
-
G. Helmer, J. Wong, M. Slagell, V. Honavar, L. Miller, and R. Lutz, "A software fault tree approach to requirement analysis of an intrusion detection system," in Symposium on Requirements Engineering for Information Security, 2001.
-
(2001)
Symposium on Requirements Engineering for Information Security
-
-
Helmer, G.1
Wong, J.2
Slagell, M.3
Honavar, V.4
Miller, L.5
Lutz, R.6
-
8
-
-
4143149628
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," Data Mining for Security Applications, 2002.
-
(2002)
Data Mining for Security Applications
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
9
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
12
-
-
85149612939
-
Fast effective rule induction
-
(A. Prieditis and S. Russell, eds.), (Tahoe City, CA), Morgan Kaufmann, July 9-12
-
W. W. Cohen, "Fast effective rule induction," in Proc. of the ISth International Conference on Machine Learning (A. Prieditis and S. Russell, eds.), (Tahoe City, CA), pp. 115-123, Morgan Kaufmann, July 9-12, 1995.
-
(1995)
Proc. of the ISth International Conference on Machine Learning
, pp. 115-123
-
-
Cohen, W.W.1
-
13
-
-
34249753618
-
Support-vector networks
-
C. Cortes and V. Vapnik, "Support-vector networks," Mach. Learn., vol. 20, no. 3, pp. 273-297, 1995.
-
(1995)
Mach. Learn.
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
14
-
-
0003120218
-
Fast training of support vector machines using sequential minimal optimization
-
J. C. Platt, "Fast training of support vector machines using sequential minimal optimization," Advances in kernel methods: support vector learning, pp. 185-208, 1999.
-
(1999)
Advances in Kernel Methods: Support Vector Learning
, pp. 185-208
-
-
Platt, J.C.1
-
15
-
-
0000521473
-
Ridge estimators in logistic regression
-
S. L. Cessie and J. V. Houwelingen, "Ridge estimators in logistic regression," Applied Statistics, vol. 41, no. 1, pp. 191-201, 1992.
-
(1992)
Applied Statistics
, vol.41
, Issue.1
, pp. 191-201
-
-
Cessie, S.L.1
Houwelingen, J.V.2
-
18
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. A. Pearlmutter, "Detecting intrusions using system calls: Alternative data models," in IEEE Symposium on Security and Privacy, pp. 133-145, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.A.3
-
19
-
-
0036085540
-
"Why 6?" defining the operational limits of stide, an anomaly-based intrusion detector
-
IEEE Computer Society
-
K. M. C. Tan and R. A. Maxion, ""Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector," in Proceedings of the 2002 IEEE Symposium an Security and Privacy, p. 188, IEEE Computer Society, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium An Security and Privacy
, pp. 188
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
20
-
-
24744463914
-
Results of the darpa 1998 offline intrusion detection evaluation
-
R. Lippmann, R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall, S. E. Webster, and M. A. Zissman, "Results of the darpa 1998 offline intrusion detection evaluation.," in Recent Advances in Intrusion Detection, 1999.
-
(1999)
Recent Advances in Intrusion Detection
-
-
Lippmann, R.1
Cunningham, R.K.2
Fried, D.J.3
Graf, I.4
Kendall, K.R.5
Webster, S.E.6
Zissman, M.A.7
-
21
-
-
0001927585
-
On information and sufficiency
-
S. Kullback and R. A. Leiblei, "On information and sufficiency," Ann. Math. Statist., vol. 22, pp. 79-86, 1951.
-
(1951)
Ann. Math. Statist.
, vol.22
, pp. 79-86
-
-
Kullback, S.1
Leiblei, R.A.2
-
24
-
-
0037986866
-
Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES)
-
Computer Science Laboratory, SRI International, Menlo Park, CA, May
-
D. Anderson, T. F. Lunt, H. Javitz, A. Tamaru, and A. Valdes, "Detecting unusual program behavior using the statistical component of the next-generation intrusion detection expert system (NIDES)," Tech. Rep. SRI-CSL-95-06, Computer Science Laboratory, SRI International, Menlo Park, CA, May 1995.
-
(1995)
Tech. Rep.
, vol.SRI-CSL-95-06
-
-
Anderson, D.1
Lunt, T.F.2
Javitz, H.3
Tamaru, A.4
Valdes, A.5
|