-
1
-
-
33745907609
-
A Clustering algorithm for categorical attributes
-
Bell Laboratories, Murray Hill
-
S. Guha, R. Rastogi, and K. Sim, "A Clustering algorithm for categorical attributes," Technical report, Bell Laboratories, Murray Hill, 1997.
-
(1997)
Technical Report
-
-
Guha, S.1
Rastogi, R.2
Sim, K.3
-
2
-
-
0032652570
-
ROCK: A robust clustering algorithm for categorical attributes
-
Sydney, March
-
S. Guha, R. Rastogi, and K. Sim, "ROCK: A robust clustering algorithm for categorical attributes," Proc. IEEE International Conference on Data Engineering, Sydney, March 1999.
-
(1999)
Proc. IEEE International Conference on Data Engineering
-
-
Guha, S.1
Rastogi, R.2
Sim, K.3
-
3
-
-
0001457509
-
Some methods for classifiction and analysis of multivariate observations
-
J. MacQueen, "Some methods for classifiction and analysis of multivariate observations," Proc. 5th Berkeley Symp., pp.281-297, 1967.
-
(1967)
Proc. 5th Berkeley Symp.
, pp. 281-297
-
-
MacQueen, J.1
-
4
-
-
33745907340
-
The causality analysis of protocol measures for detection of attacks based on network
-
February
-
Il-Ahn Cheong, Yong-Min Kim, Min-Soo Kim, and Bong-Nam Noh, "The Causality Analysis of Protocol Measures for Detection of Attacks based on Network," The Intl. Conf. on Information Networking, Proc. Vol. III, February 2004.
-
(2004)
The Intl. Conf. on Information Networking, Proc.
, vol.3
-
-
Il-Ahn, C.1
Yong-Min, K.2
Min-Soo, K.3
Bong-Nam, N.4
-
5
-
-
0003136237
-
Efficient and effective clustering method for spatial data mining
-
Santiago, Chile, September
-
R. Ng and J. Han, "Efficient and effective clustering method for spatial data mining," Proc. 1994 Int'l Conf. On VLDB, pp. 144-155, Santiago, Chile, September 1994.
-
(1994)
Proc. 1994 Int'l Conf. on VLDB
, pp. 144-155
-
-
Ng, R.1
Han, J.2
-
6
-
-
0345389037
-
Data mining for network intrusion detection: How to get started
-
August
-
Eric Bloedorn, Alan D. Christiansen, William Hill, Clement Skorupka, Lisa M. Talbot, and Jonathan Tivel, "Data mining for network intrusion detection: How to get started," MITRE Technical Report, August 2001.
-
(2001)
MITRE Technical Report
-
-
Bloedorn, E.1
Christiansen, A.D.2
Hill, W.3
Skorupka, C.4
Talbot, L.M.5
Tivel, J.6
-
7
-
-
0039845384
-
Efficient algorithms for mining outliers from large data sets
-
Dallas, TX
-
Ramaswarny, S., R. Rastogi, and K. Shim, "Efficient Algorithms for Mining Outliers from Large Data Sets," Proceedings of the ACM Sigmod 2000 Int. Conference on Management of Data, Dallas, TX, 2000.
-
(2000)
Proceedings of the ACM Sigmod 2000 Int. Conference on Management of Data
-
-
Ramaswarny, S.1
Rastogi, R.2
Shim, K.3
-
8
-
-
0039253819
-
LOF: Identifying density-based local outliers
-
Dallas, TX
-
Breunig, M. M., H. P. Kriegel, R. T. Ng, and J. Sander, "LOF: Identifying Density-Based Local Outliers," Proc. of the ACM Sigmod 2000 Intl. Conference On Management of Data, Dallas, TX., 2000.
-
(2000)
Proc. of the ACM Sigmod 2000 Intl. Conference on Management of Data
-
-
Breunig, M.M.1
Kriegel, H.P.2
Ng, R.T.3
Sander, J.4
-
9
-
-
0002948319
-
Algorithms for mining distance-based outliers in large datasets
-
Aug 24-27, 1998, New York City, NY
-
E. M. Knorr and R. T. Ng, "Algorithms for Mining Distance-Based Outliers in Large Datasets," VLDB'98, Proceedings of the 24th Int. Conference on Very Large Databases, Aug 24-27, 1998, New York City, NY, pp. 392-403, 1998.
-
(1998)
VLDB'98, Proceedings of the 24th Int. Conference on Very Large Databases
, pp. 392-403
-
-
Knorr, E.M.1
Ng, R.T.2
-
10
-
-
0023294428
-
An intrusion-detection model
-
February
-
D. E. Denning, "An intrusion-detection model," IEEE, Transactions on Software Engineering, 13(2):222-232, February 1987.
-
(1987)
IEEE, Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
11
-
-
0242456797
-
ADMIT: Anomaly-based data mining for intrusions
-
Karlton Sequeira and Mohammed Zaki, "ADMIT: Anomaly-based data mining for intrusions," KDD 2002, pp. 386-395, 2002.
-
(2002)
KDD 2002
, pp. 386-395
-
-
Sequeira, K.1
Zaki, M.2
|