-
1
-
-
24944445620
-
An ontological approach to the document access problem of insider threat
-
Aleman-Meza, B., Burns, P., Eavenson, M., Palaniswami, D., and Sheth, A., An ontological approach to the document access problem of insider threat, In Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI-05), pp. 486-491, 2005.
-
(2005)
Proceedings of IEEE International Conference on Intelligence and Security Informatics (ISI-05)
, pp. 486-491
-
-
Aleman-Meza, B.1
Burns, P.2
Eavenson, M.3
Palaniswami, D.4
Sheth, A.5
-
4
-
-
26944454497
-
ROC graphs: Notes and practical considerations for researchers
-
HP Lab Palo Alto
-
Fawcett, T., ROC graphs: Notes and practical considerations for researchers, HP Lab Palo Alto, HPL-2003-4, 2003.
-
(2003)
HPL-2003-4
-
-
Fawcett, T.1
-
6
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection
-
Lee, W., Miller, M., Stolfo, S., Jallad, K., Park, C., Zadok, E., and Prabhakar, V., Toward cost-sensitive modeling for intrusion detection, ACM Journal of Computer Society, Vol. 10, No. 1-2, pp. 5-22, 2002.
-
(2002)
ACM Journal of Computer Society
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Miller, M.2
Stolfo, S.3
Jallad, K.4
Park, C.5
Zadok, E.6
Prabhakar, V.7
-
8
-
-
0029206376
-
A comparison of classifiers and document representations for the routing problem
-
Schutze, H., Hull, D.A., and Pedersen, J.O., A comparison of classifiers and document representations for the routing problem, In Proceedings of International ACM Conference on Research and Development in Information Retrieval (SIGIR-95), pp. 229-237, 1995.
-
(1995)
Proceedings of International ACM Conference on Research and Development in Information Retrieval (SIGIR-95)
, pp. 229-237
-
-
Schutze, H.1
Hull, D.A.2
Pedersen, J.O.3
-
9
-
-
33745911713
-
A multi-agent system for enforcing Need-To-Know security policies
-
Seo, Y.-W., Giampapa, J., and Sycara, K., A multi-agent system for enforcing Need-To-Know security policies, In Proceedings of International Conference on Autonomous Agents and Multi Agent Systems (AAMAS) Workshop on Agent Oriented Information Systems (AOIS-04), pp. 163-179, 2004.
-
(2004)
Proceedings of International Conference on Autonomous Agents and Multi Agent Systems (AAMAS) Workshop on Agent Oriented Information Systems (AOIS-04)
, pp. 163-179
-
-
Seo, Y.-W.1
Giampapa, J.2
Sycara, K.3
-
10
-
-
34047205369
-
Semantic analysis for monitoring insider threats
-
Symonenko, S., Liddy, E.D., Yilmazel, O., Semantic analysis for monitoring insider threats, In Proceedings of Symposium on Intelligence and Security Informatics, 2004.
-
(2004)
Proceedings of Symposium on Intelligence and Security Informatics
-
-
Symonenko, S.1
Liddy, E.D.2
Yilmazel, O.3
-
11
-
-
3242667793
-
Linear discriminant analysis in document classification
-
Torkkola, T., Linear discriminant analysis in document classification, In IEEE Workshop on TextMining, 2001.
-
(2001)
IEEE Workshop on TextMining
-
-
Torkkola, T.1
-
13
-
-
33745885436
-
A simple method for cost-sensitive learning
-
Zadrozny, B., Langford, J., and Abe, N., A simple method for cost-sensitive learning, IBM Tech Report, 2002.
-
(2002)
IBM Tech Report
-
-
Zadrozny, B.1
Langford, J.2
Abe, N.3
|