-
1
-
-
85032752222
-
Recent developments in the core of digital signal processing
-
Atlas L, Duhamel P. Recent developments in the core of digital signal processing. IEEE Signal Processing Magazine 1999; 16(1):16-31.
-
(1999)
IEEE Signal Processing Magazine
, vol.16
, Issue.1
, pp. 16-31
-
-
Atlas, L.1
Duhamel, P.2
-
2
-
-
0032357694
-
Signal detection in underwater sound using wavelets
-
Bailey TC, Sapatinas T, Powell KJ, Krzanowski WJ. Signal detection in underwater sound using wavelets. Journal of the American Statistical Association 1998;93(441):73-83.
-
(1998)
Journal of the American Statistical Association
, vol.93
, Issue.441
, pp. 73-83
-
-
Bailey, T.C.1
Sapatinas, T.2
Powell, K.J.3
Krzanowski, W.J.4
-
3
-
-
0042326427
-
A real-time earthquake detector with prefiltering by wavelets
-
Botella F, Rosa-Herranz J, Giner JJ, Molina S, Galiana-Merino JJ. A real-time earthquake detector with prefiltering by wavelets. Computers & Geosciences 2003;29(7):911-919.
-
(2003)
Computers & Geosciences
, vol.29
, Issue.7
, pp. 911-919
-
-
Botella, F.1
Rosa-Herranz, J.2
Giner, J.J.3
Molina, S.4
Galiana-Merino, J.J.5
-
5
-
-
0142095474
-
Using artificial anomalies to detect unknown and known network intrusions
-
San Jose, CA
-
Fan W, Miller M, Stolfo S, Lee W, Chan P. Using artificial anomalies to detect unknown and known network intrusions. In: Proceedings of The First IEEE International Conference on Data Mining. San Jose, CA, 2001.
-
(2001)
Proceedings of the First IEEE International Conference on Data Mining
-
-
Fan, W.1
Miller, M.2
Stolfo, S.3
Lee, W.4
Chan, P.5
-
12
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
August
-
Lane T, Brodley C. Temporal sequence learning and data reduction for anomaly detection. ACM Transactions on Information and System Security August 1999;2(3):295-331.
-
(1999)
ACM Transactions on Information and System Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.2
-
13
-
-
84964411176
-
Real time data mining-based intrusion detection
-
Anaheim, CA
-
Lee W, Stolfo S, Chan P, Eskin E, Fan W, Miller M, Hershkop S, Zhang J. Real time data mining-based intrusion detection. In: Proceedings of the 2001 DARPA Information Survivability Conference and Exposition (DISCEX11). Anaheim, CA, 2001.
-
(2001)
Proceedings of the 2001 DARPA Information Survivability Conference and Exposition (DISCEX11)
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
15
-
-
0034455983
-
Adaptive intrusion detection: A data mining approach
-
Kluwer Academic Publishers, December
-
Lee W, Stolfo S, Mok K. Adaptive intrusion detection: A data mining approach, In: Artificial Intelligence Review. Kluwer Academic Publishers, December 2000;14(6):533-567.
-
(2000)
Artificial Intelligence Review
, vol.14
, Issue.6
, pp. 533-567
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
17
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W, Stolfo S. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 2000;3(4).
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
-
-
Lee, W.1
Stolfo, S.2
-
18
-
-
0003111439
-
Automated audit trail analysis and intrusion detection: A survey
-
Baltimore, MD
-
Lunt T. Automated audit trail analysis and intrusion detection: A survey. In: 14th National Computer Security Conference (NCSC), Baltimore, MD, 1988.
-
(1988)
14th National Computer Security Conference (NCSC)
-
-
Lunt, T.1
-
20
-
-
0345302842
-
-
Upper Saddle River, New Jersey, Prentice Hall PTR
-
Skoudis E. Counter Hack. Upper Saddle River, New Jersey, Prentice Hall PTR, 2002.
-
(2002)
Counter Hack
-
-
Skoudis, E.1
-
21
-
-
62349108537
-
A stateful intrusion detection system for world-wide web servers
-
Las Vegas, NV
-
Vigna G, Robertson W, Kher V, Kemmerer RA. A stateful intrusion detection system for world-wide web servers. In: Proceedings of the Annual Computer Security Applications Conference (ACSAC). Las Vegas, NV, 2003;34-43.
-
(2003)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 34-43
-
-
Vigna, G.1
Robertson, W.2
Kher, V.3
Kemmerer, R.A.4
-
23
-
-
0036298895
-
QoS-centric stateful resource management in information systems
-
Ye N. QoS-centric stateful resource management in information systems. Information Systems Frontiers 2002;4(2): 149-160.
-
(2002)
Information Systems Frontiers
, vol.4
, Issue.2
, pp. 149-160
-
-
Ye, N.1
-
24
-
-
10044229782
-
-
Ye N. (ed.). Mahwah, New Jersey: Lawrence Erlbaum Associates
-
Ye N. (ed.). The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003.
-
(2003)
The Handbook of Data Mining
-
-
-
25
-
-
24944461970
-
Mining computer and network security data
-
Ye N. eds. Mahwah, New Jersey: Lawrence Erlbaum Associates
-
Ye N. Mining computer and network security data. In: Ye N. eds., The Handbook of Data Mining. Mahwah, New Jersey: Lawrence Erlbaum Associates, 2003;617-636.
-
(2003)
The Handbook of Data Mining
, pp. 617-636
-
-
Ye, N.1
-
26
-
-
33745918703
-
Attack profiles to derive data observations, features, and characteristics of cyber attacks
-
Ye N, Bashettihalli H, Parley T. "Attack profiles to derive data observations, features, and characteristics of cyber attacks." Information, Knowledge, Systems Management 2005-2006;5(1):23-47.
-
(2005)
Information, Knowledge, Systems Management
, vol.5
, Issue.1
, pp. 23-47
-
-
Ye, N.1
Bashettihalli, H.2
Parley, T.3
-
27
-
-
0037333205
-
Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
-
Ye N. Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability 2003;52(1):73-82.
-
(2003)
IEEE Transactions on Reliability
, vol.52
, Issue.1
, pp. 73-82
-
-
Ye, N.1
Chen, Q.2
-
28
-
-
0037333205
-
Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
-
Ye N, Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability 2003:52(1):73-82.
-
(2003)
IEEE Transactions on Reliability
, vol.52
, Issue.1
, pp. 73-82
-
-
Ye, N.1
Chen, Q.2
-
29
-
-
84888854404
-
Extraction and detection of signal features and characteristics in the physical space: Towards signal detection in the Cyberspace
-
in review
-
Ye N, Jearkpaporn D, Lakshminarasimhan DK. Extraction and detection of signal features and characteristics in the physical space: Towards signal detection in the Cyberspace. Proceedings of the IEEE, (in review).
-
Proceedings of the IEEE
-
-
Ye, N.1
Jearkpaporn, D.2
Lakshminarasimhan, D.K.3
-
30
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
Ye N, Li X, Chen Q, Emran SM, Xu M. Probabilistic techniques for intrusion detection based on computer audit data. IEEE Transactions on Systems, Man, and Cybernetics 2001;31(4):266-274.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
31
-
-
84888848066
-
Correlations of activity, state and performance data on computers and networks in attack and normal conditions
-
in review
-
Ye N. Napatkamon A, Farley T. Correlations of activity, state and performance data on computers and networks in attack and normal conditions. IEEE Transactions on Dependable and Secure Computing (in review).
-
IEEE Transactions on Dependable and Secure Computing
-
-
Ye, N.1
Napatkamon, A.2
Farley, T.3
|