-
1
-
-
85149612939
-
Fast effective rule induction
-
Lake Tahoe, CA, Morgan Kaufman Publisher, S.F.
-
W. Cohen, "Fast Effective Rule Induction", Proc. of the 12th International Conf. on Machine Learning, Lake Tahoe, CA, Morgan Kaufman Publisher, S.F.1995.
-
(1995)
Proc. of the 12th International Conf. on Machine Learning
-
-
Cohen, W.1
-
2
-
-
4243137229
-
Cyber defense technology: Networking and evaluation
-
March
-
DETER and EMIST Projects, "Cyber Defense Technology: Networking and Evaluation", Communications of The ACM, March 2004, pp. 58 - 61.
-
(2004)
Communications of the ACM
, pp. 58-61
-
-
-
3
-
-
2142716837
-
-
J. L. Hennessy, D. A., Patterson, and H. S. Lin, Editors, National Academies Press
-
J. L. Hennessy, D. A., Patterson, and H. S. Lin, Editors, Information Technology for Counterterrorism: Immediate Actions and Future Possibilities, National Academies Press, 2003.
-
(2003)
Information Technology for Counterterrorism: Immediate Actions and Future Possibilities
-
-
-
4
-
-
38949133378
-
GridSec: Grid security enforcement with trust integration over minimal VPN tunnels
-
submitted July
-
K. Hwang, S. Song, and J. Lv, "GridSec: Grid Security Enforcement with Trust Integration over Minimal VPN Tunnels", IEEE Computer, submitted July, 2004.
-
(2004)
IEEE Computer
-
-
Hwang, K.1
Song, S.2
Lv, J.3
-
7
-
-
12244285117
-
A comparative study of anomaly detection schemes in network intrusion detection
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", Third SIAM Conf. on Data Mining, S.F., 2003.
-
(2003)
Third SIAM Conf. on Data Mining, S.F.
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
8
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
(TISSec)
-
W. Lee and S. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems", ACM Trans. Inf. and System Security (TISSec), 2000.
-
(2000)
ACM Trans. Inf. and System Security
-
-
Lee, W.1
Stolfo, S.2
-
9
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln lab evaluation data for network anomaly detection
-
Sept.
-
M. V. Mahoney and P. K. Chan. "An Analysis of the 1999 DARPA/ Lincoln Lab Evaluation Data for Network Anomaly Detection", Proc. of Int'l Symp. Recent Advances in Intrusion Detection, Sept. 2003.pp. 220-237.
-
(2003)
Proc. of Int'l Symp. Recent Advances in Intrusion Detection
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
11
-
-
0038282217
-
Modern intrusion detection, data mining, and degrees of attack guilt
-
Barbarà and Jajodia, eds. Kluwer Publishers, Boston
-
S. Noel, D. Wijesekera, and C. Youman, "Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt", in Applications of Data Mining in Computer Security, Barbarà and Jajodia, eds. Kluwer Publishers, Boston, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Noel, S.1
Wijesekera, D.2
Youman, C.3
-
12
-
-
85084164413
-
Bro: A system for detecting network intrusions in real time
-
San Antonio, TX.
-
V. Paxson, " Bro: A System for Detecting Network Intrusions in Real Time", Proc. of the Seventh USENIX Security Symposium, San Antonio, TX. 1998.
-
(1998)
Proc. of the Seventh USENIX Security Symposium
-
-
Paxson, V.1
-
13
-
-
33847748360
-
Frequent episode rules for internet traffic analysis and anomaly detection
-
Cambridge, MA. September
-
M. Qin and K. Hwang. "Frequent Episode Rules for Internet Traffic Analysis and Anomaly Detection", Proc. of IEEE Network Computing and Applications, (NCA2004), Cambridge, MA. September 2004.
-
(2004)
Proc. of IEEE Network Computing and Applications, (NCA2004)
-
-
Qin, M.1
Hwang, K.2
-
14
-
-
0034499251
-
Adaptation techniques for intrusion detection and response systems
-
Nashville, TN., Oct. 8-11
-
D. J. Ragsdale, C.A. Carver, J. Humphries, and U. Pooch, "Adaptation Techniques for Intrusion Detection and Response Systems", Proc. of the IEEE Int'l Conf. on Systems, Man, and Cybernetics, Nashville, TN., Oct. 8-11, 2000, pp. 2344-2349.
-
(2000)
Proc. of the IEEE Int'l Conf. on Systems, Man, and Cybernetics
, pp. 2344-2349
-
-
Ragsdale, D.J.1
Carver, C.A.2
Humphries, J.3
Pooch, U.4
-
16
-
-
33746321180
-
Hawk: Halting anomaly with weighted choking to rescue well-behaved TCP sessions from shrew DoS attacks
-
submitted October 5
-
R. Tripathi, Y. K. Kwok, and K. Hwang, "Hawk: Halting Anomaly with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DoS Attacks", IEEE Int'l Conference on Distributed Computing Systems, (ICDCS-2005), submitted October 5, 2004.
-
(2004)
IEEE Int'l Conference on Distributed Computing Systems, (ICDCS-2005)
-
-
Tripathi, R.1
Kwok, Y.K.2
Hwang, K.3
|