-
1
-
-
0345302842
-
-
Chinese source. Beijing: China Machine Press
-
Skoudies. Counter Hack. Beijing: China Machine Press, 2002 (in Chinese)
-
(2002)
Counter Hack
-
-
Skoudies1
-
2
-
-
33746567240
-
-
CERT/CC Coordination Center. Trends in Denial of Service Attack Technology
-
CERT/CC Coordination Center. Trends in Denial of Service Attack Technology. October 2001
-
(2001)
-
-
-
3
-
-
1642375563
-
Adaptive model generation: An architecture for the deployment of data miningbased intrusion detection systems
-
Kluwer
-
Honig A., Howard A., Eskin E., Stolfo S.. Adaptive model generation: An architecture for the deployment of data miningbased intrusion detection systems. Data Mining for Security Applications, Kluwer, 2002
-
(2002)
Data Mining for Security Applications
-
-
Honig, A.1
Howard, A.2
Eskin, E.3
Stolfo, S.4
-
5
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA
-
Portnoy L., Eskin E., Stolfo S. J.. Intrusion detection with unlabeled data using clustering. In: Proceedings of the ACM CSS Workshop on Data Mining Applied to Security (DMSA, 2001), Philadelphia, PA, 2001
-
(2001)
Proceedings of the ACM CSS Workshop on Data Mining Applied to Security (DMSA, 2001)
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.J.3
-
6
-
-
33746558025
-
Detection and summarization of novel network attacks using data mining
-
Technical Report
-
Ertoz L., Eilertson E., Lazarevic A., Tan P., Dokas P., Srivastava J., Kumar. Detection and summarization of novel network attacks using data mining. Technical Report, 2003
-
(2003)
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.4
Dokas, P.5
Srivastava, J.6
Kumar7
-
7
-
-
33746531087
-
-
The 1999 DARPA Intrusion Detection Evaluation Data set, Information Systems Technology Group of MIT Lincoln Laboratory
-
The 1999 DARPA Intrusion Detection Evaluation Data set, Information Systems Technology Group of MIT Lincoln Laboratory, http://www.ll.mit.edu/IST/ideval/data/data_index.html
-
-
-
-
9
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
Workshop on Information Assurance and Security
-
Barbara D.. ADAM: Detecting intrusions by data mining. In: Proceedings of the 2001 IEEE. Workshop on Information Assurance and Security, 2001
-
(2001)
Proceedings of the 2001 IEEE
-
-
Barbara, D.1
-
10
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
Staniford S., Hoagland J., McAlerney J.. Practical automated detection of stealthy portscans. Journal of Computer Security, 2002, 10 (1/2): 105-136
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
-
11
-
-
18144414087
-
Detecting distributed denial of service attacks using source ip address monitoring, draft
-
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao. Detecting distributed denial of service attacks using source ip address monitoring, draft, 2002
-
(2002)
-
-
Tao, P.1
Leckie, C.2
Ramamohanarao, K.3
-
12
-
-
33244458508
-
Data mining methods for network intrusion detection
-
Technique Report, UC davis
-
Brugger S. T.. Data mining methods for network intrusion detection. Technique Report, UC davis, 2004
-
(2004)
-
-
Brugger, S.T.1
-
13
-
-
33746477455
-
The apriori program source code
-
Christian Borgelt. The apriori program source code. http://fuzzy.cs.uni-magdeburg.de/-borgelt/, 2002
-
(2002)
-
-
Borgelt, C.1
-
14
-
-
12244285117
-
A comparative study of anomaly detection schemes in network intrusion detection
-
San Francisco
-
Lazarevic A., Ertoz L., Ozgur A., Srivastava J., Kumar V.. A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the 3rd SIAM Conference on Data Mining, San Francisco, 2003
-
(2003)
Proceedings of the 3rd SIAM Conference on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Ozgur, A.3
Srivastava, J.4
Kumar, V.5
|