-
2
-
-
2642545485
-
Detecting malicious software by monitoring anomalous windows registry accesses
-
Zurich, Switzerland, Oct.
-
APAP, P., ANDREW HONIG, A., SHLOMO HERSHKOP, S., ELEAZAR ESKIN, E., AND STOLFO, S. J. 2002. Detecting malicious software by monitoring anomalous windows registry accesses. In Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002, Zurich, Switzerland, Oct.). 16-18.
-
(2002)
Proceedings of the Fifth International Symposium on Recent Advances in Intrusion Detection (RAID-2002)
, pp. 16-18
-
-
Apap, P.1
Andrew Honig, A.2
Shlomo Hershkop, S.3
Eleazar Eskin, E.4
Stolfo, S.J.5
-
3
-
-
0242624600
-
MET: An experimental system for malicious email tracking
-
Virginia Beach, VA, Sept.
-
BHATTACHARYYA, M., HERSHKOP, S., ESKIN, E., AND STOLFO, S. J. 2002. MET: An experimental system for malicious email tracking. In Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002), Virginia Beach, VA, Sept.).
-
(2002)
Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002)
-
-
Bhattacharyya, M.1
Hershkop, S.2
Eskin, E.3
Stolfo, S.J.4
-
4
-
-
0035789678
-
The DGX distribution for mining massive, skewed data
-
BI, Z., FALOUSTOS, C., AND KORN, F. 2001. The DGX distribution for mining massive, skewed data. In Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 17-26.
-
(2001)
Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 17-26
-
-
Bi, Z.1
Faloustos, C.2
Korn, F.3
-
5
-
-
84976668743
-
Finding all cliques of an undirected graph
-
BRON, C. AND KERBOSCH, J. 1973. Finding all cliques of an undirected graph. Commun. ACM 16, 9, 575-577.
-
(1973)
Commun. ACM
, vol.16
, Issue.9
, pp. 575-577
-
-
Bron, C.1
Kerbosch, J.2
-
6
-
-
0028911698
-
Gauging similarity with n-grams: Language independent categorization of text
-
DAMASHEK, M. 1995. Gauging similarity with n-grams: Language independent categorization of text. In Science, 267, 843-848.
-
(1995)
Science
, vol.267
, pp. 843-848
-
-
Damashek, M.1
-
7
-
-
33747099074
-
Finding friends and enemies through the analysis of clique dynamics
-
Computer Science Department, Columbia University, New York, NY
-
DAVIS, P. T. 2003. Finding friends and enemies through the analysis of clique dynamics. Tech. rep., Computer Science Department, Columbia University, New York, NY.
-
(2003)
Tech. Rep.
-
-
Davis, P.T.1
-
8
-
-
0023294428
-
An intrusion-detection model
-
DENNING, D. E. 1987. An intrusion-detection model. IEEE Trans. Softw. Eng., SE-13, 222-232.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.SE-13
, pp. 222-232
-
-
Denning, D.E.1
-
10
-
-
4143149628
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
(Jajodia, Barbara, Eds.), Kluwer, Norwell, MA
-
ESKIN, E., ARNOLD, A., PRERAU, M., PORTNOY, L., AND STOLFO, S. J. 2002. A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. Data Mining for Security Applications.(Jajodia, Barbara, Eds.), Kluwer, Norwell, MA.
-
(2002)
Data Mining for Security Applications
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.J.5
-
12
-
-
2642573975
-
Host-based anomaly detection by wrapping file system accesses
-
Columbia University, New York, NY
-
HERSHKOP, S., FERSTER, R., BUI, L. H., WANG, K., AND STOLFO, S. J. 2003. Host-based anomaly detection by wrapping file system accesses. Tech. rep. Columbia University, New York, NY. Go online to http://www.cs.columbia.edu/ids/ publications/.
-
(2003)
Tech. Rep.
-
-
Hershkop, S.1
Ferster, R.2
Bui, L.H.3
Wang, K.4
Stolfo, S.J.5
-
13
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
HOFMEYR, S. A., FORREST, S., AND SOMAYAJI, A. 1998. Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151-180.
-
(1998)
J. Comput. Secur.
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
14
-
-
0003808669
-
-
Prentice Hall, Englewood Cliffs, N.J.
-
HOGG, R. V. AND CRAIG, A. T. 1994. Introduction to Mathematical Statistics, Prentice Hall, Englewood Cliffs, N.J., 293-301.
-
(1994)
Introduction to Mathematical Statistics
, pp. 293-301
-
-
Hogg, R.V.1
Craig, A.T.2
-
15
-
-
0004118981
-
The NIDES Statistical Component: Description and Justification
-
SRI International, Menlo Park, CA
-
JAVITZ, H. S. AND VALDES, A. 1993. The NIDES Statistical Component: Description and Justification. Tech. rep. SRI International, Menlo Park, CA.
-
(1993)
Tech. Rep.
-
-
Javitz, H.S.1
Valdes, A.2
-
18
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
LANE, T. AND BRODLEY, C. E. 1999. Temporal sequence learning and data reduction for anomaly detection. ACM Trans. Inform. Syst. Secur., 2, 295-331.
-
(1999)
ACM Trans. Inform. Syst. Secur.
, vol.2
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
19
-
-
1642397470
-
A framework for constructing features and models for intrusion detection systems
-
and Proceedings of the 8th ACM SICKDD International Conference on Knowledge Discovery and Data Mining
-
LEE, W. AND STOLFO, S. 1999. A framework for constructing features and models for intrusion detection systems. In Proceedings of the 1999 IEEE Symposium on Computer Security and Privacy and Proceedings of the 8th ACM SICKDD International Conference on Knowledge Discovery and Data Mining.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Computer Security and Privacy
-
-
Lee, W.1
Stolfo, S.2
-
21
-
-
85141038051
-
Mining audit data to build intrusion detection models
-
New York, NY, Aug.
-
LEE, W., STOLFO, S., AND MOK, K. 1998. Mining audit data to build intrusion detection models. In Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (KDD '98), New York, NY, Aug.)
-
(1998)
Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (KDD '98)
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
24
-
-
0344008570
-
Detecting novel attacks by identifying anomalous network packet headers
-
Florida Institute of Technology, Melbourne, FL. CS-2001-2
-
MAHONEY, M. V. AND CHAN, P. K. 2001. Detecting novel attacks by identifying anomalous network packet headers. Tech. rep. Florida Institute of Technology, Melbourne, FL. CS-2001-2.
-
(2001)
Tech. Rep.
-
-
Mahoney, M.V.1
Chan, P.K.2
-
25
-
-
0004255908
-
-
McGraw-Hill, New York, NY
-
MITCHELL, T. M. 1997. Machine Learning, McGraw-Hill, New York, NY, 180-183.
-
(1997)
Machine Learning
, pp. 180-183
-
-
Mitchell, T.M.1
-
26
-
-
84858941597
-
-
MYSQL. 2002. Go online to www.mysql.org.
-
(2002)
-
-
-
27
-
-
37649029105
-
Email networks and the spread of computer viruses
-
NEWMAN, M. E., FORREST, S., AND BALTHRUP, J. 2002. Email networks and the spread of computer viruses. Phys. Rev. E 66, 3 (Sept.).
-
(2002)
Phys. Rev. E
, vol.66
, Issue.3 SEPT.
-
-
Newman, M.E.1
Forrest, S.2
Balthrup, J.3
-
28
-
-
0027166611
-
The QBIC project: Querying images by content using color, texture, and shape
-
NIBLACK, W., ET AL. 1993. The QBIC project: Querying images by content using color, texture, and shape. In Proceedings of the SPIE (Feb.).
-
(1993)
Proceedings of the SPIE
, Issue.FEB.
-
-
Niblack, W.1
-
29
-
-
0012282403
-
Computer intrusion detecting masquerades
-
SCHONLAU, M., DUMOUCHEL, W., JU, W., KARR, A. F., THEUS, M., AND VARDI, Y. 2001. Computer intrusion detecting masquerades. Statist. Sci. 16, 1, 1-17.
-
(2001)
Statist. Sci.
, vol.16
, Issue.1
, pp. 1-17
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
30
-
-
15944375379
-
Malicious email filter - A UNIX mail filter that detects malicious windows executables
-
Boston, MA
-
SCHULTZ, M. G., ESKIN, E., AND STOLFO, S. J. 2001. Malicious email filter - A UNIX mail filter that detects malicious windows executables. In Proceedings of USENIX Annual Technical Conference-FREENIX Track (Boston, MA).
-
(2001)
Proceedings of USENIX Annual Technical Conference-FREENIX Track
-
-
Schultz, M.G.1
Eskin, E.2
Stolfo, S.J.3
-
32
-
-
10244223943
-
Behavior profiling of email
-
Tucson, AZ
-
STOLFO, S. J., HERSHKOP, S., WANG, K., NIMESKERN, D., AND HU, C.-W. 2003. Behavior profiling of email. In Proceedings of the 1st NSF/NIJ Symposium on Intelligence & Security Informatics (ISI 2003, Tucson, AZ).
-
(2003)
Proceedings of the 1st NSF/NIJ Symposium on Intelligence & Security Informatics (ISI 2003)
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, D.4
Hu, C.-W.5
-
33
-
-
0033336136
-
Distributed data mining in credit card fraud detection
-
STOLFO, S. J., CHAN, P., AND PRODROMIDIS, A. 1999. Distributed data mining in credit card fraud detection, IEEE Intell. Syst. 14, 6, 67-74.
-
(1999)
IEEE Intell. Syst.
, vol.14
, Issue.6
, pp. 67-74
-
-
Stolfo, S.J.1
Chan, P.2
Prodromidis, A.3
-
34
-
-
0036085540
-
Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
-
IEEE Computer Society Press, Los Alamitos, CA
-
TAN, K. M. C. AND MAXION, R. A. 2002. Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA, 188-201.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 188-201
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
39
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
Las Vegas, NV
-
WILLIAMSON, M. M. 2002. Throttling viruses: Restricting propagation to defeat malicious mobile code. In Proceedings of the ACSAC Security Conference (Las Vegas, NV).
-
(2002)
Proceedings of the ACSAC Security Conference
-
-
Williamson, M.M.1
|