-
3
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
Andrew P. Bradley. The Use of the Area Under the ROC Curve in the Evaluation of Machine Learning Algorithms. Pattern Recognition, Volume 30(7): 1145-1159, 1997.
-
(1997)
Pattern Recognition
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.P.1
-
6
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
William DuMouchel, Wen Hua Ju, Alan F. Karr, Matthius Schonlau, Martin Theus, and Yehuda Vardi. Computer Intrusion: Detecting Masquerades. Statistical Science, 16(1):1-17, 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 1-17
-
-
DuMouchel, W.1
Ju, W.H.2
Karr, A.F.3
Schonlau, M.4
Theus, M.5
Vardi, Y.6
-
7
-
-
84899149437
-
A fast computer intrusion detection algorithm based on hypothesis testing of command transition probabilities
-
August
-
William DuMouchel and Matthius Schonlau. A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities, pages 189-193. The Fourth International Conference of Knowledge Discovery and Data Mining, August 1998.
-
(1998)
The Fourth International Conference of Knowledge Discovery and Data Mining
, pp. 189-193
-
-
DuMouchel, W.1
Schonlau, M.2
-
8
-
-
0041952823
-
A comparison of test statistics for computer intrusion detection based on principal components regression of transition probabilities
-
William DuMouchel and Matthius Schonlau. A Comparison of Test Statistics for Computer Intrusion Detection Based on Principal Components Regression of Transition Probabilities, pages 404-413. Proceedings of the 30th Symposium on the Interface: Computing Science and Statistics, 1999.
-
(1999)
Proceedings of the 30th Symposium on the Interface: Computing Science and Statistics
, pp. 404-413
-
-
DuMouchel, W.1
Schonlau, M.2
-
9
-
-
33750100046
-
Computer intrusion detection through predictive models
-
St. Louis, Missouri, November
-
Paul F. Evangelista, Mark J. Embrechts. and Boleslaw K. Szymanski. Computer Intrusion Detection Through Predictive Models. St. Louis, Missouri, November 2004. Smart Engineering System Design: Neural Networks. Fuzzy Logic, Evolutionary Programming, Data Mining and Complex Systems.
-
(2004)
Smart Engineering System Design: Neural Networks. Fuzzy Logic, Evolutionary Programming, Data Mining and Complex Systems
-
-
Evangelista, P.F.1
Embrechts, M.J.2
Szymanski, B.K.3
-
10
-
-
0345438685
-
ROC graphs: Notes and practical considerations for data mining researchers
-
Palo Alto, CA, Hewlett Packard
-
Tom Fawcett. ROC Graphs: Notes and Practical Considerations for Data Mining Researchers. Palo Alto, CA, 2003. Technical Report HPL-2003-4, Hewlett Packard.
-
(2003)
Technical Report
, vol.HPL-2003-4
-
-
Fawcett, T.1
-
11
-
-
0020083498
-
The meaning and use of the area under the receiver operating characteristic curve
-
James A. Hanley and Barbara J. McNeil. The Meaning and Use of the Area Under the Receiver Operating Characteristic Curve. Radiology, 143(1):29-36, 1982.
-
(1982)
Radiology
, vol.143
, Issue.1
, pp. 29-36
-
-
Hanley, J.A.1
McNeil, B.J.2
-
14
-
-
0346076780
-
'Fuzzy' vs. 'Non-fuzzy' in combining classifiers designed by boosting
-
Ludmila I. Kuncheva. 'Fuzzy' vs. 'Non-fuzzy' in Combining Classifiers Designed by Boosting. IEEE Transactions on Fuzzy Systems, 11(3):729-741, 2003.
-
(2003)
IEEE Transactions on Fuzzy Systems
, vol.11
, Issue.3
, pp. 729-741
-
-
Kuncheva, L.I.1
-
17
-
-
0037403516
-
Measures of diversity in classifier ensembles
-
Ludmila I. Kuncheva and C.J. Whitaker. Measures of Diversity in Classifier Ensembles. Machine Learning, 51:181-207, 2003.
-
(2003)
Machine Learning
, vol.51
, pp. 181-207
-
-
Kuncheva, L.I.1
Whitaker, C.J.2
-
18
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Wenke Lee and Salvatore J. Stolfo. A Framework for Constructing Features and Models for Intrusion Detection Systems. ACM Transactions on Information and System Security (TISSEC), 3(4):227-261, 2000.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
20
-
-
0141682928
-
Time-series novelty detection using one-class support vector machines
-
Portland, Oregon, July
-
Junshui Ma and Simon Perkins. Time-series Novelty Detection Using One-class Support Vector Machines. Portland, Oregon, July 2003. International Joint Conference on Neural Networks.
-
(2003)
International Joint Conference on Neural Networks
-
-
Junshui, M.1
Perkins, S.2
-
21
-
-
0036630603
-
Areas beneath the Relative Operating Characteristics (ROC) and relative operating levels (ROC) curves: Statistical Significance and interpretation
-
S.J. Mason and N.E. Graham. Areas Beneath the Relative Operating Characteristics (ROC) and relative operating levels (ROC) curves: Statistical Significance and Interpretation. Quarterly Journal of the Royal Meteorological Society, 128:2145-2166, 2002.
-
(2002)
Quarterly Journal of the Royal Meteorological Society
, vol.128
, pp. 2145-2166
-
-
Mason, S.J.1
Graham, N.E.2
-
26
-
-
0000487102
-
Estimating the support of a high dimensional distribution
-
Bernhard Scholkopf. John C. Platt, John Shawe Taylor, Alex J. Smola, and Robert C. Williamson. Estimating the Support of a High Dimensional Distribution. Neural Computation, 13:1443-1471, 2001.
-
(2001)
Neural Computation
, vol.13
, pp. 1443-1471
-
-
Scholkopf, B.1
Platt, J.C.2
Taylor, J.S.3
Smola, A.J.4
Williamson, R.C.5
-
28
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
Matthius Schonlau and Martin Theus. Detecting Masquerades in Intrusion Detection Based on Unpopular Commands. Information Processing Letters, 76(1-2):33-38, 2000.
-
(2000)
Information Processing Letters
, vol.76
, Issue.1-2
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
31
-
-
0041965980
-
Cluster ensembles - A knowledge reuse framework for combining multiple partitions
-
December
-
Alexander Strehl and Joydeep Ghosh. Cluster Ensembles - A Knowledge Reuse Framework for Combining Multiple Partitions. Journal of Machine Learning Research, 3:583-617, December 2002.
-
(2002)
Journal of Machine Learning Research
, vol.3
, pp. 583-617
-
-
Strehl, A.1
Ghosh, J.2
-
32
-
-
15944400613
-
Recursive data mining for masquerade detection and author identification
-
West Point, NY, 9-11 June
-
Boleslaw K. Szymanski and Yongqiang Zhang. Recursive Data Mining for Masquerade Detection and Author Identification. West Point, NY, 9-11 June 2004. 3rd Annual IEEE Information Assurance Workshop.
-
(2004)
3rd Annual IEEE Information Assurance Workshop
-
-
Szymanski, B.K.1
Zhang, Y.2
|