-
3
-
-
84958983572
-
Detecting malicious software by monitoring anomalous windows registry accesses
-
Apap, F., Honig, A., Hershkop, S., Eskin, E., Stolfo, S.: Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. Proceedings of Recent Advances in Intrusion Detection, 5th International Symposium (2002) 36-53
-
(2002)
Proceedings of Recent Advances in Intrusion Detection, 5th International Symposium
, pp. 36-53
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
4
-
-
84941151485
-
-
Arcsight Corporation.: Arcsight ESM Product Brief, http://www.arcsight. com/collateral/ArcSight_ESM_brochure.pdf (2005)
-
(2005)
Arcsight ESM Product Brief
-
-
-
6
-
-
0142253852
-
ADAM: A testbed for exploring the use of data mining in intrusion detection
-
Barbara, D., Couto, J., Jajodia, S., Wu, N.: ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. SIGMOD Record Volume 30 Number 4 (2001) 15-24
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 15-24
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Wu, N.4
-
7
-
-
84941146861
-
-
Cisco Systems. Network Security Database, http://www.cisco.com/cgi-bin/ front.x/csec/idsAllList.pl (2005)
-
Network Security Database
-
-
-
12
-
-
0027542839
-
Data-driven discovery of quantitative rules in relational databases
-
Han, J., Cai, Y., Cereone, N.: Data-Driven Discovery of Quantitative Rules in Relational Databases. IEEE Transactions on Knowledge and Data Engineering, Volume 5 (1993) 29-40
-
(1993)
IEEE Transactions on Knowledge and Data Engineering
, vol.5
, pp. 29-40
-
-
Han, J.1
Cai, Y.2
Cereone, N.3
-
13
-
-
1642375563
-
Adaptive model generation: An architecture for the deployment of data mining-based intrusion detection systems
-
Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers
-
Honig, A., Howard, A., Eskin, E., Stolfo, S.: Adaptive Model Generation : An Architecture for the Deployment of Data Mining-based Intrusion Detection Systems. Applications of Data Mining in Computer Security, Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers (2002) 153-194
-
(2002)
Applications of Data Mining in Computer Security
, pp. 153-194
-
-
Honig, A.1
Howard, A.2
Eskin, E.3
Stolfo, S.4
-
18
-
-
27544512530
-
Data mining for intrusion detection a critical review
-
Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers
-
Julisch, K.: Data Mining for Intrusion Detection A Critical Review. Applications of Data Mining in Computer Security, Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers (2002) 33-62
-
(2002)
Applications of Data Mining in Computer Security
, pp. 33-62
-
-
Julisch, K.1
-
20
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch, K. Clustering Intrusion Detection Alarms to Support Root Cause Analysis. ACM Transactions on Information and System Security, Volume 6, Number 4 (2003) 443-471
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
25
-
-
84964411176
-
Real time data mining-based intrusion detection
-
Lee, W., Stolfo, S., Chan, P., Eskin, E., Fan, W., Miller, M., Hershkop, S., Zhang, J.: Real Time Data Mining-based Intrusion Detection. Proceedings of the 2nd DARPA Information Survivability Conference and Exposition (2001)
-
(2001)
Proceedings of the 2nd DARPA Information Survivability Conference and Exposition
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
26
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA Off-Line Intrusion Detection Evaluation. Computer Networks, Volume 34 (2000) 579-595
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
27
-
-
29844441257
-
A data mining analysis of RTID alarms
-
Manganaris, S., Christensen, M., Zerkle, D., Hermiz, K.: A Data Mining Analysis of RTID Alarms. Proceedings of Recent Advances in Intrusion Detection, Second International Workshop (1999)
-
(1999)
Proceedings of Recent Advances in Intrusion Detection, Second International Workshop
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
28
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by lincoln laboratory
-
Mchugh, J.: Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM Transactions on Information and System Security, Volume 3, Number 4 (2000) 262-294
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
Mchugh, J.1
-
31
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning, P., Cui, Y., Reeves, D., Xu, D.; Techniques and Tools for Analyzing Intrusion Alerts. ACM Transaction on Information and System Security. Volume 7, No. 2 (2004) 274-318
-
(2004)
ACM Transaction on Information and System Security
, vol.7
, Issue.2
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.3
Xu, D.4
-
32
-
-
0038282217
-
Modern intrusion detection, data mining, and degrees of attack guilt
-
Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers
-
Noel, S., Wijesekera, D., Youman, C.: Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. Applications of Data Mining in Computer Security, Barbara, D., Sushil, J., eds. Boston : Kluwer Academic Publishers (2002) 1-31
-
(2002)
Applications of Data Mining in Computer Security
, pp. 1-31
-
-
Noel, S.1
Wijesekera, D.2
Youman, C.3
-
34
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
Schultz, M., Eskin, E., Zadok, E., Stolfo, S,: Data Mining Methods for Detection of New Malicious Executables, Proceedings of IEEE Symposium on Security and Privacy (2001)
-
(2001)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.4
-
35
-
-
85012240666
-
Data mining-based intrusion detectors: An overview of the columbia IDS project
-
Stolfo, S., Lee, W., Chan, P., Fan, W., Eskin, E.: Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project. SIGMOD Record, Vol. 30, No. 4 (2001) 5-14
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 5-14
-
-
Stolfo, S.1
Lee, W.2
Chan, P.3
Fan, W.4
Eskin, E.5
|