-
1
-
-
21644481499
-
A serial combination of anomaly and misuse IDses applied to HTTP traffic
-
Tucson, AZ, USA, December
-
Elvis Tombini, Herve Debar, Ludovic Me, and Mireille Ducasse, "A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic", 20th Annual Computer Security Applications Conference, Tucson, AZ, USA, December 2004.
-
(2004)
20th Annual Computer Security Applications Conference
-
-
Tombini, E.1
Debar, H.2
Me, L.3
Ducasse, M.4
-
2
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
West Point, NY, June
-
Daniel Barbarra, Julia Couto, Sushil Jajodia, Leonard Popyack, and Ningning Wu, "ADAM: Detecting Intrusions by Data Mining", Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security T1A3 1100 United States Military Academy, West Point, NY, June 2001.
-
(2001)
Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security T1A3 1100 United States Military Academy
-
-
Barbarra, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
3
-
-
0003964874
-
-
Technical Report SRI-CSL-95-07, SRI, May
-
Debra Anderson, Thane Frivold, and Alfonso Valdes, Next-Generation Intrusion Detection Expert System(NIDES) - A Summary, Technical Report SRI-CSL-95-07, SRI, May 1995.
-
(1995)
Next-generation Intrusion Detection Expert System(NIDES) - A Summary
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
4
-
-
0035478854
-
Random forests
-
L. Breiman, "Random Forests", Machine Learning 45(1):5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
5
-
-
16244370106
-
Robust prediction of fault-proneness by random forests
-
Brittany, France, November
-
Lan Guo, Yan Ma, Bojan Cukic, and Harshinder Singh, "Robust Prediction of Fault-Proneness by Random Forests", Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE'04), pp. 417-428, Brittany, France, November 2004.
-
(2004)
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE'04)
, pp. 417-428
-
-
Guo, L.1
Ma, Y.2
Cukic, B.3
Singh, H.4
-
7
-
-
51349159085
-
Probability estimates for multi-class classification by pairwise coupling
-
December
-
Ting-Fan Wu, Chin-Jen Lin, and Ruby C. Weng, "Probability Estimates for Multi-class Classification by Pairwise Coupling", The Journal of Machine Learning Research, Volume 5, December 2004.
-
(2004)
The Journal of Machine Learning Research
, vol.5
-
-
Wu, T.-F.1
Lin, C.-J.2
Weng, R.C.3
-
9
-
-
33750936080
-
-
The UCIKDD Archive, Irvine, CA, USA
-
KDD'99 datasets, The UCIKDD Archive, http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html, Irvine, CA, USA, 1999.
-
(1999)
KDD'99 Datasets
-
-
-
10
-
-
84883286084
-
Network intrusion detection using random forests
-
St. Andrews, New Brunswick, Canada, October
-
J. Zhang and M. Zulkernine, "Network Intrusion Detection Using Random Forests", Proc. of the Third Annual Conference on Privacy, Security and Trust, pp. 53-61, St. Andrews, New Brunswick, Canada, October 2005.
-
(2005)
Proc. of the Third Annual Conference on Privacy, Security and Trust
, pp. 53-61
-
-
Zhang, J.1
Zulkernine, M.2
-
11
-
-
10844237614
-
An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection
-
Pittsburgh, USA, September
-
M. Mahoney and P. Chan, "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection", Proceeding of Recent Advances in Intrusion Detection (RAID)-2003, Pittsburgh, USA, September 2003.
-
(2003)
Proceeding of Recent Advances in Intrusion Detection (RAID)-2003
-
-
Mahoney, M.1
Chan, P.2
-
13
-
-
0038428854
-
Results of the KDD'99 classifier learning
-
Charles Elkan, "Results of the KDD'99 Classifier Learning", SIGKDD Explorations 1(2): 63-64, 2000.
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
14
-
-
0041382385
-
-
University of California, Berkeley, CA, USA
-
Leo Breiman and Adele Cutler, Random forests, http://stat-www.berkeley. edu/users/breiman/RandomForests/cc_home.htm, University of California, Berkeley, CA, USA.
-
Random Forests
-
-
Breiman, L.1
Cutler, A.2
-
15
-
-
33750939687
-
WEKA software
-
The University of Waikato, Hamilton, New Zealand
-
WEKA software, Machine Learning, http://www.cs.waikato.ac.nz/ml/weka/, The University of Waikato, Hamilton, New Zealand.
-
Machine Learning
-
-
-
18
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
November
-
Wenke Lee and Salvatore J. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems", ACM Transactions on Information and System Security (TISSEC), Volume 3, Issue 4, November 2000.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
-
-
Lee, W.1
Stolfo, S.J.2
-
19
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data", Applications of Data Mining in Computer Security, Kluwer, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
20
-
-
33746860935
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
Newcastle, NSW, Australia
-
Kingsly Leung and Christopher Leckie, "Unsupervised Anomaly Detection in Network Intrusion Detection Using Clusters", Australasian Computer Science Conference, Newcastle, NSW, Australia, 2005.
-
(2005)
Australasian Computer Science Conference
-
-
Leung, K.1
Leckie, C.2
|