-
2
-
-
0141723181
-
-
Kdd cup 1999 data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html, 1999.
-
(1999)
Kdd Cup 1999 Data
-
-
-
3
-
-
33845459299
-
-
Tcptrace. http://www.tcptrace.org, 2005.
-
(2005)
-
-
-
4
-
-
0003964874
-
Next-generation intrusion detection expert system (nides): A summary
-
May
-
D. Anderson, T. Frivold, and A. Valdes. Next-generation intrusion detection expert system (nides): A summary. SRI International Technical Report, 95(7):28-42, May 1995.
-
(1995)
SRI International Technical Report
, vol.95
, Issue.7
, pp. 28-42
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
5
-
-
0039253819
-
Lof: Identifying density-based local outliers
-
May
-
M. M. Breuning, H.-P. Kriegel, R. T. Ng, and J. Sander. Lof: Identifying density-based local outliers. ACM SIGMOD Conference, pages 93-104, May 2000.
-
(2000)
ACM SIGMOD Conference
, pp. 93-104
-
-
Breuning, M.M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
7
-
-
0027593257
-
Nadir: An automated system for detecting network intrusions and misuse
-
May
-
J. Hochberg, K. Jackson, C. Stallings, J. McClary, D. DuBois, and J. Ford. Nadir: An automated system for detecting network intrusions and misuse. Computer and Security, 12(3):235-248, May 1993.
-
(1993)
Computer and Security
, vol.12
, Issue.3
, pp. 235-248
-
-
Hochberg, J.1
Jackson, K.2
Stallings, C.3
McClary, J.4
DuBois, D.5
Ford, J.6
-
8
-
-
33845417681
-
-
V. Jacobson, C. Leres, and S. McCanne. tcpdump anonymous@ftp.ee.lbl.gov, June 1989
-
V. Jacobson, C. Leres, and S. McCanne. tcpdump. anonymous@ftp.ee.lbl.gov, June 1989.
-
-
-
-
9
-
-
0003946510
-
-
Springer-Verlag, New York, second edition edition
-
I. T. Jolliffe. Principal Component Analysis. Springer-Verlag, New York, second edition edition, 2002.
-
(2002)
Principal Component Analysis
-
-
Jolliffe, I.T.1
-
10
-
-
33745907909
-
Detecting and visualizing denial-of-service and network probe attacks using principal component analysis
-
June
-
K. Labib and V. Vemuri. Detecting and visualizing denial-of-service and network probe attacks using principal component analysis. Third Conference on Security and Network Architectures, SAR'04, June 2004.
-
(2004)
Third Conference on Security and Network Architectures, SAR'04
-
-
Labib, K.1
Vemuri, V.2
-
11
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
May
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava. A comparative study of anomaly detection schemes in network intrusion detection. Third SIAM Conference on Data Mining, May 2003.
-
(2003)
Third SIAM Conference on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
12
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
November
-
W. Lee and S. J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and Systems Security, 3(4):227-261, November 2000.
-
(2000)
ACM Transactions on Information and Systems Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
13
-
-
33845445750
-
-
Libcap
-
Libcap. http://www.tcpdump.org, 2005.
-
(2005)
-
-
-
14
-
-
7444252802
-
Active feature selection using classes
-
LNAI2637: May
-
H. Liu, L. Yu, D. Manoranjan, and H. Motoda. Active feature selection using classes. Seventh Pacific-Asia Conference on Knowledge Discovery and Data Mining, LNAI2637:474-485, May 2003.
-
(2003)
Seventh Pacific-asia Conference on Knowledge Discovery and Data Mining
, pp. 474-485
-
-
Liu, H.1
Yu, L.2
Manoranjan, D.3
Motoda, H.4
-
17
-
-
78049278861
-
Principal component-based anomaly detection scheme
-
In press
-
M.-L. Shyu, S.-C. Chen, K. Sarinnapakorn, and L. Chang. Principal component-based anomaly detection scheme. Foundations and Novel Approaches in Data Mining, pages 311-329, In press.
-
Foundations and Novel Approaches in Data Mining
, pp. 311-329
-
-
Shyu, M.-L.1
Chen, S.-C.2
Sarinnapakorn, K.3
Chang, L.4
-
18
-
-
27144530995
-
Handling nominal features in anomaly intrusion detection problems
-
April
-
M.-L. Shyu, K. Sarinnapakorn, I. Kuruppu-Appuhamilage, S.-C. Chen, L. Chang, and T. Goldring. Handling nominal features in anomaly intrusion detection problems. The 15th International Workshop on Research Issues on Data Engineering (RIDE), in conjunction with The 21st International. Conference on Data Engineering, pages 55-62, April 2005.
-
(2005)
The 15th International Workshop on Research Issues on Data Engineering (RIDE), in Conjunction with the 21st International. Conference on Data Engineering
, pp. 55-62
-
-
Shyu, M.-L.1
Sarinnapakorn, K.2
Kuruppu-Appuhamilage, I.3
Chen, S.-C.4
Chang, L.5
Goldring, T.6
-
21
-
-
0037105910
-
Intrusion detection techniques and approaches
-
T. Verwored and R. Hunt. Intrusion detection techniques and approaches. Computer Communications, 25:1356-1365, 2002.
-
(2002)
Computer Communications
, vol.25
, pp. 1356-1365
-
-
Verwored, T.1
Hunt, R.2
|