-
2
-
-
4344627335
-
The spread of the Witty worm
-
Shannon, C., Moore, D.: The spread of the Witty worm. IEEE Sec. Priv. 2(4), 46-50 (2004)
-
(2004)
IEEE Sec. Priv
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
3
-
-
0742276097
-
Inside the Slammer worm
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer worm. IEEE Sec. Priv. 1(4), 33-39 (2003)
-
(2003)
IEEE Sec. Priv
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
4
-
-
33846933194
-
-
CERT Advisory CA-2001-21: Buffer overflow in telnetd. CERT Coordination Center (2001)
-
CERT Advisory CA-2001-21: Buffer overflow in telnetd. CERT Coordination Center (2001)
-
-
-
-
5
-
-
33846935633
-
-
CERT Advisory CA-2002-28: Openssh vulnerabilities in challenge response handling. CERT Coordination Center (2002)
-
CERT Advisory CA-2002-28: Openssh vulnerabilities in challenge response handling. CERT Coordination Center (2002)
-
-
-
-
6
-
-
0141441130
-
PHAD: Packet header anomaly detection for identifying hostile network traffic
-
Technical Report CS-2001-2, Florida Institute of Technology
-
Mahoney, M., Chan, P.: PHAD: packet header anomaly detection for identifying hostile network traffic. Technical Report CS-2001-2, Florida Institute of Technology (2001)
-
(2001)
-
-
Mahoney, M.1
Chan, P.2
-
8
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
Kruegel, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: Proceedings of ACM Symposium on Applied Computing, 201-208 (2002)
-
(2002)
Proceedings of ACM Symposium on Applied Computing
, pp. 201-208
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
9
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Kluwer, Dordrecht
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. In: Applications of Data Mining in Computer Security. Kluwer, Dordrecht (2002)
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
10
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
Mahoney, M., Chan, P.: An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In: Recent Adances in Intrusion Detection (RAID), 220-237 (2004)
-
(2004)
Recent Adances in Intrusion Detection (RAID)
, pp. 220-237
-
-
Mahoney, M.1
Chan, P.2
-
14
-
-
84885774862
-
-
Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Sec. 3, 227-261 (2001)
-
Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inform. Syst. Sec. 3, 227-261 (2001)
-
-
-
-
15
-
-
23544449776
-
Learning models of network traffic for detecting novel attacks
-
Technical Report CS-2002-8, Florida Institute of Technology
-
Mahoney, M., Chan, P.: Learning models of network traffic for detecting novel attacks. Technical Report CS-2002-8, Florida Institute of Technology (2002)
-
(2002)
-
-
Mahoney, M.1
Chan, P.2
-
19
-
-
0029716418
-
A sense of self for unix processes
-
Oakland
-
Forrest, S., Hofmeyr, S., Somayaji, A., Longstaff, T.: A sense of self for unix processes. In: Proceedings of IEEE Symposium on Security and Privacy, Oakland, 120-128 (1996)
-
(1996)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
20
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Sec. 6(3), 151-180 (1998)
-
(1998)
J. Comput. Sec
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
22
-
-
0034593307
-
Characterizing the behavior of a program using multiple-length n-grams
-
Marceau, C.: Characterizing the behavior of a program using multiple-length n-grams. In: Proceedings of New Security Paradigms Workshop (NSPW) 101-110 (2000)
-
(2000)
Proceedings of New Security Paradigms Workshop (NSPW)
, pp. 101-110
-
-
Marceau, C.1
-
23
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
Santa Clara
-
Ghosh, A., Schwartzbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings of USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, 51-62 (1999)
-
(1999)
Proceedings of USENIX Workshop on Intrusion Detection and Network Monitoring
, pp. 51-62
-
-
Ghosh, A.1
Schwartzbard, A.2
Schatz, M.3
-
26
-
-
0002636321
-
N-gram-based text categorization
-
Las Vegas
-
Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: Proceedings SDAIR, Las Vegas 161-175 (1994)
-
(1994)
Proceedings SDAIR
, pp. 161-175
-
-
Cavnar, W.B.1
Trenkle, J.M.2
-
27
-
-
0028911698
-
Gauging similarity with n-grams: Language-independent categorization of text
-
Damashek, M.: Gauging similarity with n-grams: language-independent categorization of text. Science 267(5199), 843-848 (1995)
-
(1995)
Science
, vol.267
, Issue.5199
, pp. 843-848
-
-
Damashek, M.1
-
28
-
-
0003425660
-
Text categorization with support vector machines: Learning with many relevant features
-
Technical Report 23, LS VIII, University of Dortmund
-
Joachims, T.: Text categorization with support vector machines: Learning with many relevant features. Technical Report 23, LS VIII, University of Dortmund (1997)
-
(1997)
-
-
Joachims, T.1
-
29
-
-
0033640628
-
Twenty years of document image analysis in PAMI
-
Nagy, G.: Twenty years of document image analysis in PAMI. IEEE Trans. Pattern Anal. Mach. Intell. 22(1), 36-62 (2000)
-
(2000)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.22
, Issue.1
, pp. 36-62
-
-
Nagy, G.1
-
30
-
-
0018446498
-
Mathematics and information retrieval
-
Salton, G.: Mathematics and information retrieval. J. Doc. 35(1), 1-29 (1979)
-
(1979)
J. Doc
, vol.35
, Issue.1
, pp. 1-29
-
-
Salton, G.1
-
31
-
-
0017952955
-
N-gram statistics for natural language understanding and text processing
-
Suen, C.Y.: N-gram statistics for natural language understanding and text processing. IEEE Trans. Pattern Anal. Mach. Intell. 1(2), 164-172 (1979)
-
(1979)
IEEE Trans. Pattern Anal. Mach. Intell
, vol.1
, Issue.2
, pp. 164-172
-
-
Suen, C.Y.1
-
34
-
-
0013080309
-
Contribution au problème de l'immigration postglaciaire de la flore alpine
-
Jaccard, P.: Contribution au problème de l'immigration postglaciaire de la flore alpine. Bulletin de la Société Vaudoise Des Sciences Naturelles 36, 87-130 (1900)
-
(1900)
Bulletin de la Société Vaudoise Des Sciences Naturelles
, vol.36
, pp. 87-130
-
-
Jaccard, P.1
-
37
-
-
84945709825
-
-
Fredkin, E.: Trie memory. Commun. 3(9):490-499: ACM, (1960)
-
Fredkin, E.: Trie memory. Commun. 3(9):490-499: ACM, (1960)
-
-
-
-
39
-
-
33750258120
-
Efficient algorithms for similarity measures over sequential data: A look beyond kernels
-
Pattern Recognition, Proceedings of 28th DAGM Symposium
-
Rieck, K., Laskov, R, Müller, K.R.: Efficient algorithms for similarity measures over sequential data: a look beyond kernels. In: Pattern Recognition, Proceedings of 28th DAGM Symposium. LNCS 374-383 (2006)
-
(2006)
LNCS
, pp. 374-383
-
-
Rieck, K.1
Laskov, R.2
Müller, K.R.3
-
40
-
-
33846906135
-
Computation of similarity measures for sequential data using generalized suffix trees
-
MIT, Cambridge
-
Rieck, K., Laskov, P., Sonnenburg, S.: Computation of similarity measures for sequential data using generalized suffix trees. In: Advances in Neural Information Processing Systems 19, MIT, Cambridge (2006)
-
(2006)
Advances in Neural Information Processing Systems
, vol.19
-
-
Rieck, K.1
Laskov, P.2
Sonnenburg, S.3
-
41
-
-
33846894891
-
-
Lazarevic, A., Ertoz, I.,., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection,. In: Proceedings of SIAM International Conference on Data Mining (2003)
-
Lazarevic, A., Ertoz, I.,., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection,. In: Proceedings of SIAM International Conference on Data Mining (2003)
-
-
-
-
42
-
-
85016684916
-
Intrusion detection in unlabeled data with quarter-sphere support vector machines
-
Laskov, P., Schäfer, C., Kotenko, T.: Intrusion detection in unlabeled data with quarter-sphere support vector machines. In: Detection of Intrusions and Malware, and Vulnerability Assessment, Proceedings of DIMVA Conference, 71-82 (2004)
-
(2004)
Detection of Intrusions and Malware, and Vulnerability Assessment, Proceedings of DIMVA Conference
, pp. 71-82
-
-
Laskov, P.1
Schäfer, C.2
Kotenko, T.3
-
43
-
-
33745163595
-
Learning intrusion detection: Supervised or unsupervised?
-
Laskov, P., Düssel, P., Schäfer, C., Rieck, K.: Learning intrusion detection: supervised or unsupervised? In: Image Analysis and Processing, Proceedings of 13th ICIAP Conference, 50-57 (2005)
-
(2005)
Image Analysis and Processing, Proceedings of 13th ICIAP Conference
, pp. 50-57
-
-
Laskov, P.1
Düssel, P.2
Schäfer, C.3
Rieck, K.4
-
44
-
-
33746430492
-
Detecting unknown network attacks using language models
-
Detection of Intrusions and Malware, and Vulnerability Assessment, Proceedings of 3rd DIMVA Conference
-
Rieck, K., Laskov, P.: Detecting unknown network attacks using language models. In: Detection of Intrusions and Malware, and Vulnerability Assessment, Proceedings of 3rd DIMVA Conference. LNCS, 74-90 (2006)
-
(2006)
LNCS
, vol.74-90
-
-
Rieck, K.1
Laskov, P.2
-
45
-
-
0034133513
-
Distance-based outliers: Algorithms and applications
-
Knorr, E., Ng, R., Tucakov, V.: Distance-based outliers: algorithms and applications. Int. J. Very Large Data Bases 8(3-4), 237-253 (2000)
-
(2000)
Int. J. Very Large Data Bases
, vol.8
, Issue.3-4
, pp. 237-253
-
-
Knorr, E.1
Ng, R.2
Tucakov, V.3
-
46
-
-
33745215847
-
From outliers to prototypes: Ordering data
-
Harmeling, S., Dornhege, G., Tax, D., Meinecke, F.C., Müller, K.R.: From outliers to prototypes: ordering data. Neurocomputing 69(13-15), 1608-1618 (2006)
-
(2006)
Neurocomputing
, vol.69
, Issue.13-15
, pp. 1608-1618
-
-
Harmeling, S.1
Dornhege, G.2
Tax, D.3
Meinecke, F.C.4
Müller, K.R.5
-
47
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann, R., Haines, J., Fried, D., Korba, J., Das, K.: The 1999 DARPA off-line intrusion detection evaluation. Comput. Netw. 34(4), 579-595 (2000)
-
(2000)
Comput. Netw
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.2
Fried, D.3
Korba, J.4
Das, K.5
-
49
-
-
85019691440
-
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inform. Syst. Sec. 3(4), 262-294 (2000)
-
McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inform. Syst. Sec. 3(4), 262-294 (2000)
-
-
-
-
51
-
-
0041965869
-
Text classification using string kernels
-
Lodhi, H., Saunders, C., Shawe-Taylor, J., Cristianini, N., Watkins, C.: Text classification using string kernels. J. Mach. Learn. Res. 2, 419-444 (2002)
-
(2002)
J. Mach. Learn. Res
, vol.2
, pp. 419-444
-
-
Lodhi, H.1
Saunders, C.2
Shawe-Taylor, J.3
Cristianini, N.4
Watkins, C.5
-
52
-
-
0036085540
-
Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
-
Tan, K., Maxion, R.: "Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector. In: Proceedings of IEEE Symposium on Security and Privacy, 188-201 (2002)
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 188-201
-
-
Tan, K.1
Maxion, R.2
-
54
-
-
33846940882
-
-
Microsoft: MS00-078-web server folder traversal vulnerability. Microsoft Sec. Bull. (2000)
-
Microsoft: MS00-078-web server folder traversal vulnerability. Microsoft Sec. Bull. (2000)
-
-
-
-
55
-
-
33846918111
-
-
Anonymous: Once upon a free() ... Phrack Magazine 0xb(0x39) (2001) 57-0x09
-
Anonymous: Once upon a free() ... Phrack Magazine 0xb(0x39) (2001) 57-0x09
-
-
-
-
58
-
-
27544467604
-
Automated worm fingerprinting
-
Singh, S., Estan, G., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of USENIX OSDI (2004)
-
(2004)
Proceedings of USENIX OSDI
-
-
Singh, S.1
Estan, G.2
Varghese, G.3
Savage, S.4
-
60
-
-
33846932218
-
-
Microsoft: MS05-021- vulnerability in exchange server could allow remote code execution: Microsoft Sec Bull. (2005)
-
Microsoft: MS05-021- vulnerability in exchange server could allow remote code execution: Microsoft Sec Bull. (2005)
-
-
-
-
62
-
-
0032405150
-
Applications of n-grams in textual information systems
-
Robertson, A.M., Willett, P.: Applications of n-grams in textual information systems. J. Doc. 58(1), 48-49 (1998)
-
(1998)
J. Doc
, vol.58
, Issue.1
, pp. 48-49
-
-
Robertson, A.M.1
Willett, P.2
-
63
-
-
0002531715
-
Dynamic alignment kernels
-
Smola, A, Bartlett, P, Schölkopf, B, Schuurmans, D, eds, MIT, Cambridge
-
Watkins, C.: Dynamic alignment kernels. In: Smola, A., Bartlett, P., Schölkopf, B., Schuurmans, D., (eds) Advances in large Margin Classifiers, MIT, Cambridge 39-50 (2000)
-
(2000)
Advances in large Margin Classifiers
, pp. 39-50
-
-
Watkins, C.1
-
65
-
-
0002774999
-
Learning patterns from unix process execution traces for intrusion detection
-
Providence
-
Lee, W., Stolfo, S., Chan, P.: Learning patterns from unix process execution traces for intrusion detection. In: Proceedings of AAAI Workshop on Fraud Detection and Risk Management, Providence 50-56 (1997)
-
(1997)
Proceedings of AAAI Workshop on Fraud Detection and Risk Management
, pp. 50-56
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
-
67
-
-
33746864380
-
Detection of new malicious code using n-grams signatures
-
Abou-Assaleh, T, Cercone, N., Keselj, V., Sweidanm, R.: Detection of new malicious code using n-grams signatures. In: Proceedings Second Annual Conference on Privacy, Security and Trust, 193-196 (2004)
-
(2004)
Proceedings Second Annual Conference on Privacy, Security and Trust
, pp. 193-196
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidanm, R.4
-
68
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Karim, M., Walenstein, A., Lakhotia, A., Laxmi, P.: Malware phylogeny generation using permutations of code. J. Comput. Virol. 1(1-2), 13-23 (2005)
-
(2005)
J. Comput. Virol
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Karim, M.1
Walenstein, A.2
Lakhotia, A.3
Laxmi, P.4
-
69
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
to appear
-
Kolter, J., Maloof, M.: Learning to detect and classify malicious executables in the wild. J. Mach. Learn. Res. (2006) (to appear)
-
(2006)
J. Mach. Learn. Res
-
-
Kolter, J.1
Maloof, M.2
|