-
1
-
-
0142253852
-
-
Barbarà, D., Couto, J., Jajodia, S., Popyack, L., and Wu, N., ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection, ACM SIGMOD Record, 30(4), 2001, pp. 15-24.
-
Barbarà, D., Couto, J., Jajodia, S., Popyack, L., and Wu, N., ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection, ACM SIGMOD Record, 30(4), 2001, pp. 15-24.
-
-
-
-
2
-
-
3142758707
-
MAIDS: Mining Alarming Incidents from Data Streams
-
ACM Press, New York, NY
-
Cai, Y. D., Clutter, D., Pape, G., Han, J., Welge, M., and Auvil, L., MAIDS: Mining Alarming Incidents from Data Streams, In Proc. 2004 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'04), ACM Press, New York, NY, 2004, pp. 919-920.
-
(2004)
Proc. 2004 ACM-SIGMOD Int. Conf. Management of Data (SIGMOD'04)
, pp. 919-920
-
-
Cai, Y.D.1
Clutter, D.2
Pape, G.3
Han, J.4
Welge, M.5
Auvil, L.6
-
3
-
-
34548176289
-
A Distributed Intrusion Detection Prototype Using Security Agents
-
Chatzigiannakis, V., Androulidakis, O., and Maglaris, B., A Distributed Intrusion Detection Prototype Using Security Agents, Workshop of the HP OpenView University Association, 2004.
-
(2004)
Workshop of the HP OpenView University Association
-
-
Chatzigiannakis, V.1
Androulidakis, O.2
Maglaris, B.3
-
4
-
-
33847110801
-
-
DataDirect Technologies
-
DataDirect Technologies, Using Oracle Real Application Clusters (RAC), http://www.datadirect.com/techzone/odbc/docs/odbc_oracle_rac.pdf, 2004.
-
(2004)
Using Oracle Real Application Clusters (RAC)
-
-
-
5
-
-
33847328806
-
-
DBMS_DATA_MINING PL/SQL package, Oracle10g PL/SQL packages and types reference, Ch. 23, Oracle Corporation, 2003.
-
DBMS_DATA_MINING PL/SQL package, Oracle10g PL/SQL packages and types reference, Ch. 23, Oracle Corporation, 2003.
-
-
-
-
6
-
-
0141797880
-
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
-
D. Barbarà and S. Jajodia eds, Kluwer Academic Publishers, Boston, MA
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., and Stolfo, S. J., A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data, In D. Barbarà and S. Jajodia (eds.), Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, MA, 2002, pp. 78-99.
-
(2002)
Applications of Data Mining in Computer Security
, pp. 78-99
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.J.5
-
7
-
-
33847310953
-
Adaptive Model Generation for Intrusion Detection
-
Eskin, E., Miller, M., Zhong, Z.-D., Yi, G., Lee, W.-A., and Stolfo, S. J., Adaptive Model Generation for Intrusion Detection, In Proc. ACMCCS Workshop on Intrusion Detection and Prevention, 2000.
-
(2000)
Proc. ACMCCS Workshop on Intrusion Detection and Prevention
-
-
Eskin, E.1
Miller, M.2
Zhong, Z.-D.3
Yi, G.4
Lee, W.-A.5
Stolfo, S.J.6
-
8
-
-
1642375563
-
Adaptive Model Generation, an Architecture for the Deployment of Data Mining-Based Intrusion Detection Systems
-
D. Barbarà and S. Jajodia eds, Kluwer Academic Publishers, Boston, MA
-
Honig, A., Howard, A., Eskin, E., and Stolfo, S. J., Adaptive Model Generation, an Architecture for the Deployment of Data Mining-Based Intrusion Detection Systems, In D. Barbarà and S. Jajodia (eds.), Applications of Data Mining in Computer Security, Kluwer Academic Publishers, Boston, MA, 2002, pp. 154-191.
-
(2002)
Applications of Data Mining in Computer Security
, pp. 154-191
-
-
Honig, A.1
Howard, A.2
Eskin, E.3
Stolfo, S.J.4
-
10
-
-
24944563451
-
Robust Support Vector Machines for Anomaly Detection in Computer Security
-
Hu, W., Liao, Y., and Vemuri, V. R., Robust Support Vector Machines for Anomaly Detection in Computer Security, In Proc. International Conference on Machine Learning and Applications, 2003, pp. 168-174.
-
(2003)
Proc. International Conference on Machine Learning and Applications
, pp. 168-174
-
-
Hu, W.1
Liao, Y.2
Vemuri, V.R.3
-
11
-
-
0242540448
-
Mining Intrusion Detection Alarms for Actionable Knowledge
-
ACM Press, New York, NY
-
Julisch, K. and Dacier, M., Mining Intrusion Detection Alarms for Actionable Knowledge, In Proc. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, New York, NY, 2002, pp. 366-375.
-
(2002)
Proc. ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 366-375
-
-
Julisch, K.1
Dacier, M.2
-
12
-
-
33847329301
-
-
KDD'99 Competition Dataset, http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html, 1999.
-
KDD'99 Competition Dataset, http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html, 1999.
-
-
-
-
13
-
-
84885774862
-
A Framework for Constructing Features and Models for Intrusion Detection Systems
-
Lee, W. and Stolfo, S. J., A Framework for Constructing Features and Models for Intrusion Detection Systems, ACM Transactions on Information and System Security, 3(4), 2000, pp. 227-261.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
15
-
-
0142063407
-
Novelty Detection: A review, Part 1: Statistical Approaches
-
Markou, M. and Singh, S., Novelty Detection: A review, Part 1: Statistical Approaches, Signal Processing, 8(12), 2003, pp. 2481-2497.
-
(2003)
Signal Processing
, vol.8
, Issue.12
, pp. 2481-2497
-
-
Markou, M.1
Singh, S.2
-
17
-
-
0036085392
-
Intrusion Detection Using Neural Networks and Support Vector Machines
-
IEEE Press
-
Mukkamala, S., Janoski, G., and Sung, A., Intrusion Detection Using Neural Networks and Support Vector Machines, In Proc. of IEEE International Joint Conference on Neural Networks, IEEE Press, 2002, pp. 1702-1707.
-
(2002)
Proc. of IEEE International Joint Conference on Neural Networks
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.2
Sung, A.3
-
18
-
-
33847298665
-
-
Network Flight Recorder Inc
-
Network Flight Recorder Inc., http://www.nfr.com, 1997.
-
(1997)
-
-
-
19
-
-
0038282217
-
Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt
-
D. Barbarà and S. Jajodia eds, Kluwer Academic Publishers, Boston, MA
-
Noel, S., Wijesekera, D., and Youman, C., Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt, In D. Barbarà and S. Jajodia (eds.), Applications of Data Mining in Computer Aecurity, Kluwer Academic Publishers, Boston, MA, 2002, pp. 2-25.
-
(2002)
Applications of Data Mining in Computer Aecurity
, pp. 2-25
-
-
Noel, S.1
Wijesekera, D.2
Youman, C.3
-
20
-
-
0033295259
-
-
Paxton, V. BRO: A System for Detecting Network Intruders in Real-Time, Computer Networks, 31, 1999, pp. 2435-2463.
-
Paxton, V. BRO: A System for Detecting Network Intruders in Real-Time, Computer Networks, 31, 1999, pp. 2435-2463.
-
-
-
-
22
-
-
0000487102
-
Estimating the Support of a High-Dimensional distribution
-
Scholkopf, B., Platt, J. C., Shawe-Taylor, J., and Smola, A. J., Estimating the Support of a High-Dimensional distribution, Neural Computation, 13(7), 2001, pp. 1443-1471.
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Scholkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
-
23
-
-
0034300682
-
Intrusion Detection Using Autonomous Agents
-
Spafford, E. H. and Zamboni, D., Intrusion Detection Using Autonomous Agents, Computer Networks, 34(4), 2000. pp. 547-570.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 547-570
-
-
Spafford, E.H.1
Zamboni, D.2
-
24
-
-
33847309938
-
GrIDS: A Graph-Based Intrusion Detection System for Large Networks
-
Staniford-Chen, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., and Zerkle, D., GrIDS: A Graph-Based Intrusion Detection System for Large Networks, ACM Transactions on Information and System Security, 4(4), 2001. pp. 407-452.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.4
, pp. 407-452
-
-
Staniford-Chen, S.1
Crawford, R.2
Dilger, M.3
Frank, J.4
Hoagland, J.5
Levitt, K.6
Zerkle, D.7
-
26
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Zhang, Y., Lee, W., and Huang, Y.-A., Intrusion Detection Techniques for Mobile Wireless Networks, Wireless Networks, 9(5), 2003, pp. 545-556.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
|