-
1
-
-
33644501924
-
A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection
-
May
-
A. Lazarevic, A. Ozgur, L. Ertoz, J. Srivastava, and V. Kumar, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection," Proc. SIAM Int'l Conf. Data Mining, May 2003.
-
(2003)
Proc. SIAM Int'l Conf. Data Mining
-
-
Lazarevic, A.1
Ozgur, A.2
Ertoz, L.3
Srivastava, J.4
Kumar, V.5
-
2
-
-
1942436335
-
Robustness of the Markov-Chain Model for Cyber-Attack Detection
-
N. Ye, Y. Zhang, and CM. Borror, "Robustness of the Markov-Chain Model for Cyber-Attack Detection," IEEE Trans. Reliability, vol. 53, no. 1, pp. 116-123, 2004.
-
(2004)
IEEE Trans. Reliability
, vol.53
, Issue.1
, pp. 116-123
-
-
Ye, N.1
Zhang, Y.2
Borror, C.M.3
-
3
-
-
33745201000
-
Anomalous System Call Detection
-
Feb
-
D. Mutz, F. Valeur, G. Vigna, and C. Kruegel, "Anomalous System Call Detection," ACM Trans. Information and System Security, vol. 9, no. 1, pp. 61-93, Feb. 2006.
-
(2006)
ACM Trans. Information and System Security
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
Kruegel, C.4
-
5
-
-
21744450636
-
Symbolic Time Series Analysis for Anomaly Detection: A Comparative Evaluation
-
Sept
-
S.C. Chin, A. Ray, and V. Rajagopalan, "Symbolic Time Series Analysis for Anomaly Detection: A Comparative Evaluation," Signal Processing, vol. 85, no. 9, pp. 1859-1868, Sept. 2005.
-
(2005)
Signal Processing
, vol.85
, Issue.9
, pp. 1859-1868
-
-
Chin, S.C.1
Ray, A.2
Rajagopalan, V.3
-
6
-
-
0043166339
-
Anomaly Detection in IP Networks
-
M. Thottan and C. Ji, "Anomaly Detection in IP Networks," IEEE Trans. Signal Processing, vol. 51, no. 8, pp. 2191-2204, 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
8
-
-
0141464248
-
HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification
-
June
-
Z. Zhang, J. Li, C.N. Manikopoulos, J. Jorgenson, and J. Ucles, "HIDE: A Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification," Proc. 2001 IEEE Workshop Information Assurance, pp. 85-90, June 2001.
-
(2001)
Proc. 2001 IEEE Workshop Information Assurance
, pp. 85-90
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.N.3
Jorgenson, J.4
Ucles, J.5
-
9
-
-
17444432965
-
Hierarchical Kohonen Net for Anomaly Detection in Network Security
-
Apr
-
S.T. Sarasamma, Q.A. Zhu, and J. Huff, "Hierarchical Kohonen Net for Anomaly Detection in Network Security," IEEE Trans. Systems, Man, and Cybernetics-Part B, vol. 35, no. 2, Apr. 2005.
-
(2005)
IEEE Trans. Systems, Man, and Cybernetics-Part B
, vol.35
, Issue.2
-
-
Sarasamma, S.T.1
Zhu, Q.A.2
Huff, J.3
-
11
-
-
2642522033
-
Symbolic Dynamic Analysis of Complex Systems for Anomaly Detection
-
A. Ray, "Symbolic Dynamic Analysis of Complex Systems for Anomaly Detection," Signal Processing, vol. 84, no. 7, pp. 1115-1130, 2004.
-
(2004)
Signal Processing
, vol.84
, Issue.7
, pp. 1115-1130
-
-
Ray, A.1
-
12
-
-
0036647172
-
Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection
-
N. Ye, S.M. Emran, Q. Chen, and S. Vilbert, "Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection," IEEE Trans. Computers, vol. 51, no. 7, pp. 810-820, 2002.
-
(2002)
IEEE Trans. Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
14
-
-
1642354876
-
KDD-99 Classifier Learning Contest: LLSoft's Results Overview
-
Jan
-
I. Levin, "KDD-99 Classifier Learning Contest: LLSoft's Results Overview," SIGKDD Explorations, vol. 1, pp. 67-75, Jan. 2000.
-
(2000)
SIGKDD Explorations
, vol.1
, pp. 67-75
-
-
Levin, I.1
-
16
-
-
0013029835
-
PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection)
-
Technical Report DSTO-GD-0286, Dept. of Computer Science, Univ. of Minnesota
-
R. Agarwal and M.V. Joshi, "PNrule: A New Framework for Learning Classifier Models in Data Mining (A Case-Study in Network Intrusion Detection)," Technical Report DSTO-GD-0286, Dept. of Computer Science, Univ. of Minnesota, 2000.
-
(2000)
-
-
Agarwal, R.1
Joshi, M.V.2
-
17
-
-
27644496932
-
A New Dependency and Correlation Analysis for Features
-
Sept
-
G. Qu, S. Hariri, and M. Yousif, "A New Dependency and Correlation Analysis for Features," IEEE Trans. Knowleddge and Data Eng., vol. 17, no. 9, pp. 1199-1207, Sept. 2005.
-
(2005)
IEEE Trans. Knowleddge and Data Eng
, vol.17
, Issue.9
, pp. 1199-1207
-
-
Qu, G.1
Hariri, S.2
Yousif, M.3
-
18
-
-
0032021555
-
On Combining Classifiers
-
Mar
-
J. Kittler, M. Hatef, R.P.W. Duin, and J. Matas, "On Combining Classifiers," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 20, no. 3, pp. 226-239, Mar. 1998.
-
(1998)
IEEE Trans. Pattern Analysis and Machine Intelligence
, vol.20
, Issue.3
, pp. 226-239
-
-
Kittler, J.1
Hatef, M.2
Duin, R.P.W.3
Matas, J.4
-
19
-
-
0033117452
-
Soft Combination of Neural Classifiers: A Comparative Study
-
A. Verikas, A. Lipnickas, K. Malmqvist, M. Bacauskiene, and A. Gelzinis, "Soft Combination of Neural Classifiers: A Comparative Study," Pattern Recognition Letters, vol. 20, pp. 429-444, 1999.
-
(1999)
Pattern Recognition Letters
, vol.20
, pp. 429-444
-
-
Verikas, A.1
Lipnickas, A.2
Malmqvist, K.3
Bacauskiene, M.4
Gelzinis, A.5
-
20
-
-
0036532571
-
Switching between Selection and Fusion in Combining Classifiers: An Experiment
-
Apr
-
L.I. Kuncheva, "Switching between Selection and Fusion in Combining Classifiers: An Experiment," IEEE Trans. Systems, Man, and Cybernetics, vol. 32, no. 2, pp. 146-156, Apr. 2002.
-
(2002)
IEEE Trans. Systems, Man, and Cybernetics
, vol.32
, Issue.2
, pp. 146-156
-
-
Kuncheva, L.I.1
-
21
-
-
84962260018
-
Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation
-
Jan
-
R.P. Lippman, D.J. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R.K. Cunningham, and M.A. Zissman, "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proc. DARPA Information Survivabiltiy Conf. and Exposition (DISCEX '00), pp. 12-26, Jan. 2000.
-
(2000)
Proc. DARPA Information Survivabiltiy Conf. and Exposition (DISCEX '00)
, pp. 12-26
-
-
Lippman, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
22
-
-
84964526751
-
Extending the DARPA Offline Intrusion Detection Evaluation
-
June
-
J. Haines, L. Rossey, R.P. Lippman, and R.K. Cunningham, "Extending the DARPA Offline Intrusion Detection Evaluation," Proc. DARPA Information Survivability Conf. and Exposition (DISCEX '01), June 2001.
-
(2001)
Proc. DARPA Information Survivability Conf. and Exposition (DISCEX '01)
-
-
Haines, J.1
Rossey, L.2
Lippman, R.P.3
Cunningham, R.K.4
-
23
-
-
84944222170
-
The 1999 DARPA Off-Line Intrusion Detection Evaluation
-
Oct
-
R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, and K. Das, "The 1999 DARPA Off-Line Intrusion Detection Evaluation," Proc. Third Int'l Workshop Recent Advances in Intrusion Detection (RAID '00), pp. 162-182, Oct. 2000.
-
(2000)
Proc. Third Int'l Workshop Recent Advances in Intrusion Detection (RAID '00)
, pp. 162-182
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
24
-
-
15944386957
-
Dimension Reduction Using Feature Extraction Methods for Real-Time Misuse Detection Systems
-
June
-
G.K. Kuchimanachi, V.V. Phoha, K.S. Balagani, and S.R. Gaddam, "Dimension Reduction Using Feature Extraction Methods for Real-Time Misuse Detection Systems," Proc. IEEE 2004 Information Assurance Workshop, pp. 195-202, June 2004.
-
(2004)
Proc. IEEE 2004 Information Assurance Workshop
, pp. 195-202
-
-
Kuchimanachi, G.K.1
Phoha, V.V.2
Balagani, K.S.3
Gaddam, S.R.4
-
25
-
-
33847743017
-
Symbolic Time Series Analysis of Mechanical Systems for Anomaly Detection
-
Aug
-
A.M. Khatkhate, A. Ray, E. Keller, and S. Chin, "Symbolic Time Series Analysis of Mechanical Systems for Anomaly Detection," IEEE/ASME Trans. Mechatronics, vol. 11, no. 4, pp. 439-447, Aug. 2006.
-
(2006)
IEEE/ASME Trans. Mechatronics
, vol.11
, Issue.4
, pp. 439-447
-
-
Khatkhate, A.M.1
Ray, A.2
Keller, E.3
Chin, S.4
-
28
-
-
0345438685
-
ROC Graphs: Notes and Practical Considerations for Data Mining Researchers
-
Technical Report HPL-2003-4, HP Labs, 2003
-
T. Fawcett, "ROC Graphs: Notes and Practical Considerations for Data Mining Researchers," Technical Report HPL-2003-4, HP Labs, 2003.
-
-
-
Fawcett, T.1
-
29
-
-
14644390912
-
Using AUC and Accuracy in Evaluating Learning Algorithms
-
Mar
-
J. Huang and C. Ling, "Using AUC and Accuracy in Evaluating Learning Algorithms," IEEE Trans. Knowledge and Data Eng, vol. 17, no. 3, pp. 299-310, Mar. 2005.
-
(2005)
IEEE Trans. Knowledge and Data Eng
, vol.17
, Issue.3
, pp. 299-310
-
-
Huang, J.1
Ling, C.2
|