-
1
-
-
2442424268
-
Naive Bayes vs decision trees in intrusion detection systems
-
ACM Press, New York, NY, USA
-
Amor N.B., Benferhat S., and Elouedi Z. Naive Bayes vs decision trees in intrusion detection systems. SAC '04: Proceedings of the 2004 ACM Symposium on Applied Computing (2004), ACM Press, New York, NY, USA 420-424
-
(2004)
SAC '04: Proceedings of the 2004 ACM Symposium on Applied Computing
, pp. 420-424
-
-
Amor, N.B.1
Benferhat, S.2
Elouedi, Z.3
-
2
-
-
0142253852
-
-
Barbara, D., Couto, J., Jajodia, S., Wu, N., 2001. Adam: a testbed for exploring the use of data mining in intrusion detection. In: Special Section on Data Mining for Intrusion Detection and Threat Analysis, vol. 30(4). ACM Press, New York, NY, USA, pp. 15-24.
-
-
-
-
3
-
-
33947159933
-
-
Chan, P.K., Mahoney, M.V., Arshad, M.H., 2003. A machine learning approach to anomaly detection. Technical Report, Florida Institute of Technology.
-
-
-
-
5
-
-
33947169090
-
-
EU Parliament, 1997. Directives 97/46/CE and 97/66/CE.
-
-
-
-
6
-
-
33947170849
-
-
Fawcett, T., 2003. ROC graphs: notes and practical considerations for researchers. Technical Report, HP Laboratories.
-
-
-
-
7
-
-
38849181778
-
-
García Adeva, J.J., 2006. Serving text-mining functionalities with the software architecture Plato. Proceedings of the International Conference on Computational Intelligence for Modelling, Control and Automation. IEEE Computer Society, in press.
-
-
-
-
9
-
-
33947161309
-
-
Hearst, M.A., 1999. Untangling text data mining. In: Proceedings of the 37th Conference on Association for Computational Linguistics. Association for Computational Linguistics, College Park, Maryland, pp. 3-10.
-
-
-
-
10
-
-
33947168586
-
-
Howard, J.D., 1998. An analysis of security incidents on the internet 1989-1995. Ph.D. Thesis, Carnegie Mellon University, Pittsburgh, PA, USA.
-
-
-
-
11
-
-
33947172316
-
-
Kumar, S., Spafford, E., 1994. An application of pattern matching in intrusion detection. Technical Report 94-013, Department of Computer Sciences, Purdue University.
-
-
-
-
13
-
-
85084163349
-
-
Lee, W., Stolfo, S., 1998. Data mining approaches for intrusion detection. In: Proceedings of the Seventh USENIX Security Symposium, San Antonio, TX.
-
-
-
-
14
-
-
84957069091
-
Naive (Bayes) at forty: the independence assumption in information retrieval
-
Nédellec C., and Rouveirol C. (Eds), Springer, Heidelberg, DE, Chemnitz, DE
-
Lewis D.D. Naive (Bayes) at forty: the independence assumption in information retrieval. In: Nédellec C., and Rouveirol C. (Eds). Proceedings of ECML-98, 10th European Conference on Machine Learning (1998), Springer, Heidelberg, DE, Chemnitz, DE 4-15
-
(1998)
Proceedings of ECML-98, 10th European Conference on Machine Learning
, pp. 4-15
-
-
Lewis, D.D.1
-
15
-
-
0034300783
-
Towards trapping wily intruders in the large
-
Mansfield G., Ohta K., Takei Y., Kato N., and Nemoto Y. Towards trapping wily intruders in the large. Computer Networks 34 4 (2000) 659-670
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 659-670
-
-
Mansfield, G.1
Ohta, K.2
Takei, Y.3
Kato, N.4
Nemoto, Y.5
-
16
-
-
33947159487
-
-
McCallum, A., Nigam, K., 1998. A comparison of event models for Naive Bayes text classification. In: Proceedings of AAAI-98 Workshop on Learning for Text Categorization. Madison, Wisconsin, pp. 137-142.
-
-
-
-
17
-
-
33947112209
-
-
Min. de Administraciones Públicas, 1999. Ley orgánica 15/1999, de 13 de diciembre, de protección de datos de carácter personal.
-
-
-
-
19
-
-
33947155124
-
-
Pikatza, J.M., Larburu, I.U., Sobrado, F.J., García Adeva, J.J., 2002. Arnasa: una forma de desarrollo basado en el dominio en la construcción de un DSS para la gestión del proceso de tratamiento del asma vía Web. In: Seventh Software Engineering and Data Bases Conference (JISBD), Madrid, Spain.
-
-
-
-
20
-
-
0035283313
-
Robust classification for imprecise environments
-
Provost F.J., and Fawcett T. Robust classification for imprecise environments. Machine Learning 42 3 (2001) 203-231
-
(2001)
Machine Learning
, vol.42
, Issue.3
, pp. 203-231
-
-
Provost, F.J.1
Fawcett, T.2
-
21
-
-
7444247458
-
Towards a clinical practice guideline implementation for asthma treatment
-
Sobrado F.J., Pikatza J.M., Larburu I.U., García Adeva J.J., and López de Ipiña D. Towards a clinical practice guideline implementation for asthma treatment. Lecture Notes in Artificial Intelligence 3040 (2004) 587-596
-
(2004)
Lecture Notes in Artificial Intelligence
, vol.3040
, pp. 587-596
-
-
Sobrado, F.J.1
Pikatza, J.M.2
Larburu, I.U.3
García Adeva, J.J.4
López de Ipiña, D.5
-
22
-
-
0028461554
-
An example-based mapping method for text categorization and retrieval
-
Yang Y., and Chute C.G. An example-based mapping method for text categorization and retrieval. ACM Transactions on Information Systems 12 3 (1994) 252-277
-
(1994)
ACM Transactions on Information Systems
, vol.12
, Issue.3
, pp. 252-277
-
-
Yang, Y.1
Chute, C.G.2
-
23
-
-
85024373635
-
-
Yang, Y., Liu, X., 1999. A re-examination of text categorization methods. In: 22nd Annual International SIGIR. Berkeley, pp. 42-49.
-
-
-
|