-
2
-
-
84885774862
-
A Framework For Constructing Features and Models For Intrusion Detection Systems
-
Lee, W., and Stolfo, S.J. 2000. A Framework For Constructing Features and Models For Intrusion Detection Systems. ACM Transactions on Information and System Security. 3(4):227-261.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
3
-
-
0032639421
-
Detecting Intrusions using System Calls: Alternative Data Models
-
C. Warrender, S. Forrest, and B. A. Pearlmutter, "Detecting Intrusions using System Calls: Alternative Data Models," in IEEE Symposium on Security and Privacy, pp. 133-145, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.A.3
-
4
-
-
33745463455
-
Learning Classifiers for Misuse and Anomaly Detection Using a Bag of Systems Calls Prepresentation
-
West Point, New York, June
-
D. K. Kang, D. Fuller, V. Honavar, "Learning Classifiers for Misuse and Anomaly Detection Using a Bag of Systems Calls Prepresentation," in Proc. of 6th IEEE Information Assurance Workshop, pp. 118-125, West Point, New York, June 2005.
-
(2005)
Proc. of 6th IEEE Information Assurance Workshop
, pp. 118-125
-
-
Kang, D.K.1
Fuller, D.2
Honavar, V.3
-
6
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
3123-24, pp, Dec
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, 31(23-24), pp. 2435-2463, Dec. 1999.
-
(1999)
Computer Networks
, pp. 2435-2463
-
-
Paxson, V.1
-
8
-
-
78149352887
-
A Toolkit for Detecting and Analyzing Malicious Software
-
Las Vegas, Nevada, USA, Dec
-
M. Weber, M. Schmid, M. Schatz, D. Geyer, "A Toolkit for Detecting and Analyzing Malicious Software," Annual Computer Security Applications Conference, Las Vegas, Nevada, USA, Dec. 2002.
-
(2002)
Annual Computer Security Applications Conference
-
-
Weber, M.1
Schmid, M.2
Schatz, M.3
Geyer, D.4
-
9
-
-
33745441630
-
Chpater 3. The MINDS - Minnesota Intrusion Detection System
-
MIT Press
-
Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P., Srivastava, J., Kumar, V., Dokas, P., "Chpater 3. The MINDS - Minnesota Intrusion Detection System," Next Generation Data Mining, MIT Press, 2004.
-
(2004)
Next Generation Data Mining
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.4
Srivastava, J.5
Kumar, V.6
Dokas, P.7
-
10
-
-
85029932967
-
-
J. Pei, S. Upadhyaya, F. Farooq, V. Govindaraju, Data Mining for Intrusion Detection: Techniques, Applications and Systems, In the 20th Int'l Conf. on Data Engineering, Boston, USA, Mar. 2004.
-
J. Pei, S. Upadhyaya, F. Farooq, V. Govindaraju, "Data Mining for Intrusion Detection: Techniques, Applications and Systems," In the 20th Int'l Conf. on Data Engineering, Boston, USA, Mar. 2004.
-
-
-
-
11
-
-
85029937957
-
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data, in book Applications of Data Mining in Computer Security, Kluwer, (Eds. D. Barbara and S. Jajodia), 2002.
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," in book Applications of Data Mining in Computer Security, Kluwer, (Eds. D. Barbara and S. Jajodia), 2002.
-
-
-
-
13
-
-
34249753618
-
Support-Vector Networks
-
C. Cortes and V. Vapnik, "Support-Vector Networks," Machine Learning, vol. 20, no. 3, pp. 273-297, 1995.
-
(1995)
Machine Learning
, vol.20
, Issue.3
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
14
-
-
0003120218
-
Fast Training of Support Vector Machines using Sequential Minimal Optimization
-
J. C. Platt, "Fast Training of Support Vector Machines using Sequential Minimal Optimization," Advances in Kernel Methods: Support Vector Learning, pp. 185-208, 1999.
-
(1999)
Advances in Kernel Methods: Support Vector Learning
, pp. 185-208
-
-
Platt, J.C.1
-
16
-
-
0025725905
-
Instance-based Learning Algorithms
-
D. Aha, D. Kibler, "Instance-based Learning Algorithms, "Machine Learning, vol.6, pp. 37-66, 1991.
-
(1991)
Machine Learning
, vol.6
, pp. 37-66
-
-
Aha, D.1
Kibler, D.2
-
17
-
-
85029926370
-
-
University of New Mexico
-
University of New Mexico, "Computer Immune Systems Project," http://www.cs.unm.edu/~immsec/begin.html, 1997.
-
(1997)
Computer Immune Systems Project
-
-
|