-
1
-
-
34248179145
-
-
ACM KDD CUP Center, .
-
-
-
-
3
-
-
1642354476
-
-
Sage Publications, Thousand Oaks, CA
-
Borooah V.K. Logit and probit (2002), Sage Publications, Thousand Oaks, CA
-
(2002)
Logit and probit
-
-
Borooah, V.K.1
-
4
-
-
0032142103
-
Query construction for user-guided knowledge discovery in databases
-
Chen Z., and Zhu Q. Query construction for user-guided knowledge discovery in databases. Information Sciences 109 1-4 (1998) 49-64
-
(1998)
Information Sciences
, vol.109
, Issue.1-4
, pp. 49-64
-
-
Chen, Z.1
Zhu, Q.2
-
5
-
-
34248231366
-
-
D. Dagon, X. Oin, G. Gu, and W. Lee, HoneyStat: Local worm detection using honeypots. Georgia Institute of Technology, 2005.
-
-
-
-
7
-
-
34248173041
-
-
Discriminant Function Analysis. .
-
-
-
-
8
-
-
0038324535
-
-
Kluwer
-
Eskin E., Arnold A., Prerau M., Portnoy L., and Stolfo S. A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. Applications of Data Mining in Computer Security (2002), Kluwer
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
10
-
-
0030953391
-
A review of methods for the assessment of prediction errors in conservation presence/absence models
-
Fielding A.H., and Bell J.F. A review of methods for the assessment of prediction errors in conservation presence/absence models. Environmental Conservation 24 (1997) 38-49
-
(1997)
Environmental Conservation
, vol.24
, pp. 38-49
-
-
Fielding, A.H.1
Bell, J.F.2
-
11
-
-
33750972001
-
Anomaly detection in web documents using crisp and fuzzy-based cosine clusteringnext term methodology
-
Friedman M., Last M., Makover Y., and Kandel A. Anomaly detection in web documents using crisp and fuzzy-based cosine clusteringnext term methodology. Information Sciences 177 2 (2007) 467-475
-
(2007)
Information Sciences
, vol.177
, Issue.2
, pp. 467-475
-
-
Friedman, M.1
Last, M.2
Makover, Y.3
Kandel, A.4
-
13
-
-
0033101994
-
Logical second order models: Achieving synergy between computer power and human reason
-
Gim G., and Whalen T. Logical second order models: Achieving synergy between computer power and human reason. Information Sciences 114 1-4 (1999) 81-104
-
(1999)
Information Sciences
, vol.114
, Issue.1-4
, pp. 81-104
-
-
Gim, G.1
Whalen, T.2
-
15
-
-
0002331476
-
On the formulation of empirical models in dynamic econometrics
-
Hendry D., and Richard J. On the formulation of empirical models in dynamic econometrics. Journal of Econometrics 20 (1982) 193-220
-
(1982)
Journal of Econometrics
, vol.20
, pp. 193-220
-
-
Hendry, D.1
Richard, J.2
-
16
-
-
34248225458
-
-
D. Hendry, Econometric methodology, Econometric Society Fifth World Congress MIT 1985.
-
-
-
-
17
-
-
3242738586
-
Recent advances in access control models
-
Olivier M.S., and Spooner D.L. (Eds), Kluwer Academic Publishers, Boston
-
Jajodia S., and Wijesekera D. Recent advances in access control models. In: Olivier M.S., and Spooner D.L. (Eds). Database and Application Security XV (2002), Kluwer Academic Publishers, Boston 3-15
-
(2002)
Database and Application Security XV
, pp. 3-15
-
-
Jajodia, S.1
Wijesekera, D.2
-
19
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security 6 9 (2003) 443-471
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.9
, pp. 443-471
-
-
Julisch, K.1
-
20
-
-
34248148176
-
-
KDD Cup 1999 Data, 1999, University of California, Irvine, .
-
-
-
-
22
-
-
0004200962
-
-
Sage Publications, Thousand Oaks, CA
-
Klecka W. Discriminant Analysis (1980), Sage Publications, Thousand Oaks, CA
-
(1980)
Discriminant Analysis
-
-
Klecka, W.1
-
23
-
-
33845768389
-
Learning to detect and classify malicious executables in the wild
-
Kolter J., and Maloof M. Learning to detect and classify malicious executables in the wild. Journal of Machine Learning Research 7 (2006) 2721-2744
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2721-2744
-
-
Kolter, J.1
Maloof, M.2
-
25
-
-
0017360990
-
The measurement of observer agreement for categorical data
-
Landis J.R., and Koch G. The measurement of observer agreement for categorical data. Biometrics 33 (1977) 159-174
-
(1977)
Biometrics
, vol.33
, pp. 159-174
-
-
Landis, J.R.1
Koch, G.2
-
26
-
-
84874124494
-
-
P. Laskov, K. Rieck, C. Schfer, K. Mller, Visualization of anomaly detection using prediction sensitivity. In Sicherheit 2005 (Sicherheit - Schutz und Zuverlssigkeit), 2. Jahrestagung des FB Sicherheit der GI, 2005, pp. 197-208.
-
-
-
-
27
-
-
33748205931
-
Genetically optimized fuzzy polynomial neural networks with fuzzy set-based polynomial neurons
-
Oh S., Pedrycz W., and Roh S. Genetically optimized fuzzy polynomial neural networks with fuzzy set-based polynomial neurons. Information Sciences 176 23 (2006) 3490-3519
-
(2006)
Information Sciences
, vol.176
, Issue.23
, pp. 3490-3519
-
-
Oh, S.1
Pedrycz, W.2
Roh, S.3
-
28
-
-
13544276813
-
A database clustering methodology and tool
-
Ryu T.W., and Eick C. A database clustering methodology and tool. Information Sciences 171 1-3 (2005) 29-59
-
(2005)
Information Sciences
, vol.171
, Issue.1-3
, pp. 29-59
-
-
Ryu, T.W.1
Eick, C.2
-
29
-
-
0041189144
-
An evaluation of the corporate takeover model using neural networks. Intelligent Systems in Accounting
-
Sen T., and Gibbs A. An evaluation of the corporate takeover model using neural networks. Intelligent Systems in Accounting. Finance and Management 3 4 (1994) 279-292
-
(1994)
Finance and Management
, vol.3
, Issue.4
, pp. 279-292
-
-
Sen, T.1
Gibbs, A.2
-
32
-
-
34248167719
-
-
A. Sundaram, An introduction to intrusion detection, 1996, .
-
-
-
-
33
-
-
84944178665
-
Hierarchical grouping to optimize an objective function
-
Ward J.W. Hierarchical grouping to optimize an objective function. Journal of the American Statistical Association 58 (1963) 236-244
-
(1963)
Journal of the American Statistical Association
, vol.58
, pp. 236-244
-
-
Ward, J.W.1
-
34
-
-
33646150192
-
A scalable supervised algorithm for dimensionality reduction on streaming data
-
Yana J., Zhangb B., Yana S., Liuc N., Yangd Q., Chenga Q., Lie H., Chenb Z., and Ma W. A scalable supervised algorithm for dimensionality reduction on streaming data. Information Sciences 176 14 (2006) 2042-2065
-
(2006)
Information Sciences
, vol.176
, Issue.14
, pp. 2042-2065
-
-
Yana, J.1
Zhangb, B.2
Yana, S.3
Liuc, N.4
Yangd, Q.5
Chenga, Q.6
Lie, H.7
Chenb, Z.8
Ma, W.9
-
35
-
-
44949084798
-
A fuzzy anomaly detection algorithm for IPv6
-
Yao L., ZhiTang L., and Shuyu L. A fuzzy anomaly detection algorithm for IPv6. Semantics, Knowledge, and Grid, SKG '06 (2006) 67
-
(2006)
Semantics, Knowledge, and Grid, SKG '06
, pp. 67
-
-
Yao, L.1
ZhiTang, L.2
Shuyu, L.3
|