-
1
-
-
41749100419
-
-
J.P. Anderson, Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., 1980.
-
J.P. Anderson, Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co., 1980.
-
-
-
-
2
-
-
0033281215
-
-
S. Axelsson, The base-rate fallacy and its implications for the intrusion detection, in: Proceedings of the 6th ACM Conference on Computer and Communications Security, Kent Ridge Digital Labs, Singapore, 1999, pp. 1-7.
-
S. Axelsson, The base-rate fallacy and its implications for the intrusion detection, in: Proceedings of the 6th ACM Conference on Computer and Communications Security, Kent Ridge Digital Labs, Singapore, 1999, pp. 1-7.
-
-
-
-
3
-
-
0242614019
-
Data mining for improving intrusion detection
-
Technical report, MITRE Corporation
-
E. Bloedorn, B. Hill, A. Christiansen, C. Skorupka, L. Talbot and J. Tivel, Data mining for improving intrusion detection, Technical report, MITRE Corporation, 2000.
-
(2000)
-
-
Bloedorn, E.1
Hill, B.2
Christiansen, A.3
Skorupka, C.4
Talbot, L.5
Tivel, J.6
-
4
-
-
85149612939
-
Fast effective rule induction
-
Armand Prieditis and Stuart Russell, editors, Tahoe City, CA, Morgan Kaufmann Publishers
-
W.W. Cohen, Fast effective rule induction, In Armand Prieditis and Stuart Russell, editors, Proceedings of the 12th International Conference on Machine Learning, Tahoe City, CA, 1995. Morgan Kaufmann Publishers, 115-123.
-
(1995)
Proceedings of the 12th International Conference on Machine Learning
, pp. 115-123
-
-
Cohen, W.W.1
-
7
-
-
0038289761
-
Fusing a heterogeneous alert stream into scenarios
-
Philadelphia, PA
-
O. Dain and R.K. Cunningham, Fusing a heterogeneous alert stream into scenarios, in: Proceedings of the 2001 ACM Workshop on Data Mining for Security Application, Philadelphia, PA, 2001, 1-13.
-
(2001)
Proceedings of the 2001 ACM Workshop on Data Mining for Security Application
, pp. 1-13
-
-
Dain, O.1
Cunningham, R.K.2
-
8
-
-
84947561772
-
Aggregation and correlation of intrusion-detection alerts
-
Springer-Verlag
-
H. Debar and A. Wespi, Aggregation and correlation of intrusion-detection alerts, in: Recent Advances in Intrusion Detection (RAID2001), (Vol. 2212) of Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 85-103.
-
(2001)
Recent Advances in Intrusion Detection (RAID2001), (Vol. 2212) of Lecture Notes in Computer Science
, pp. 85-103
-
-
Debar, H.1
Wespi, A.2
-
13
-
-
84974663208
-
-
W. Fan, W. Lee, S.J. Stolfo and M. Miller, A multiple model cost-sensitive approach for intrusion detection, in: Proceedings of the ECML 2000, 11th European Conference on Machine Learning, (1810) of Lecture Notes in Computer Science, Barcelona, Spain, 2000. Springer-Verlag, pp. 142-153.
-
W. Fan, W. Lee, S.J. Stolfo and M. Miller, A multiple model cost-sensitive approach for intrusion detection, in: Proceedings of the ECML 2000, 11th European Conference on Machine Learning, (Vol. 1810) of Lecture Notes in Computer Science, Barcelona, Spain, 2000. Springer-Verlag, pp. 142-153.
-
-
-
-
14
-
-
0345438685
-
ROC graphs: Notes and practical considerations for researchers (HPL-2003-4)
-
Technical report, HP Laboratories
-
T. Fawcett, ROC graphs: Notes and practical considerations for researchers (HPL-2003-4), Technical report, HP Laboratories, 2003.
-
(2003)
-
-
Fawcett, T.1
-
15
-
-
31844434431
-
Cautious classifiers
-
Valencia, Spain
-
C. Ferri and J. Hernández-Orallo, Cautious classifiers, in: Proceedings of ROC Analysis in Artificial Intelligence, 1st International Workshop (ROCAI-2004), Valencia, Spain, 2004, pp. 27-36.
-
(2004)
Proceedings of ROC Analysis in Artificial Intelligence, 1st International Workshop (ROCAI-2004)
, pp. 27-36
-
-
Ferri, C.1
Hernández-Orallo, J.2
-
16
-
-
77951257727
-
Repairing concavities in ROC curves
-
Bristol, UK
-
P.A. Flach and S. Wu, Repairing concavities in ROC curves, in: Proceedings 2003 UK Workshop on Computational Intelligence, Bristol, UK, 2003, pp. 38-44.
-
(2003)
Proceedings 2003 UK Workshop on Computational Intelligence
, pp. 38-44
-
-
Flach, P.A.1
Wu, S.2
-
17
-
-
84974715602
-
Reducing misclassification costs
-
Lyon, France, Springer Verlag, pp
-
D. Gamberger and N. Lavrač, Reducing misclassification costs, in: Principles of Data Mining and Knowledge Discovery, 4th European Conference (PKDD 2000), (Vol. 1910) of Lecture Notes in Artificial Intelligence, Lyon, France, 2000. Springer Verlag, pp. 34-43.
-
(2000)
Principles of Data Mining and Knowledge Discovery, 4th European Conference (PKDD 2000), (Vol. 1910) of Lecture Notes in Artificial Intelligence
, pp. 34-43
-
-
Gamberger, D.1
Lavrač, N.2
-
18
-
-
0003478316
-
The architecture of a network level intrusion detection system
-
Technical report, University of New Mexico
-
R. Heady, G. Luger, A. Maccabe and M. Servilla, The architecture of a network level intrusion detection system, Technical report, University of New Mexico, 1990.
-
(1990)
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
22
-
-
1942452386
-
Improving accuracy and cost of two-class and multi-class probabilistic classifiers using ROC curves
-
Washington, DC, AAAI, pp, Press
-
N. Lachiche and P. Flach, Improving accuracy and cost of two-class and multi-class probabilistic classifiers using ROC curves, in: Proceedings of the Twentieth International Conference on Machine Learning (ICML-2003), Washington, DC, 2003. AAAI, pp. 609-616. Press.
-
(2003)
Proceedings of the Twentieth International Conference on Machine Learning (ICML-2003)
, pp. 609-616
-
-
Lachiche, N.1
Flach, P.2
-
25
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
W. Lee, W. Fan, M. Miller, S.J. Stolfo and E. Zadok, Toward cost-sensitive modeling for intrusion detection and response, Journal of Computer Security 10(1-2) (2002), 5-22.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
26
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
R. Lippmann, J.W. Haines, D.J. Fried, J. Korba and K. Das, The 1999 DARPA off-line intrusion detection evaluation, Computer Networks: The International Journal of Computer and Telecommunications Networking 34(4) (2000), 579-595.
-
(2000)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
27
-
-
84958970105
-
The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection
-
Recent Advances in Intrusion Detection RAID2002, of, Springer-Verlag
-
R. Lippmann, S. Webster and D. Stetson, The effect of identifying vulnerabilities and patching software on the utility of network intrusion detection, in: Recent Advances in Intrusion Detection (RAID2002), volume 2516 of Lecture Notes in Computer Science, Springer-Verlag, 2002, pp. 307-326.
-
(2002)
Lecture Notes in Computer Science
, vol.2516
, pp. 307-326
-
-
Lippmann, R.1
Webster, S.2
Stetson, D.3
-
28
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Hilton Head, SC
-
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham and M.A. Zissman, Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation, in: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, (Vol. 1),Hilton Head, SC, 2000, pp. 1012-1035.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 1012-1035
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
29
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
Springer-Verlag
-
M.V. Mahoney and RK. Chan, An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection, in: Recent Advances in Intrusion Detection (RAID2003), (Vol. 2820) of Lecture Notes in Computer Science, Springer-Verlag, 2003, pp. 220-237.
-
(2003)
Recent Advances in Intrusion Detection (RAID2003), (Vol. 2820) of Lecture Notes in Computer Science
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, R.K.2
-
30
-
-
84884637057
-
Incremental learning with partial instance memory
-
Springer-Verlag
-
M.A. Maloof and R.S. Michalski, Incremental learning with partial instance memory, in: Proceedings of Foundations of Intelligent Systems: 13th International Symposium, ISMIS 2002, (Vol. 2366) of Lecture Notes in Artificial Intelligence, Springer-Verlag, 2002, pp. 16-27.
-
(2002)
Proceedings of Foundations of Intelligent Systems: 13th International Symposium, ISMIS 2002, (Vol. 2366) of Lecture Notes in Artificial Intelligence
, pp. 16-27
-
-
Maloof, M.A.1
Michalski, R.S.2
-
31
-
-
0034301662
-
A data mining analysis of RTID alarms
-
Oct
-
S. Manganaris, M. Christensen, D. Zerkle and K. Hermiz, A data mining analysis of RTID alarms, Computer Networks: The International Journal of Computer and Telecommunications Networking 34(4) (Oct. 2000), 571-577.
-
(2000)
Computer Networks: The International Journal of Computer and Telecommunications Networking
, vol.34
, Issue.4
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
33
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
J. McHugh, Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security 3 (2001), 262-294.
-
(2001)
ACM Transactions on Information and System Security
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
35
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
Springer-Verlag
-
B. Morin, L. Mé, H. Debar and M. Ducasse, M2D2: A formal data model for IDS alert correlation, in: Recent Advances in Intrusion Detection (RAID2002), (Vol. 2516) of Lecture Notes in Computer Science, Springer-Verlag, 2002, pp. 115-137.
-
(2002)
Recent Advances in Intrusion Detection (RAID2002), (Vol. 2516) of Lecture Notes in Computer Science
, pp. 115-137
-
-
Morin, B.1
Mé, L.2
Debar, H.3
Ducasse, M.4
-
37
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, Bro: A system for detecting network intruders in real-time, Computer Networks 31(23-24) (1999), 2435-2463.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
38
-
-
0011928208
-
Trading off coverage for accuracy in forecasts: Applications to clinical data analysis
-
Stanford, CA
-
M.J. Pazzani, P. Murphy, K. Ali and D. Schulenburg, Trading off coverage for accuracy in forecasts: Applications to clinical data analysis, in: Proceedings of AAAI Symposium on AI in Medicine, Stanford, CA, 1994, pp. 106-110.
-
(1994)
Proceedings of AAAI Symposium on AI in Medicine
, pp. 106-110
-
-
Pazzani, M.J.1
Murphy, P.2
Ali, K.3
Schulenburg, D.4
-
39
-
-
26444436687
-
Using adaptive alert classification to reduce false positives in intrusion detection
-
Sophia Antipolis, France, Springer-Verlag, pp
-
T. Pietraszek, Using adaptive alert classification to reduce false positives in intrusion detection, in: Recent Advances in Intrusion Detection (RAID2004), (Vol. 3324) of Lecture Notes in Computer Science, Sophia Antipolis, France, 2004. Springer-Verlag, pp. 102-124.
-
(2004)
Recent Advances in Intrusion Detection (RAID2004), (Vol. 3324) of Lecture Notes in Computer Science
, pp. 102-124
-
-
Pietraszek, T.1
-
40
-
-
31844448403
-
Optimizing abstaining classifiers using ROC analysis
-
Bonn, Germany
-
T. Pietraszek, Optimizing abstaining classifiers using ROC analysis, in: Machine Learning, Proceedings of the Twenty-second International Conference (ICML 2005), Bonn, Germany, 2005, pp. 665-672.
-
(2005)
Machine Learning, Proceedings of the Twenty-second International Conference (ICML 2005)
, pp. 665-672
-
-
Pietraszek, T.1
-
41
-
-
41749122197
-
On the optimization of abstaining classifiers using ROC analysis
-
to appear
-
T. Pietraszek, On the optimization of abstaining classifiers using ROC analysis, Machine Learning Journal, (to appear), 2006.
-
(2006)
Machine Learning Journal
-
-
Pietraszek, T.1
-
44
-
-
33845533135
-
Multi-stage classification
-
Houston, TX, IEEE Computer Society, pp
-
T.E. Senator, Multi-stage classification, in: Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), Houston, TX, 2005. IEEE Computer Society, pp. 386-393.
-
(2005)
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005)
, pp. 386-393
-
-
Senator, T.E.1
-
45
-
-
14844324904
-
Enhancing byte-level network intrusion detection signatures with context
-
Washington, DC
-
R. Sommer and V. Paxson, Enhancing byte-level network intrusion detection signatures with context, in: Proceedings of the 10th ACM Conference on Computer and Communication Security, Washington, DC, 2003, pp. 262-271.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 262-271
-
-
Sommer, R.1
Paxson, V.2
-
47
-
-
84947603083
-
Probabilistic alert correlation
-
Springer-Verlag
-
A. Valdes and K. Skinner, Probabilistic alert correlation, in: Recent Advances in Intrusion Detection (RAID2001), (Vol. 2212) of Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 54-68.
-
(2001)
Recent Advances in Intrusion Detection (RAID2001), (Vol. 2212) of Lecture Notes in Computer Science
, pp. 54-68
-
-
Valdes, A.1
Skinner, K.2
-
48
-
-
84947286061
-
Measuring false-positive by automated real-time correlated hacking behavior analysis
-
Springer-Verlag
-
J. Wang and I. Lee, Measuring false-positive by automated real-time correlated hacking behavior analysis, in: Information Security 4th International Conference, (Vol. 2200) of Lecture Notes in Computer Science, Springer-Verlag, 2001, pp. 512-535.
-
(2001)
Information Security 4th International Conference, (Vol. 2200) of Lecture Notes in Computer Science
, pp. 512-535
-
-
Wang, J.1
Lee, I.2
|