-
1
-
-
0004048154
-
Computer security threat monitoring and surveillance
-
Technical report, National Institute of Standards and Technology
-
J. P. Anderson. Computer security threat monitoring and surveillance. Technical report, National Institute of Standards and Technology, 1980.
-
(1980)
-
-
Anderson, J.P.1
-
2
-
-
38149079272
-
Understanding the insider threat
-
Santa Monica, CA, USA, RAND National Security Research Division
-
R. C. Brackney and R. H. Anderson. Understanding the insider threat. In Proceedings of a March 2004 Workshop, pages 1-137, Santa Monica, CA, USA, 2004. RAND National Security Research Division.
-
(2004)
Proceedings of a March 2004 Workshop
, pp. 1-137
-
-
Brackney, R.C.1
Anderson, R.H.2
-
3
-
-
84893496533
-
-
J. D. Brutlag. Aberrant behavior detection in time series for network monitoring. In LISA '00: Proceedings of the 14th USENIX Conference on System Administration, pages 139-146, Berkeley, CA, USA, 2000. USENIX Association.
-
J. D. Brutlag. Aberrant behavior detection in time series for network monitoring. In LISA '00: Proceedings of the 14th USENIX Conference on System Administration, pages 139-146, Berkeley, CA, USA, 2000. USENIX Association.
-
-
-
-
4
-
-
0033712953
-
Statistical traffic modeling for network intrusion detection
-
Washington, DC, USA, IEEE
-
J. B. D. Cabrera, B. Ravichandran, and R. K. Mehra. Statistical traffic modeling for network intrusion detection. In Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pages 466-473, Washington, DC, USA, 2000. IEEE.
-
(2000)
Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
, pp. 466-473
-
-
Cabrera, J.B.D.1
Ravichandran, B.2
Mehra, R.K.3
-
5
-
-
34548255772
-
Geo::distance perl module, 2005. Retreived on
-
October 8, from http:///bluefeet/Geo-Distance-0.11/Distance.pm
-
A. C Deltac. Geo::distance perl module, 2005. Retreived on October 8, 2006 from http://search.cpan.org/bluefeet/Geo-Distance-0.11/Distance.pm.
-
(2006)
-
-
Deltac, A.C.1
-
6
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
IEEE
-
M.-S. Kim, H.-J. Kang, S.-C. Hong, S.-H. Chung, and J. W. Hong. A flow-based method for abnormal network traffic detection. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium, pages 599-612. IEEE, 2004.
-
(2004)
Proceedings of the IEEE/IFIP Network Operations and Management Symposium
, pp. 599-612
-
-
Kim, M.-S.1
Kang, H.-J.2
Hong, S.-C.3
Chung, S.-H.4
Hong, J.W.5
-
7
-
-
34548291842
-
-
K. Leung and C Leckie. Unsupervised anomaly detection in network intrusion detection using clusters. In Proc. 28th Australasian CS Conf., 38 of CRPITV, 2005.
-
K. Leung and C Leckie. Unsupervised anomaly detection in network intrusion detection using clusters. In Proc. 28th Australasian CS Conf., volume 38 of CRPITV, 2005.
-
-
-
-
8
-
-
34548292849
-
-
Retrieved on October 8, 2006 from
-
MaxMind. Geolite city, 2006. Retrieved on October 8, 2006 from http://www.maxmind.com/app/geolitecity.
-
(2006)
-
-
-
9
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. A CM Trans
-
J. McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. A CM Trans. Inf. Syst. Secur., 3(4):262-294, 2000.
-
(2000)
Inf. Syst. Secur
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
10
-
-
34548289755
-
-
P. Meli, V. Hu, R. Lippmann, J. Haines, and M. Zissman. An overview of issues in testing intrusion detection systems. 2003. NIST IR 7046.
-
P. Meli, V. Hu, R. Lippmann, J. Haines, and M. Zissman. An overview of issues in testing intrusion detection systems. 2003. NIST IR 7046.
-
-
-
-
15
-
-
34548252775
-
-
N. Z. University of Waikato. Waikato environment for data analysis v3.5.3, 2005. Retrieved on October 8, 2006 from http://www.cs.waikato.ac.nz/ml/ weka/.
-
N. Z. University of Waikato. Waikato environment for data analysis v3.5.3, 2005. Retrieved on October 8, 2006 from http://www.cs.waikato.ac.nz/ml/ weka/.
-
-
-
-
16
-
-
0003957032
-
Data Mining: Practical Machine Learning Tools and Techniques
-
Morgan Kaufmann, second edition, June
-
I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann, second edition, June 2005.
-
(2005)
Morgan Kaufmann Series in Data Management Systems
-
-
Witten, I.H.1
Frank, E.2
|