-
1
-
-
84928016636
-
The Base-Rate Fallacy and the Difficulty of Intrusion Detection
-
, pp
-
Axelsson, S. “The Base-Rate Fallacy and the Difficulty of Intrusion Detection,” ACM Transactions on Information and System Security (3:3), 2000, pp. 186-205.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
2
-
-
79957597754
-
Optimal Design of Information Technology (IT) Security Architecture
-
L. Applegate, R. Galliers, and J. I. DeGross (eds.), Barcelona, Spain
-
Cavusoglu, H., Raghunathan, S., and Mishra, B. “Optimal Design of Information Technology (IT) Security Architecture,” in Proceedings of the Twenty-Second International Conference on Information Systems, L. Applegate, R. Galliers, and J. I. DeGross (eds.), Barcelona, Spain, 2002.
-
(2002)
Proceedings of the Twenty-Second International Conference on Information Systems
-
-
Cavusoglu, H.1
Raghunathan, S.2
Mishra, B.3
-
3
-
-
85099376640
-
Security for Information Technology Service Contracts
-
CERT Coordination Center. Security for Information Technology Service Contracts, CERT Security Improvement Modules, 2001.
-
(2001)
CERT Security Improvement Modules
-
-
-
4
-
-
84966620150
-
Testing and Evaluating Computer Intrusion Detection Systems
-
, pp
-
Durst, R., Champion, T., Witten, B., Miller, E., and Spagnuolo, L. “Testing and Evaluating Computer Intrusion Detection Systems,” Communications of the ACM (42:7), 1999, pp. 53-61.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Witten, B.3
Miller, E.4
Spagnuolo, L.5
-
5
-
-
0001936936
-
Strategic Considerations in Auditing
-
October, pp
-
Fellingham, J., and Newman, P. “Strategic Considerations in Auditing,” The Accounting Review (60), October 1985, pp. 634-650.
-
(1985)
The Accounting Review (60)
, pp. 634-650
-
-
Fellingham, J.1
Newman, P.2
-
6
-
-
0034827684
-
Evaluation of Intrusion Detectors: A Decision Theory Approach
-
, pp
-
Gaffney, J. E., and Ulvila, J. W. “Evaluation of Intrusion Detectors: A Decision Theory Approach,” IEEE Symposium on Security and Privacy, 2001, pp. 50-61.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 50-61
-
-
Gaffney, J.E.1
Ulvila, J.W.2
-
7
-
-
85013791758
-
Editor’s Preface
-
, pp
-
Jajodia, S., and Miller, J. “Editor’s Preface,” Journal of Computer Security (16:4), 1993, pp. 43-53.
-
(1993)
Journal of Computer Security
, vol.16
, Issue.4
, pp. 43-53
-
-
Jajodia, S.1
Miller, J.2
-
8
-
-
0031123773
-
A Quantitative Model of Security Intrusion Process Based on Attacker Behavior
-
, pp
-
Jonsson, E., and Olovsson, T. “A Quantitative Model of Security Intrusion Process Based on Attacker Behavior,” IEEE Transactions on Software Engineering (23:4), 1997, pp. 235-245.
-
(1997)
IEEE Transactions on Software Engineering
, vol.23
, Issue.4
, pp. 235-245
-
-
Jonsson, E.1
Olovsson, T.2
-
9
-
-
85138683999
-
-
Lee, W., Fan, W., Miller, M., Stolfo, S., and Zadokm E. “Toward Cost-Sensitive Modeling for Intrusion Detection and Response,” Journal of Computer Security (10:1/2), 2002, pp. 5-22.
-
Lee, W., Fan, W., Miller, M., Stolfo, S., and Zadokm E. “Toward Cost-Sensitive Modeling for Intrusion Detection and Response,” Journal of Computer Security (10:1/2), 2002, pp. 5-22.
-
-
-
-
10
-
-
0034301517
-
The 1999 DARPA Off-Line Intrusion Detection Evaluation
-
, pp
-
Lippmann, R., Haines, J. W., Fried, D. J., Korba, J., and Das, K. “The 1999 DARPA Off-Line Intrusion Detection Evaluation,” Computer Networks (34:4), 2000, pp. 579-595.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
11
-
-
85019691440
-
Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
-
, pp
-
McHugh, J. “Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory,” ACM Transactions on Information and System Security (3:4), 2000, pp. 262-294.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
12
-
-
85138710281
-
-
NMAB. Configuration Management and Performance Verification of Explosives-Detection Systems, Publication NMAB-482-3, National Academy Press, Washington, DC, 1998.
-
NMAB. Configuration Management and Performance Verification of Explosives-Detection Systems, Publication NMAB-482-3, National Academy Press, Washington, DC, 1998.
-
-
-
-
13
-
-
85138728288
-
-
Ortalo, R., Deswarte, Y,m and Kaaniche, M. “Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security,” IEEE Transactions on Software Engineering (25:5), 1999, pp. 633-650.
-
Ortalo, R., Deswarte, Y,m and Kaaniche, M. “Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security,” IEEE Transactions on Software Engineering (25:5), 1999, pp. 633-650.
-
-
-
-
14
-
-
0035521221
-
Bayesian Models for Early Warnings of Bank Failures
-
, pp
-
Sarkar, S., and Sriram, R. “Bayesian Models for Early Warnings of Bank Failures,” Management Science (47:11), 2001, pp. 1457-1475.
-
(2001)
Management Science
, vol.47
, Issue.11
, pp. 1457-1475
-
-
Sarkar, S.1
Sriram, R.2
-
15
-
-
0002438035
-
Estimating Campaign Benefits and Modeling Lift
-
ACM Press, New York, pp
-
Shapiro, G. P., and Masand, B. “Estimating Campaign Benefits and Modeling Lift,” in Proceedings of KDD-99, ACM Press, New York, 1999, pp. 185-193.
-
(1999)
Proceedings of KDD-99
, pp. 185-193
-
-
Shapiro, G.P.1
Masand, B.2
-
16
-
-
1942511463
-
Measuring Lift Quality in Database Marketing
-
, pp
-
Shapiro, G. P., and Steingold, S. “Measuring Lift Quality in Database Marketing,” SIGKDD Explorations (2:2), 2000, pp. 81-86.
-
(2000)
SIGKDD Explorations
, vol.2
, Issue.2
, pp. 81-86
-
-
Shapiro, G.P.1
Steingold, S.2
-
17
-
-
78149295056
-
Measuring Real-Time Predictive Models
-
, pp
-
Steingold, S., Wherry, R., and Shapiro, G. P. “Measuring Real-Time Predictive Models,” in Proceedings of IEEE International Conference on Data Mining, 2001, pp. 649-650.
-
(2001)
Proceedings of IEEE International Conference on Data Mining
, pp. 649-650
-
-
Steingold, S.1
Wherry, R.2
Shapiro, G.P.3
|