-
1
-
-
35148838611
-
-
S. Northcutt, J. Novak, Network Intrusion Detection, SAMS, third ed., ISBN: 0735712654, 2002.
-
-
-
-
3
-
-
35148876603
-
-
Australian Crime and Security Survey, ISBN: 1-864-99800-8.
-
-
-
-
4
-
-
35148867561
-
-
Worldwide ISP Security Report, Arbor Networks, September 2005.
-
-
-
-
5
-
-
31544436627
-
Denial-of-Service attack-detection techniques
-
Carl G., Kesidis G., Brooks R., and Rai S. Denial-of-Service attack-detection techniques. IEEE Internet Computing 10 1 (2006) 82-89
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.3
Rai, S.4
-
6
-
-
0027668428
-
Statistical foundations of audit trail analysis for the detection of computer misuse
-
Helman P., and Liepins G. Statistical foundations of audit trail analysis for the detection of computer misuse. IEEE Transactions on Software Engineering 19 9 (1993)
-
(1993)
IEEE Transactions on Software Engineering
, vol.19
, Issue.9
-
-
Helman, P.1
Liepins, G.2
-
7
-
-
35148861744
-
-
D. Dasgupta, F.A. Gonzalez, An intelligent decision support system for intrusion detection, in: Proceedings of the International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS), LCNS, 21-23, St. Petersbourg, Russia.
-
-
-
-
8
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
Ye N., Li X., Chen Q., Emran S., and Xu M. Probabilistic techniques for intrusion detection based on computer audit data. IEEE Transactions on Systems, Man and Cybernetics - Part A: Systems and Humans 31 4 (2001)
-
(2001)
IEEE Transactions on Systems, Man and Cybernetics - Part A: Systems and Humans
, vol.31
, Issue.4
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.4
Xu, M.5
-
9
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
Ye N., Emran S., Chen Q., and Vilbert S. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions on Computers 51 7 (2002)
-
(2002)
IEEE Transactions on Computers
, vol.51
, Issue.7
-
-
Ye, N.1
Emran, S.2
Chen, Q.3
Vilbert, S.4
-
10
-
-
35148837685
-
-
C. Taylor, J. Alves-Foss, NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach, NSPW'01, September 10-13th, 2002, Cloudcroft, New Mexico, U.S.A.
-
-
-
-
11
-
-
0242456133
-
-
C. Taylor, J. Alves-Foss, An Empirical Analysis of NATE - Network Analysis of Anomalous Traffic Events, New Security Paradigms Workshop'02, September 23-26, 2002, Virginia Beach, Virginia.
-
-
-
-
12
-
-
35148865754
-
-
W. DuMouchel, M. Schonlau, A comparison of test statistics for computer intrusion detection based on principal component regression of transition probabilities, in: Proceedings of 2002 IEEE International Conference on Image Processing (ICIP 2002), vol. 2, New York, USA, 2002, pp. 925-928.
-
-
-
-
13
-
-
0029232080
-
-
S. Staniford-Chen, L.T. Heberlein, Holding intruders accountable on the internet, in: Proceedings of the 1995 IEEE Symposium on Security and Privacy, Oakland, Canada,1995, pp. 39-49.
-
-
-
-
14
-
-
0037832491
-
-
H. Shah, J. Undercoffer, A. Joshi, Fuzzy clustering for intrusion detection, in: Proceedings of the IEEE International Conference on Fuzzy Systems. St. Louis, MO, May 2003.
-
-
-
-
15
-
-
35148891295
-
-
Y. Meyer, Ondelettes et Opérateurs," Hermann, ISBN: 2 7056 6125 0 - 186, Paris, 1990.
-
-
-
-
16
-
-
0024700097
-
A theory of multiresolution signal decomposition: the wavelet representation
-
Mallat S.G. A theory of multiresolution signal decomposition: the wavelet representation. IEEE Transactions PAMI 2 7 (1989) 674-693
-
(1989)
IEEE Transactions PAMI
, vol.2
, Issue.7
, pp. 674-693
-
-
Mallat, S.G.1
-
17
-
-
35148837211
-
A discrete-time multiresolution theory unifying octave-band filter banks, pyramid and wavelet transforms
-
Rioul O. A discrete-time multiresolution theory unifying octave-band filter banks, pyramid and wavelet transforms. IEEE Transactions on ASSP (1990)
-
(1990)
IEEE Transactions on ASSP
-
-
Rioul, O.1
-
18
-
-
35148841074
-
-
S. Jaffard, Exposants de Holder en des Points Donnés et Coefficients d'Ondelettes," Notes au Compte-Rendu de l'Acad 'emie des Sciences, France, vol. 308, S 'erie I, 1989, pp. 79-81.
-
-
-
-
20
-
-
35148814043
-
-
B. Schneier, Secrets and Lies: Digital Security in a Networked World, John Wiley & Sons, ISBN: 0471253111, 2001.
-
-
-
-
21
-
-
0001544864
-
Fractal functions and wavelet expansions based on several scaling functions
-
Geronimo J., Hardin D., and Massopust P.R. Fractal functions and wavelet expansions based on several scaling functions. Journal of Approximation Theory 78 (1994) 373-401
-
(1994)
Journal of Approximation Theory
, vol.78
, pp. 373-401
-
-
Geronimo, J.1
Hardin, D.2
Massopust, P.R.3
|