-
1
-
-
0242624600
-
MET: An Experimental System for Malicious Email Tracking
-
Virginia Beach, VA, September
-
Bhattacharyya, M., Hershkop, S., Eskin, E., and Stolfo, S. J.: "MET: An Experimental System for Malicious Email Tracking." In Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002). Virginia Beach, VA, September, 2002
-
(2002)
Proceedings of the 2002 New Security Paradigms Workshop (NSPW-2002)
-
-
Bhattacharyya, M.1
Hershkop, S.2
Eskin, E.3
Stolfo, S.J.4
-
3
-
-
84976668743
-
Finding all cliques of an undirected graph
-
Bron, C., Kerbosch, J.: Finding all cliques of an undirected graph. Comm. ACM 16(9) (1973) 575-577
-
(1973)
Comm. ACM
, vol.16
, Issue.9
, pp. 575-577
-
-
Bron, C.1
Kerbosch, J.2
-
4
-
-
4143149628
-
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
-
Kluwer
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L. and Stolfo, S. J.: "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data", To Appear in Data Mining for Security Applications. Kluwer (2002)
-
(2002)
Data Mining for Security Applications
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.J.5
-
6
-
-
85141038051
-
Mining Audit Data to Build Intrusion Detection Models
-
New York, NY, August
-
Wenke Lee, Sal Stolfo, and Kui Mok: Mining Audit Data to Build Intrusion Detection Models. In Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD '98), New York, NY, August 1998
-
(1998)
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD '98)
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
8
-
-
35248847204
-
-
MySQL, www.mysql.org (2002)
-
(2002)
MySQL
-
-
-
9
-
-
0027166611
-
The QBIC project: Querying images by content using color, texture, and shape
-
February
-
Niblack, W. et al. "The QBIC project: querying images by content using color, texture, and shape". In Proceedings of the SPIE, February 1993
-
(1993)
Proceedings of the SPIE
-
-
Niblack, W.1
-
10
-
-
35248817577
-
-
Procmail, www.procmail.org (2002)
-
(2002)
Procmail
-
-
-
11
-
-
35248818548
-
-
Sendmail, www.sendmail.org (2002)
-
(2002)
Sendmail
-
-
-
14
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
Las Vegas, NV
-
Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile code. Prof. ACSAC Security Conference, Las Vegas, NV (2002)
-
(2002)
Prof. ACSAC Security Conference
-
-
Williamson, M.M.1
-
16
-
-
0028911698
-
Gauging similarity with n-grams: Language independent categorization of text
-
Damashek, M.: Gauging similarity with n-grams: language independent categorization of text. Science, 267(5199) (1995) 843-848
-
(1995)
Science
, vol.267
, Issue.5199
, pp. 843-848
-
-
Damashek, M.1
-
19
-
-
0012282403
-
Computer Intrusion Detecting Masquerades
-
Schonlau, M., DuMouchel, W., WH Ju, Karr, A.F., M theus and Y. Vardi: Computer Intrusion Detecting Masquerades. Statistical Science, Vol. 16 (2001)
-
(2001)
Statistical Science
, vol.16
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
|