-
1
-
-
33746368833
-
Self-regulating network utilization in mobile ad-hoc wireless networks
-
July
-
S. Ci, M. Guizani, H. H. Chen, and H. Sharif, "Self-regulating network utilization in mobile ad-hoc wireless networks," IEEE Trans. Veh. Technol., vol. 55, no. 4, pp. 1302-1310, July 2006.
-
(2006)
IEEE Trans. Veh. Technol
, vol.55
, Issue.4
, pp. 1302-1310
-
-
Ci, S.1
Guizani, M.2
Chen, H.H.3
Sharif, H.4
-
2
-
-
50949103638
-
A secure routing protocol for heterogeneous sensor networks
-
Nov, San Francisco, CA
-
X. Du, Y. Xiao, S. Guizani, and H. H. Chen, "A secure routing protocol for heterogeneous sensor networks, in Proc. IEEE Globecom '06, Nov. 2006, San Francisco, CA.
-
(2006)
Proc. IEEE Globecom '06
-
-
Du, X.1
Xiao, Y.2
Guizani, S.3
Chen, H.H.4
-
3
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Feb
-
L.R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proceedings of the IEEE, vol. 77, pp. 257-286, Feb. 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, pp. 257-286
-
-
Rabiner, L.R.1
-
5
-
-
77953783421
-
Investigating hidden Markov models capabilities in anomaly detection
-
Kennesaw, GA, Mar
-
S. S. Joshi and V. V. Phoha, "Investigating hidden Markov models capabilities in anomaly detection," in Proc. 43rd Annual Southeast Regional Conf. (ACM-SE43), Kennesaw, GA, Mar. 2005, pp. 98-103.
-
(2005)
Proc. 43rd Annual Southeast Regional Conf. (ACM-SE43)
, pp. 98-103
-
-
Joshi, S.S.1
Phoha, V.V.2
-
6
-
-
43949095092
-
Using hidden Markov models to evaluate the risks of intrusions: System, architecture and model validation
-
Hamburg, Germany, Sep
-
A. Arnes, F. Valeur, G. Vigna, and R. Kemmerer, "Using hidden Markov models to evaluate the risks of intrusions: System, architecture and model validation," in Proc. Int. Symp. Recent Advances in Intrusion Detection (RAID), Hamburg, Germany, Sep. 2006.
-
(2006)
Proc. Int. Symp. Recent Advances in Intrusion Detection (RAID)
-
-
Arnes, A.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
7
-
-
84969506768
-
Applications of hidden Markov models to detecting multi-stage network attacks
-
Hamburg, Germany, Jan
-
D. Ourston, S. Matzner, W. Stump, and B. Hopkins, "Applications of hidden Markov models to detecting multi-stage network attacks," in Proc. 36th Annual Hawaii Int. Conf. (System Sciences, 2003), Hamburg, Germany, Jan. 2003.
-
(2003)
Proc. 36th Annual Hawaii Int. Conf. (System Sciences, 2003)
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
8
-
-
6344239144
-
Modeling program behaviors by hidden Markov models for intrusion detection
-
Aug
-
W. Wang, X. -H. Guan, and X.-L. Zhang, "Modeling program behaviors by hidden Markov models for intrusion detection," in Proc. Int. Conf. Machine Learning and Cybernetics, 2004, Aug. 2004, pp. 2830-2835.
-
(2004)
Proc. Int. Conf. Machine Learning and Cybernetics, 2004
, pp. 2830-2835
-
-
Wang, W.1
Guan, X.-H.2
Zhang, X.-L.3
-
9
-
-
35048846516
-
Behavioral Intrusion Detection
-
S. Zanero, "Behavioral Intrusion Detection," in In ISCIS 2004, 2004.
-
(2004)
In ISCIS 2004
-
-
Zanero, S.1
-
11
-
-
29844441257
-
A data mining analysis of RTID alarms
-
Purdue Univ, West Lafayette, Indiana, USA, Sep
-
S. Manganaris, M. Christensen, D. Serkle, and K. Hermix, "A data mining analysis of RTID alarms," 2nd Int. Workshop Recent Advances in Intrusion Detection, Purdue Univ., West Lafayette, Indiana, USA, Sep. 1999.
-
(1999)
2nd Int. Workshop Recent Advances in Intrusion Detection
-
-
Manganaris, S.1
Christensen, M.2
Serkle, D.3
Hermix, K.4
-
12
-
-
0030126609
-
Learning in the presence of concept drifting and hidden contexts
-
G. Widmer and M. Kubat, "Learning in the presence of concept drifting and hidden contexts," Machine Learning, vol. 23, pp. 69-101, 1996.
-
(1996)
Machine Learning
, vol.23
, pp. 69-101
-
-
Widmer, G.1
Kubat, M.2
-
13
-
-
12244286335
-
Systematic data selection to mine concept-drifting data streams
-
W. Fan, "Systematic data selection to mine concept-drifting data streams," ACM SIGKDD, 2004.
-
(2004)
ACM SIGKDD
-
-
Fan, W.1
-
16
-
-
0030287048
-
The expectation-maximization algorithm
-
Nov
-
T. K. Moon, "The expectation-maximization algorithm," IEEE Signal Processing Magazine, pp. 47-59, Nov. 1996.
-
(1996)
IEEE Signal Processing Magazine
, pp. 47-59
-
-
Moon, T.K.1
|