-
1
-
-
37249021738
-
-
Available at
-
Available at http://kdd.ics.uci.edU//databases/kddcup99/kddcup99.html
-
-
-
-
2
-
-
21844449792
-
-
analysis toolbox, Available at
-
Balasko, B., Abonyi, J., Feil, B.: Fuzzy clustering and data analysis toolbox, Available at http://www.fmt.vein.hu/softcomp/fclusttoolbox
-
Fuzzy clustering and data
-
-
Balasko, B.1
Abonyi, J.2
Feil, B.3
-
4
-
-
0039253819
-
LOF: Identifying density-based local outliers
-
Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. SIGMOD Rec. 29(2), 93-104 (2000)
-
(2000)
SIGMOD Rec
, vol.29
, Issue.2
, pp. 93-104
-
-
Breunig, M.M.1
Kriegel, H.P.2
Ng, R.T.3
Sander, J.4
-
6
-
-
20444501420
-
Learning rules and clusters for anomaly detection in network traffic
-
Chan, P., Mahoney, M., Arshad, M.: Learning rules and clusters for anomaly detection in network traffic. Managing Cyber Threats: Issues, Approaches and Challenges, 81-99 (2003)
-
(2003)
Managing Cyber Threats: Issues, Approaches and Challenges
, pp. 81-99
-
-
Chan, P.1
Mahoney, M.2
Arshad, M.3
-
7
-
-
37249058214
-
-
Chang, C.-C., Lin, C-J.: LIBSVM: a library for support vector machines (2001) Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
-
Chang, C.-C., Lin, C-J.: LIBSVM: a library for support vector machines (2001) Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm
-
-
-
-
8
-
-
0002629270
-
Maximum likelihood from incomplete data via the em algorithm
-
Dempster, A.P., Laird, N.M., Rubin, D.B.: Maximum likelihood from incomplete data via the em algorithm. J. Royal Stat. Soc. 39, 1-38 (1977)
-
(1977)
J. Royal Stat. Soc
, vol.39
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
9
-
-
0023294428
-
An intrusion-detection model
-
Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222-232 (1987)
-
(1987)
IEEE Trans. Softw. Eng
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
10
-
-
0015644825
-
A fuzzy relative of the isodata process and its use in detecting compact well-separated clusters
-
Dunn, J.C.: A fuzzy relative of the isodata process and its use in detecting compact well-separated clusters. Journal of Cybernatics 3, 32-57 (1974)
-
(1974)
Journal of Cybernatics
, vol.3
, pp. 32-57
-
-
Dunn, J.C.1
-
11
-
-
0344439823
-
-
Data Mining for Security Applications
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S.: A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. Data Mining for Security Applications (2002)
-
(2002)
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
12
-
-
0141540496
-
Y-Means: A clustering method for intrusion detection
-
Montreal, Quebec, Canada
-
Guan, Y., Ghorbani, A., Belacel, N.: Y-Means: A clustering method for intrusion detection. In: Canadian Conference on Electrical and Computer Engineering, Montreal, Quebec, Canada (2003)
-
(2003)
Canadian Conference on Electrical and Computer Engineering
-
-
Guan, Y.1
Ghorbani, A.2
Belacel, N.3
-
13
-
-
33745215847
-
From outliers to prototypes: Ordering data
-
Harmeling, S., Dornhege, G., Tax, D., Meinecke, F., Muller, K.: From outliers to prototypes: Ordering data. Neurocomputing 69(13-15), 1608-1618 (2006)
-
(2006)
Neurocomputing
, vol.69
, Issue.13-15
, pp. 1608-1618
-
-
Harmeling, S.1
Dornhege, G.2
Tax, D.3
Meinecke, F.4
Muller, K.5
-
14
-
-
0035788909
-
Mining top-n local outliers in large databases
-
ACM Press, New York
-
Jin, W., Tung, A.K.H., Han, J.: Mining top-n local outliers in large databases. In: KDD '01. Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 293-298. ACM Press, New York (2001)
-
(2001)
KDD '01. Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
, pp. 293-298
-
-
Jin, W.1
Tung, A.K.H.2
Han, J.3
-
16
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the Third SIAM International Conference on Data Mining (2003)
-
(2003)
Proceedings of the Third SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
17
-
-
4544251643
-
-
Lei, J.Z., Ghorbani, A.: Network intrusion detection using an improved competitive learning neural network. In: CNSR, pp. 190-197 (2004)
-
Lei, J.Z., Ghorbani, A.: Network intrusion detection using an improved competitive learning neural network. In: CNSR, pp. 190-197 (2004)
-
-
-
-
18
-
-
0001457509
-
Some methods for classification and analysis of multivariate observations
-
MacQueen, J.: Some methods for classification and analysis of multivariate observations. In: 5th Berkley Symposium on Math and Probability, pp. 281-297 (1967)
-
(1967)
5th Berkley Symposium on Math and Probability
, pp. 281-297
-
-
MacQueen, J.1
-
19
-
-
33847747852
-
Intrusion detection with unlabeled data using clustering
-
ACM Press, New York
-
Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: ACM Workshop on Data Mining Applied to Security (DMSA), ACM Press, New York (2001)
-
(2001)
ACM Workshop on Data Mining Applied to Security (DMSA)
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
20
-
-
35248842651
-
-
Ramadas, M., Ostermann, S., Tjaden, B.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, Springer, Heidelberg (2003)
-
Ramadas, M., Ostermann, S., Tjaden, B.: Detecting anomalous network traffic with self-organizing maps. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, Springer, Heidelberg (2003)
-
-
-
-
21
-
-
1642355954
-
Application of machine learning algorithms to kdd intrusion detection dataset within misuse detection context
-
Sabhnani, M., Serpen, G.: Application of machine learning algorithms to kdd intrusion detection dataset within misuse detection context. In: Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications (MLMTA 2003), vol. 1, pp. 209-215 (2003)
-
(2003)
Proceedings of the International Conference on Machine Learning, Models, Technologies and Applications (MLMTA
, vol.1
, pp. 209-215
-
-
Sabhnani, M.1
Serpen, G.2
-
22
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Scholkopf, B., Piatt, J., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Computation 13(7), 1443-1472 (2001)
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1472
-
-
Scholkopf, B.1
Piatt, J.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
23
-
-
0006519201
-
-
Helsinki Univ. Technology , Available at
-
Vesanto, J., Himberg, J., Alhoniemi, E., Parhankangas, J.: Som toolbox for matlab 5, Helsinki Univ. Technology (2000), Available at http://www.cis.hut.fi/projects/somtoolbox
-
(2000)
Som toolbox for matlab
, vol.5
-
-
Vesanto, J.1
Himberg, J.2
Alhoniemi, E.3
Parhankangas, J.4
-
25
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
Ye, N., Emran, S.M., Chen, Q., Vilbert, S.: Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Trans. Comput. 51(7), 810-820 (2002)
-
(2002)
IEEE Trans. Comput
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
|