-
1
-
-
84990186442
-
The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection
-
Axelsson, S.: The Base-Rate Fallacy and its Implications for the Difficulty of Intrusion Detection. In: Proc. of RAID (May 1999)
-
(1999)
Proc. of RAID (May
-
-
Axelsson, S.1
-
2
-
-
0000353178
-
A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
-
Baum, L.E., Petrie, T., Soules, G., Weiss, N.: A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Ann. Math. Statist. 41(1), 164-171 (1970)
-
(1970)
Ann. Math. Statist
, vol.41
, Issue.1
, pp. 164-171
-
-
Baum, L.E.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
3
-
-
8344243818
-
-
Bicego, M., Murino, V., Figueiredo, M.: Similarity-Based Clustering of Sequences Using Hidden Markov Models. In: Perner, P., Rosenfeld, A. (eds.) MLDM 2003. LNCS, 2734, pp. 86-95. Springer, Heidelberg (2003)
-
Bicego, M., Murino, V., Figueiredo, M.: Similarity-Based Clustering of Sequences Using Hidden Markov Models. In: Perner, P., Rosenfeld, A. (eds.) MLDM 2003. LNCS, vol. 2734, pp. 86-95. Springer, Heidelberg (2003)
-
-
-
-
4
-
-
21144432658
-
-
Cho, S., Han, S.: Two sophisticated techniques to improve HMM-based intrusion detection systems. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, 2820, pp. 207-219. Springer, Heidelberg (2003)
-
Cho, S., Han, S.: Two sophisticated techniques to improve HMM-based intrusion detection systems. In: Vigna, G., Krügel, C., Jonsson, E. (eds.) RAID 2003. LNCS, vol. 2820, pp. 207-219. Springer, Heidelberg (2003)
-
-
-
-
5
-
-
0003045134
-
A Neural Network Component for an Intrusion Detection System
-
Debar, H., Becker, M., Siboni, D.: A Neural Network Component for an Intrusion Detection System. In: Proc. of the IEEE Computer Society, Symposium on Research in Security and Privacy (1992)
-
(1992)
Proc. of the IEEE Computer Society, Symposium on Research in Security and Privacy
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
6
-
-
0023294428
-
An Intrusion Detection Model
-
Denning, D.E.: An Intrusion Detection Model. IEEE Trans. Software Eng. SE13(2), 222-232 (1987)
-
(1987)
IEEE Trans. Software Eng
, vol.SE13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
7
-
-
84957007442
-
-
Dietrich, C., Schwenker, F., Palm, G.: Classification of Time Series Utilizing Temporal and Decision Fusion. In: Kittler, J., Roli, F. (eds.) MCS 2001. LNCS, 2096, pp. 378-387. Springer, Heidelberg (2001)
-
Dietrich, C., Schwenker, F., Palm, G.: Classification of Time Series Utilizing Temporal and Decision Fusion. In: Kittler, J., Roli, F. (eds.) MCS 2001. LNCS, vol. 2096, pp. 378-387. Springer, Heidelberg (2001)
-
-
-
-
8
-
-
80053403826
-
-
Dietterich, T.: Ensemble Methods in Machine Learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, 1857, pp. 1-15. Springer, Heidelberg (2000)
-
Dietterich, T.: Ensemble Methods in Machine Learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, vol. 1857, pp. 1-15. Springer, Heidelberg (2000)
-
-
-
-
9
-
-
0003922190
-
-
Wiley-Interscience, Chichester
-
Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley-Interscience, Chichester (2000)
-
(2000)
Pattern Classification
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
10
-
-
70349100099
-
Anomaly detection using call stack information
-
IEEE Computer Society Press, Los Alamitos
-
Feng, H.H., Kolesnikov, O.M., Fogla, P., Lee, W., Gong, W.: Anomaly detection using call stack information. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
11
-
-
0141651792
-
The prediction role of Hidden Markov Model in Intrusion Detection
-
May
-
Gao, F., Sun, J., Wei, Z.: The prediction role of Hidden Markov Model in Intrusion Detection. In: Proc. of IEEE CCECE 2003, vol. 2, pp. 893-896 (May 2003)
-
(2003)
Proc. of IEEE CCECE
, vol.2
, pp. 893-896
-
-
Gao, F.1
Sun, J.2
Wei, Z.3
-
12
-
-
33750379862
-
-
Gao, D., Reiter, M., Song, D.: Behavioral Distance Measurement Using Hidden Markov Models. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, pp. 19-40. Springer, Heidelberg (2006)
-
Gao, D., Reiter, M., Song, D.: Behavioral Distance Measurement Using Hidden Markov Models. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 19-40. Springer, Heidelberg (2006)
-
-
-
-
13
-
-
0038330235
-
Fusion of multiple classifiers for intrusion in computer networks
-
Giacinto, G., Roli, F., Didaci, L.: Fusion of multiple classifiers for intrusion in computer networks. Pattern Recognition Letters 24(12), 1795-1803 (2003)
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.12
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
14
-
-
37349091044
-
-
Hashem, M.: Network Based Hidden Markov Models Intrusion Detection Systems. IJICIS, 6(1) (2006)
-
Hashem, M.: Network Based Hidden Markov Models Intrusion Detection Systems. IJICIS, 6(1) (2006)
-
-
-
-
15
-
-
21644438395
-
An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls
-
Hoang, X.D., Hu, J.: An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls. In: Proc. of 12th IEEE Conference on Networks, 2004, vol. 2, pp. 470-474 (2004)
-
(2004)
Proc. of 12th IEEE Conference on Networks
, vol.2
, pp. 470-474
-
-
Hoang, X.D.1
Hu, J.2
-
16
-
-
0034830461
-
Decision Templates for Multiple Classifier Fusion
-
Kuncheva, L., Bezdek, J.C., Duin, R.P.W.: Decision Templates for Multiple Classifier Fusion. Pattern Recognition 34(2), 299-314 (2001)
-
(2001)
Pattern Recognition
, vol.34
, Issue.2
, pp. 299-314
-
-
Kuncheva, L.1
Bezdek, J.C.2
Duin, R.P.W.3
-
18
-
-
0034270431
-
Defending yourself: The role of Intrusion Detection Systems
-
September/October
-
Mc Hugh, J., Christie, A., Allen, J.: Defending yourself: The role of Intrusion Detection Systems. IEEE Software 42-51 (September/October 2000)
-
(2000)
IEEE Software
, vol.42-51
-
-
Mc Hugh, J.1
Christie, A.2
Allen, J.3
-
19
-
-
85077703150
-
Polymorphic Blending Attack
-
Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O.M., Lee, W.: Polymorphic Blending Attack. In: USENIX Security Symposium (2006)
-
(2006)
USENIX Security Symposium
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.M.4
Lee, W.5
-
21
-
-
0037142572
-
Anomaly Intrusion Detection Method Based on HMM
-
June
-
Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly Intrusion Detection Method Based on HMM. Electronic Letters 38(13) (June 2002)
-
(2002)
Electronic Letters
, vol.38
, Issue.13
-
-
Qiao, Y.1
Xin, X.W.2
Bin, Y.3
Ge, S.4
-
22
-
-
0024610919
-
A tutorial on Hidden Markov Models and selected applications in speech recognition
-
February
-
Rabiner, L.R.: A tutorial on Hidden Markov Models and selected applications in speech recognition. In: Proc. of IEEE vol. 77(2), pp. 257-286 (February 1989)
-
(1989)
Proc. of IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
24
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
IEEE Computer Society Press, Los Alamitos
-
Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proc. of the IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos (1999)
-
(1999)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
26
-
-
37349111336
-
-
IDS-Informer, www.blade-software.com
-
IDS-Informer
-
-
|