-
1
-
-
0025183708
-
Basic local alignment search tool
-
Altschul S.F., Gish W., Miller W., Myers E.W., and Lipman D.J. Basic local alignment search tool. Journal of Molecular Biology 215 3 (1990) 403-410
-
(1990)
Journal of Molecular Biology
, vol.215
, Issue.3
, pp. 403-410
-
-
Altschul, S.F.1
Gish, W.2
Miller, W.3
Myers, E.W.4
Lipman, D.J.5
-
2
-
-
0030801002
-
Gapped BLAST and PSI-BLAST: A new generation of protein database search programs
-
Altschul S.F., Madden T.L., Schaffer A.A., Zhang J., Zhang Z., Miller W., and Lipman D.J. Gapped BLAST and PSI-BLAST: A new generation of protein database search programs. Nucleic Acids Research 25 17 (1997) 3389-3402
-
(1997)
Nucleic Acids Research
, vol.25
, Issue.17
, pp. 3389-3402
-
-
Altschul, S.F.1
Madden, T.L.2
Schaffer, A.A.3
Zhang, J.4
Zhang, Z.5
Miller, W.6
Lipman, D.J.7
-
4
-
-
84944736505
-
-
Coull, S., Branch, J., Szymanski, B., Breimer, E., 2003. Intrusion detection: A bioinformatics approach. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 24-33
-
Coull, S., Branch, J., Szymanski, B., Breimer, E., 2003. Intrusion detection: A bioinformatics approach. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 24-33
-
-
-
-
6
-
-
41249084750
-
-
Lane, T., Brodley, C.E., 1997. Sequence matching and learning in anomaly detection for computer security. In: Proceedings of the AAAI-97 Workshop: AI Approaches to Fraud Detection and Risk Management, vol. 49, pp. 43-49
-
Lane, T., Brodley, C.E., 1997. Sequence matching and learning in anomaly detection for computer security. In: Proceedings of the AAAI-97 Workshop: AI Approaches to Fraud Detection and Risk Management, vol. 49, pp. 43-49
-
-
-
-
7
-
-
41249102803
-
-
Lane, T., Brodley, C.E., 1998. Approaches to online learning and concept drift for user identification in computer security. In: Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, pp. 259-263
-
Lane, T., Brodley, C.E., 1998. Approaches to online learning and concept drift for user identification in computer security. In: Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, pp. 259-263
-
-
-
-
9
-
-
1542378274
-
-
Maxion, R.A., 2003. Masquerade detection using enriched command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 5-14
-
Maxion, R.A., 2003. Masquerade detection using enriched command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 5-14
-
-
-
-
10
-
-
0036931591
-
-
Maxion, R.A., Townsend, T.N., 2002. Masquerade detection using truncated command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 219-228
-
Maxion, R.A., Townsend, T.N., 2002. Masquerade detection using truncated command lines. In: Proceedings of the International Conference on Dependable Systems and Networks, pp. 219-228
-
-
-
-
11
-
-
0014757386
-
A general method applicable to the search for similarity in the amino acid sequence of two proteins
-
Needleman S.B., and Wunsch C.D. A general method applicable to the search for similarity in the amino acid sequence of two proteins. Journal of Molecular Biology 48 (1970) 443-453
-
(1970)
Journal of Molecular Biology
, vol.48
, pp. 443-453
-
-
Needleman, S.B.1
Wunsch, C.D.2
-
13
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
Schonlau M., DuMouchel W., Ju W.H., Karr A.F., Theus M., and Vardi Y. Computer intrusion: Detecting masquerades. Statistical Science 16 1 (2001) 58-74
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
14
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
Schonlau M., and Theus M. Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters 76 1 (2000) 33-38
-
(2000)
Information Processing Letters
, vol.76
, Issue.1
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
16
-
-
15944400613
-
-
Szymanski, B.K., Zhang, Y., 2004. Recursive data mining for masquerade detection and author identification. In: Proceedings of the 5th Annual IEEE System, Man, and Cybernetics Information Assurance Workshop, pp. 424-431
-
Szymanski, B.K., Zhang, Y., 2004. Recursive data mining for masquerade detection and author identification. In: Proceedings of the 5th Annual IEEE System, Man, and Cybernetics Information Assurance Workshop, pp. 424-431
-
-
-
-
17
-
-
20444456754
-
-
Tandon, G., Chan, P., Mitra, D., 2004. MORPHEUS: Motif oriented representations to purge hostile events from unlabeled sequences. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 16-25
-
Tandon, G., Chan, P., Mitra, D., 2004. MORPHEUS: Motif oriented representations to purge hostile events from unlabeled sequences. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 16-25
-
-
-
-
18
-
-
0038011184
-
-
Wagner, D., Soto, P., 2002. Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255-264
-
Wagner, D., Soto, P., 2002. Mimicry attacks on host-based intrusion detection systems. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255-264
-
-
-
-
19
-
-
0015960104
-
The string-to-string correction problem
-
Wagner R.A., and Fischer M.J. The string-to-string correction problem. Journal of the ACM 21 1 (1974) 168-173
-
(1974)
Journal of the ACM
, vol.21
, Issue.1
, pp. 168-173
-
-
Wagner, R.A.1
Fischer, M.J.2
-
20
-
-
41249098422
-
-
Wang, K., Stolfo, S.J., 2003. One-class training for masquerade detection. In: Proceedings of the 3rd IEEE International Conference on Data Mining Workshop on Data Mining for Security Applications
-
Wang, K., Stolfo, S.J., 2003. One-class training for masquerade detection. In: Proceedings of the 3rd IEEE International Conference on Data Mining Workshop on Data Mining for Security Applications
-
-
-
-
21
-
-
41249084504
-
-
Wespi, A., Dacier, M., Debar, H., 1999. An intrusion-detection system based on the teiresias pattern-discovery algorithm. In: EICAR 1999 Best Paper Proceedings, pp. 1-15
-
Wespi, A., Dacier, M., Debar, H., 1999. An intrusion-detection system based on the teiresias pattern-discovery algorithm. In: EICAR 1999 Best Paper Proceedings, pp. 1-15
-
-
-
-
22
-
-
20444441611
-
-
Wright, C., Monrose, F., Masson, G.M., 2004. HMM profiles for network traffic classification. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 9-15
-
Wright, C., Monrose, F., Masson, G.M., 2004. HMM profiles for network traffic classification. In: Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, pp. 9-15
-
-
-
-
24
-
-
0034053725
-
A greedy algorithm for aligning DNA sequences
-
Zhang Z., Schwartz S., Wagner L., and Miller W. A greedy algorithm for aligning DNA sequences. Journal of Computational Biology 7 1-2 (2000) 203-214
-
(2000)
Journal of Computational Biology
, vol.7
, Issue.1-2
, pp. 203-214
-
-
Zhang, Z.1
Schwartz, S.2
Wagner, L.3
Miller, W.4
|