-
1
-
-
37349085065
-
Sensing attacks in computers networks with hidden markov models
-
Perner P ed, Leipzig, Germany. Springer, Berlin/Heidelberg, pp
-
Ariu D, Giacinto G, Perdisci R (2007) Sensing attacks in computers networks with hidden markov models. In: Perner P (ed) Proc the 5th Int Conf Mach Learn Data Mining in Pattern Recognition, Leipzig, Germany. Springer, Berlin/Heidelberg, pp 449-463
-
(2007)
Proc the 5th Int Conf Mach Learn Data Mining in Pattern Recognition
, pp. 449-463
-
-
Ariu, D.1
Giacinto, G.2
Perdisci, R.3
-
2
-
-
0000353178
-
A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
-
Baum LE, Petrie T, Soules G, Weiss N (1970) A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Ann Math Stat 41:164-171
-
(1970)
Ann Math Stat
, vol.41
, pp. 164-171
-
-
Baum, L.E.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
3
-
-
9244243116
-
Semi-supervised learning of classifiers: Theory, algorithms and their applications to human-computer interaction
-
Cohen I, Cozman FG, Sebe N, Cirelo MC, Huang T (2004) Semi-supervised learning of classifiers: Theory, algorithms and their applications to human-computer interaction. IEEE Trans Pattern Analysis and Mach Intell 26:1553-1567
-
(2004)
IEEE Trans Pattern Analysis and Mach Intell
, vol.26
, pp. 1553-1567
-
-
Cohen, I.1
Cozman, F.G.2
Sebe, N.3
Cirelo, M.C.4
Huang, T.5
-
4
-
-
27244448490
-
Network intrusion detection by a multi-stage classification system
-
Roli F, Kittler J, Windeatt T eds, Cagliari, Italy. Springer, Berlin/Heidelberg, pp
-
Cordella LP, Limongiello A, Sansone C (2004) Network intrusion detection by a multi-stage classification system. In: Roli F, Kittler J, Windeatt T (eds) Proc the 5th Int Workshop Multiple Classifier Syst, Cagliari, Italy. Springer, Berlin/Heidelberg, pp 324-333
-
(2004)
Proc the 5th Int Workshop Multiple Classifier Syst
, pp. 324-333
-
-
Cordella, L.P.1
Limongiello, A.2
Sansone, C.3
-
5
-
-
0026850007
-
A neural network component for an intrusion detection system
-
Oakland, CA, USA. IEEE Computer Society, Los Alamitos, pp
-
Debar H, Becker M, Siboni D (1992) A neural network component for an intrusion detection system. In: Proc 1992 IEEE Symp Research in Security and Privacy, Oakland, CA, USA. IEEE Computer Society, Los Alamitos, pp 240-250
-
(1992)
Proc 1992 IEEE Symp Research in Security and Privacy
, pp. 240-250
-
-
Debar, H.1
Becker, M.2
Siboni, D.3
-
8
-
-
0038428854
-
Results of the KDD'99 classifier learning
-
Elkan C (2000) Results of the KDD'99 classifier learning. ACM SIGKDD Explorations 1:63-64
-
(2000)
ACM SIGKDD Explorations
, vol.1
, pp. 63-64
-
-
Elkan, C.1
-
9
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Barbara D, Jajodia S eds, Springer, Berlin/Heidelberg
-
Eskin E, Arnold A, Prerau M, Portnoy L, Stolfo S (2002) A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In: Barbara D, Jajodia S (eds) Applications of Data Mining in Computer Security. Springer, Berlin/Heidelberg
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
10
-
-
27244444099
-
A modular multiple classifier system for the detection of intrusions in computer networks
-
Windeatt T, Roli F eds, Guildford, UK. Springer, Berlin/Heidelberg, pp
-
Giacinto G, Roli F, Didaci L (2003) A modular multiple classifier system for the detection of intrusions in computer networks. In: Windeatt T, Roli F (eds) Proc the 4th Int Workshop Multiple Classifier Syst, Guildford, UK. Springer, Berlin/Heidelberg, pp. 346-355
-
(2003)
Proc the 4th Int Workshop Multiple Classifier Syst
, pp. 346-355
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
11
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
Giacinto G, Roli F, Didaci L (2003) Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24:1795-1803
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
12
-
-
35348821822
-
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
-
Giacinto G, Perdisci R, Del Rio M, Roli F (2008) Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Inf Fusion 9:69-82
-
(2008)
Inf Fusion
, vol.9
, pp. 69-82
-
-
Giacinto, G.1
Perdisci, R.2
Del Rio, M.3
Roli, F.4
-
14
-
-
0004118981
-
The NIDES statistical component: Description and justification
-
SRI Int
-
Javits H, Valdes A (1993) The NIDES statistical component: Description and justification. SRI Annual Rep A010, Comp Sci Lab, SRI Int
-
(1993)
SRI Annual Rep A010, Comp Sci Lab
-
-
Javits, H.1
Valdes, A.2
-
19
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W, Stolfo S (2000) A framework for constructing features and models for intrusion detection systems. ACM Trans Inf Syst Security 3: 227-261
-
(2000)
ACM Trans Inf Syst Security
, vol.3
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
20
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Oakland, CA, USA, IEEE Computer Society, Los Alamitos, pp
-
Lee W, Xiang D (2001) Information-theoretic measures for anomaly detection. In: Proc 2001 IEEE Symp Security and Privacy, Oakland, CA, USA, IEEE Computer Society, Los Alamitos, pp 130-143
-
(2001)
Proc 2001 IEEE Symp Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
21
-
-
84868695480
-
Unsupervised anomaly detection in network intrusion detection using clusters
-
Estivill-Castro V ed, Newcastle, NSW, Australia. Australian Computer Society, pp
-
Leung K, Leckie C (2005) Unsupervised anomaly detection in network intrusion detection using clusters. In: Estivill-Castro V (ed) Proc the 28th Australasian Comp Sci Conf, Newcastle, NSW, Australia. Australian Computer Society, pp 333-342
-
(2005)
Proc the 28th Australasian Comp Sci Conf
, pp. 333-342
-
-
Leung, K.1
Leckie, C.2
-
22
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Lippmann R, Haines JW, Fried DJ, Korba J, Das K (2000) The 1999 DARPA off-line intrusion detection evaluation. Computer Networks 34:579-595
-
(2000)
Computer Networks
, vol.34
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
23
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection
-
Vigna G, Jonsson E, Krügel C eds, Pittsburgh, PA, USA. Springer, Berlin/Heidelbeg, pp
-
Mahoney MV, Chan PK (2003) An analysis of the 1999 DARPA/Lincoln laboratory evaluation data for network anomaly detection. In: Vigna G, Jonsson E, Krügel C (eds) Proc 6th Int Symp Recent Advances in Intrusion Detection, Pittsburgh, PA, USA. Springer, Berlin/Heidelbeg, pp 220-237
-
(2003)
Proc 6th Int Symp Recent Advances in Intrusion Detection
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
24
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
McHugh J, Christie A, Allen J (2000) Defending yourself: The role of intrusion detection systems. IEEE Software 17:42-51
-
(2000)
IEEE Software
, vol.17
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
25
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
-
McHugh J (2000) Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory. ACM Trans Inf Syst Security 3:262-294
-
(2000)
ACM Trans Inf Syst Security
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
26
-
-
33751040190
-
Reverse engineering of network signatures
-
Clark A, Kerr K, Mohay G eds, Australia, pp
-
Mutz D, Kruegel C, Robertson W, Vigna G, Kemmerer RA (2005) Reverse engineering of network signatures. In: Clark A, Kerr K, Mohay G (eds) Proc the 4th AusCERT Asia Pacific Inf Technology Security Conf, Gold Coast, QE, Australia, pp 1-12
-
(2005)
Proc the 4th AusCERT Asia Pacific Inf Technology Security Conf, Gold Coast, QE
, pp. 1-12
-
-
Mutz, D.1
Kruegel, C.2
Robertson, W.3
Vigna, G.4
Kemmerer, R.A.5
-
27
-
-
39049123726
-
An Achilles' heel in signature-based IDS: Squealing false positives in SNORT
-
Lee W, Mé L, Wespi A eds, Davis, CA, USA. Springer, Berlin/Heidelberg
-
Patton S, Yurcik W, Doss D (2001) An Achilles' heel in signature-based IDS: Squealing false positives in SNORT. In: Lee W, Mé L, Wespi A (eds) Proc the 4th Int Symp Recent Advances in Intrusion Detection, Davis, CA, USA. Springer, Berlin/Heidelberg
-
(2001)
Proc the 4th Int Symp Recent Advances in Intrusion Detection
-
-
Patton, S.1
Yurcik, W.2
Doss, D.3
-
29
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA, USA, pp
-
Portnoy L, Eskin E, Stolfo S (2001) Intrusion detection with unlabeled data using clustering. In: Proc ACM CSS Workshop Data Mining Applied to Security, Philadelphia, PA, USA, pp 76-105
-
(2001)
Proc ACM CSS Workshop Data Mining Applied to Security
, pp. 76-105
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
31
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Schölkopf B, Platt J, Shawe-Taylor J, Smola AJ, Williamson RC (2001) Estimating the support of a high-dimensional distribution. Neural Comp 13:1443-1471
-
(2001)
Neural Comp
, vol.13
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
32
-
-
84957038175
-
Combining one-class classifiers
-
Kittler J, Roli F eds, Cambridge, UK. Springer, Berlin/Heidelberg, pp
-
Tax DMJ, Duin RPW (2001) Combining one-class classifiers. In: Kittler J, Roli F (eds) Proc the 2nd Multiple Classifier Syst, Cambridge, UK. Springer, Berlin/Heidelberg, pp 299-308
-
(2001)
Proc the 2nd Multiple Classifier Syst
, pp. 299-308
-
-
Tax, D.M.J.1
Duin, R.P.W.2
-
35
-
-
14844322335
-
Testing network-based intrusion detection signatures using mutant exploits
-
Atluri V, Pfitzmann B, McDaniel PD eds, Washington DC, USA. ACM, New York, pp
-
Vigna G, Robertson W, Balzarotti D (2004) Testing network-based intrusion detection signatures using mutant exploits. In: Atluri V, Pfitzmann B, McDaniel PD (eds) Proc the 11th ACM Conf Comp and Communications Security, Washington DC, USA. ACM, New York, pp 21-30
-
(2004)
Proc the 11th ACM Conf Comp and Communications Security
, pp. 21-30
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
-
36
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Jonsson E, Valdes A, Almgren M eds, Sophia Antipolis, France. Springer, Berlin/Heidelberg, pp
-
Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. In: Jonsson E, Valdes A, Almgren M (eds) Proc the 7th Int Symp Recent Advances on Intrusion Detection, Sophia Antipolis, France. Springer, Berlin/Heidelberg, pp 203-222
-
(2004)
Proc the 7th Int Symp Recent Advances on Intrusion Detection
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
37
-
-
42449146881
-
Controlling intrusion detection systems by generating false positives: Squealing proof-of-concept
-
Tampa, FL, USA. IEEE Computer Society, Los Alamitos, pp
-
Yurcik W (2002) Controlling intrusion detection systems by generating false positives: Squealing proof-of-concept. In: Proc the 27th Annual IEEE Conf Local Comp Networks, Tampa, FL, USA. IEEE Computer Society, Los Alamitos, pp 134-135
-
(2002)
Proc the 27th Annual IEEE Conf Local Comp Networks
, pp. 134-135
-
-
Yurcik, W.1
-
38
-
-
0026860706
-
Methods of combining multiple classifiers and their applications to handwriting recognition
-
Xu L, Krzyzak A, Suen CY (1992) Methods of combining multiple classifiers and their applications to handwriting recognition. IEEE Trans Syst Man Cybern 22:418-435
-
(1992)
IEEE Trans Syst Man Cybern
, vol.22
, pp. 418-435
-
-
Xu, L.1
Krzyzak, A.2
Suen, C.Y.3
|