-
1
-
-
0028430224
-
Network intrusion detection
-
May/June
-
B. Mukherjee, T.L. Heberlein, and K.N. Kevitt, "Network intrusion detection," IEEE Netw., vol.8, no.3, pp.26-41, May/June 1994.
-
(1994)
IEEE Netw.
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, T.L.2
Kevitt, K.N.3
-
2
-
-
0003478316
-
The architecture of a network level intrusion detection system
-
Computer Science Department, University of New Mexico, Aug.
-
R. Heady, G. Luger, A. Maccabe, and M. Servilla, "The architecture of a network level intrusion detection system," Technical Report, Computer Science Department, University of New Mexico, Aug. 1990.
-
(1990)
Technical Report
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
3
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
March
-
K. Ilgun, R. Kemmerer, and P.A. Porras, "State transition analysis: A rule-based intrusion detection approach," IEEE Trans. Softw. Eng., vol.21, no.3, pp.181-199, March 1995.
-
(1995)
IEEE Trans. Softw. Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, R.2
Porras, P.A.3
-
4
-
-
0002889601
-
USTAT: A real-time intrusion detection system for UNIX
-
May
-
K. Illgun, "USTAT: A real-time intrusion detection system for UNIX," Proc. 1993 Symposium Security and Privacy, pp.16-28, May 1993.
-
(1993)
Proc. 1993 Symposium Security and Privacy
, pp. 16-28
-
-
Illgun, K.1
-
6
-
-
0004118981
-
The NIDES statistical component description and justification
-
SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025, March
-
H.S. Javitz and A. Valdes, "The NIDES statistical component description and justification," Annual Report, SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025, March 1994.
-
(1994)
Annual Report
-
-
Javitz, H.S.1
Valdes, A.2
-
7
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Oct.
-
P.A. Porras and P.G. Neumann, "EMERALD: Event monitoring enabling responses to anomalous live disturbances," 20th NISSC, Oct. 1997.
-
(1997)
20th NISSC
-
-
Porras, P.A.1
Neumann, P.G.2
-
8
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, Texas, Jan.
-
W. Lee and S. Stolfo, "Data mining approaches for intrusion detection," Proc. 7th USENIX Security Symposium, San Antonio, Texas, Jan. 1998.
-
(1998)
Proc. 7th USENIX Security Symposium
-
-
Lee, W.1
Stolfo, S.2
-
9
-
-
0002774999
-
Learning patterns from unix process execution traces for intrusion detection
-
W. Lee, S.J. Stolfo, and P.K. Chan, "Learning patterns from unix process execution traces for intrusion detection," Proc. AAAI-97 Work, on AI Methods in Fraud and Risk Management, 1997.
-
(1997)
Proc. AAAI-97 Work, on AI Methods in Fraud and Risk Management
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
-
10
-
-
85172423269
-
JAM: Java agents for meta-learning over distributed databases
-
S.J. Stolfo, A.L. Prodromidis, S. Tselepis, W. Lee, D. Fan, and P.K. Chan, "JAM: Java agents for meta-learning over distributed databases, " Proc. KDD-97 and AAAI97 Work on AI Methods in Fraud and Risk Management, 1997.
-
(1997)
Proc. KDD-97 and AAAI97 Work on AI Methods in Fraud and Risk Management
-
-
Stolfo, S.J.1
Prodromidis, A.L.2
Tselepis, S.3
Lee, W.4
Fan, D.5
Chan, P.K.6
-
11
-
-
85075390249
-
Discovering frequent episodes in sequences
-
AAAI Press, Montreal, Canada, Aug.
-
H. Mannila, H. Toivonen, and A.I. Verkamo, "Discovering frequent episodes in sequences," KDD-95, pp.210-215, AAAI Press, Montreal, Canada, Aug. 1995.
-
(1995)
KDD-95
, pp. 210-215
-
-
Mannila, H.1
Toivonen, H.2
Verkamo, A.I.3
-
13
-
-
0001899154
-
Incremental clustering for mining in a data warehousing environment
-
New York, USA
-
M. Ester, H.-P. Kriegel, J. Sander, M. Wimmer, and X. Xu, "Incremental clustering for mining in a data warehousing environment, " Proc. 24th VLDB Conference, New York, USA, 1998.
-
(1998)
Proc. 24th VLDB Conference
-
-
Ester, M.1
Kriegel, H.-P.2
Sander, J.3
Wimmer, M.4
Xu, X.5
-
14
-
-
85027146519
-
ROCK: A clustering algorithm for categorical attributes
-
Sydney, Australia
-
S. Guha, R. Rastogi, and K. Shim, "ROCK: A clustering algorithm for categorical attributes," 15th Int. Conf. on IEEE Data Engineering, Sydney, Australia, 1999.
-
(1999)
15th Int. Conf. on IEEE Data Engineering
-
-
Guha, S.1
Rastogi, R.2
Shim, K.3
-
15
-
-
0032091595
-
CURE: An efficient clustering algorithm for large databases
-
Seattle, Washington
-
S. Guha, R. Rastogi, and K. Shim, "CURE: An efficient clustering algorithm for large databases," ACM SIGMOD Int. Conf. on Management of Data, Seattle, Washington, 1998.
-
(1998)
ACM SIGMOD Int. Conf. on Management of Data
-
-
Guha, S.1
Rastogi, R.2
Shim, K.3
-
16
-
-
0030157145
-
Birch: An efficient data clustering method for very large databases
-
Montreal, Canada, June
-
T. Zhang, R. Ramakrishnan, and M. Livny, "Birch: An efficient data clustering method for very large databases," Proc. ACM SIGMOD Conference on Management of Data, Montreal, Canada, June 1996.
-
(1996)
Proc. ACM SIGMOD Conference on Management of Data
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
-
19
-
-
0003750241
-
An architecture for intrusion detection using autonomous agents
-
COAST Laboratory, Purdue University, West Lafayette, IN, May
-
J.S. Balesubramaniyan, J.O. Garcia-Fernandes, D. Isacoff, E. Spafford, and D. Zamboni, "An architecture for intrusion detection using autonomous agents," Technical Report 98-05, COAST Laboratory, Purdue University, West Lafayette, IN, May 1998.
-
(1998)
Technical Report
, vol.98
, Issue.5
-
-
Balesubramaniyan, J.S.1
Garcia-Fernandes, J.O.2
Isacoff, D.3
Spafford, E.4
Zamboni, D.5
-
22
-
-
0032090765
-
Automatic subspace clustering of high dimensional data for data mining applications
-
Seattle, WA, June
-
R. Agrawal, J. Gehrke, D. Gunopulos, and P. Raghavan, "Automatic subspace clustering of high dimensional data for data mining applications, " Proc. ACM SIGMOD Int. Conf. on Management of Data, Seattle, WA, June 1998.
-
(1998)
Proc. ACM SIGMOD Int. Conf. on Management of Data
-
-
Agrawal, R.1
Gehrke, J.2
Gunopulos, D.3
Raghavan, P.4
-
23
-
-
0034593106
-
Visualization of navigation patterns on a web site using model-based clustering
-
ACM Press
-
I.V. Cadez, D. Heckerman, C. Meek, P. Smyth, and S. White, "Visualization of navigation patterns on a web site using model-based clustering," Proc. KDD2000, pp.280-284, ACM Press, 2000.
-
(2000)
Proc. KDD2000
, pp. 280-284
-
-
Cadez, I.V.1
Heckerman, D.2
Meek, C.3
Smyth, P.4
White, S.5
-
24
-
-
0242537441
-
Categorization of web pages and user clustering with mixtures of hidden Markov models
-
A. Ypma and T. Heskes, "Categorization of web pages and user clustering with mixtures of hidden Markov models," Proc. 2002 KDD Workshop on Web Mining, pp.31-43, 2002.
-
(2002)
Proc. 2002 KDD Workshop on Web Mining
, pp. 31-43
-
-
Ypma, A.1
Heskes, T.2
-
25
-
-
0242456797
-
ADMIT: Anomaly-based data mining for intrusions
-
K. Squeira and M. Zaki, "ADMIT: Anomaly-based data mining for intrusions," Proc. KDD2002, pp.386-395, 2002.
-
(2002)
Proc. KDD2002
, pp. 386-395
-
-
Squeira, K.1
Zaki, M.2
-
26
-
-
0035338003
-
A new intrusion detection method based on discriminant analysis
-
May
-
M. Asaka, T. Onabuta, T. Inoue, S. Okazawa, and S. Goto, "A new intrusion detection method based on discriminant analysis," IEICE Trans. Inf. & Syst., vol.E84-D, no.5, pp.570-577, May 2001.
-
(2001)
IEICE Trans. Inf. & Syst.
, vol.E84-D
, Issue.5
, pp. 570-577
-
-
Asaka, M.1
Onabuta, T.2
Inoue, T.3
Okazawa, S.4
Goto, S.5
-
27
-
-
0035673751
-
Public infomation server for tracing intruders in the Internet
-
Dec.
-
M. Asaka, T. Onabuta, and S. Goto, "Public infomation server for tracing intruders in the Internet," IEICE Trans. Commun., vol.E84-B, no.12, pp.3104-3112, Dec. 2001.
-
(2001)
IEICE Trans. Commun.
, vol.E84-B
, Issue.12
, pp. 3104-3112
-
-
Asaka, M.1
Onabuta, T.2
Goto, S.3
|