-
1
-
-
0027961889
-
Self-nonself discrimination in a computer
-
S. Forrest, A. Perelson, L. Allen, and R. Cherukury, "Self-nonself discrimination in a computer," in Proceedings of the IEEE Symp. on research in security and privacy, 1994.
-
(1994)
Proceedings of the IEEE Symp. on Research in Security and Privacy
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukury, R.4
-
3
-
-
0037781389
-
An immunogenetic technique to detect anomalies in network traffic
-
Morgan Kaufman Publishers
-
F. Gonzalez and D. Dasgupta, "An immunogenetic technique to detect anomalies in network traffic," in Proceedings of the genetic and evolutionary compilation conference, GECCO 2002, pp. 1081-1088, Morgan Kaufman Publishers, 2002.
-
(2002)
Proceedings of the Genetic and Evolutionary Compilation Conference, GECCO 2002
, pp. 1081-1088
-
-
Gonzalez, F.1
Dasgupta, D.2
-
5
-
-
0029716418
-
A sense of self for unix processes
-
IEEE Computer Society Press
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes," in Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120-128, IEEE Computer Society Press, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
7
-
-
0001858279
-
Sequence matching and learning in anomaly detection for computer security
-
(Fawcett, Haimowitz, Provost, and Stolfo, eds.), AAAI Press
-
T. Lane and C. E. Brodley, "Sequence matching and learning in anomaly detection for computer security," in AI Approaches to Fraud Detection and Risk Management (Fawcett, Haimowitz, Provost, and Stolfo, eds.), pp. 43-49, AAAI Press, 1997.
-
(1997)
AI Approaches to Fraud Detection and Risk Management
, pp. 43-49
-
-
Lane, T.1
Brodley, C.E.2
-
8
-
-
85141038051
-
Mining audit data to build intrusion detection models
-
W. Lee, S. Stolfo, and K. Mok, "Mining Audit Data to Build Intrusion Detection Models," in International Conference Knowledge Discovery and Data Mining (KDD'98), pp. 66-72, 1998.
-
(1998)
International Conference Knowledge Discovery and Data Mining (KDD'98)
, pp. 66-72
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
9
-
-
0032313923
-
Intrusion detection using sequences of systems call
-
S. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion Detection Using Sequences of Systems Call," Computer Security, no. 6, pp. 151-180, 1998.
-
(1998)
Computer Security
, Issue.6
, pp. 151-180
-
-
Hofmeyr, S.1
Somayaji, A.2
Forrest, S.3
-
11
-
-
0142095474
-
Using artificial anomalies to detect unknown and known network intrusions
-
W. Fan, W. Lee, M. Miller, S. Stolfo, and P. Chan, "Using artificial anomalies to detect unknown and known network intrusions," in Proceedings of the first IEEE International conference on Data Mining, 2001.
-
(2001)
Proceedings of the First IEEE International Conference on Data Mining
-
-
Fan, W.1
Lee, W.2
Miller, M.3
Stolfo, S.4
Chan, P.5
-
14
-
-
0027595430
-
A possibilistic approach to clustering
-
May
-
R. Krishnapuram and J. M. Keller, "A possibilistic approach to clustering," IEEE Trans. Fuzzy Syst., vol. 1, pp. 98-110, May 1993.
-
(1993)
IEEE Trans. Fuzzy Syst.
, vol.1
, pp. 98-110
-
-
Krishnapuram, R.1
Keller, J.M.2
-
15
-
-
0026205328
-
-
Aug.
-
J. M. Jolion, P. Meer, and S. Bataouche, "Robust clustering with applications in computer vision," vol. 13, pp. 791-802, Aug. 1991.
-
(1991)
Robust Clustering with Applications in Computer Vision
, vol.13
, pp. 791-802
-
-
Jolion, J.M.1
Meer, P.2
Bataouche, S.3
-
18
-
-
4344643491
-
Unsupervised niche clustering: Discovering an unknown number of clusters in noisy data sets
-
Invited chapter, A. Ghosh and L. C. Jain, Eds, Springer Verlag
-
O. Nasraoui, E. Leon, and R. Krishnapuram, "Unsupervised niche clustering: Discovering an unknown number of clusters in noisy data sets," in Evolutionary Computing in Data Mining, Invited chapter, A. Ghosh and L. C. Jain, Eds, Springer Verlag, 2004.
-
(2004)
Evolutionary Computing in Data Mining
-
-
Nasraoui, O.1
Leon, E.2
Krishnapuram, R.3
-
23
-
-
0030392126
-
A robust estimator based on density and scale optimization, and its application to clustering
-
(New Orleans), Sep.
-
O. Nasraoui and R. Krishnapuram, "A robust estimator based on density and scale optimization, and its application to clustering," in IEEE International Conference on Fuzzy Systems, (New Orleans), pp. 1031-1035, Sep. 1996.
-
(1996)
IEEE International Conference on Fuzzy Systems
, pp. 1031-1035
-
-
Nasraoui, O.1
Krishnapuram, R.2
-
24
-
-
0002900357
-
The case against accuracy estimation for comparing induction algorithms
-
F. Provost, T. Fawcett, and R. Kohavi, "The case against accuracy estimation for comparing induction algorithms," in Proceedings of 15th intenational conference on machine learning, p. 445;453, 1998.
-
(1998)
Proceedings of 15th Intenational Conference on Machine Learning
, pp. 445
-
-
Provost, F.1
Fawcett, T.2
Kohavi, R.3
|