-
1
-
-
44649169757
-
-
Northcutt, S, et al, SHADOW: Second heuristic analysis for defensive online warfare
-
Northcutt, S., et al.: SHADOW: Second heuristic analysis for defensive online warfare
-
-
-
-
2
-
-
44649155108
-
-
Danyliw, R, ACID: Analysis console for intrusion detections
-
Danyliw, R.: ACID: Analysis console for intrusion detections
-
-
-
-
3
-
-
3042821266
-
Validation of sensor alert correlators
-
Haines, J., Ryder, D.K., Tinnel, L., Taylor, S.: Validation of sensor alert correlators. IEEE Security and Privacy, 46-56 (2003)
-
(2003)
IEEE Security and Privacy
, pp. 46-56
-
-
Haines, J.1
Ryder, D.K.2
Tinnel, L.3
Taylor, S.4
-
4
-
-
44649125480
-
-
Valdes, A., Skinner, K.: Probabilistic alert correlation. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, 2212, pp. 54-68. Springer, Heidelberg (2001)
-
Valdes, A., Skinner, K.: Probabilistic alert correlation. In: Lee, W., Mé, L., Wespi, A. (eds.) RAID 2001. LNCS, vol. 2212, pp. 54-68. Springer, Heidelberg (2001)
-
-
-
-
5
-
-
44649105170
-
Event data exchange and intrusion alert correlation in heterogeneous networks
-
NY, CISSE, June
-
Hätälä, A., Särs, C., Addams-Moring, R., Virtanen, T.: Event data exchange and intrusion alert correlation in heterogeneous networks. In: Proceedings of the 8th Colloquium for Information Systems Security Education (CISSE), Westpoint, NY, CISSE, June 2004, pp. 84-92 (2004)
-
(2004)
Proceedings of the 8th Colloquium for Information Systems Security Education (CISSE), Westpoint
, pp. 84-92
-
-
Hätälä, A.1
Särs, C.2
Addams-Moring, R.3
Virtanen, T.4
-
6
-
-
44649175009
-
Clustering using an autoassociator: A case study in network event correlation
-
Phoenix, AZ, November, ACTA Press
-
Smith, R., Japkowicz, N., Dondo, M.: Clustering using an autoassociator: A case study in network event correlation. In: Proceedings of the 17th LASTED International Conference on Parallel and Distributed Computing and Systems, Phoenix, AZ, November 2005, pp. 613-618. ACTA Press (2005)
-
(2005)
Proceedings of the 17th LASTED International Conference on Parallel and Distributed Computing and Systems
, pp. 613-618
-
-
Smith, R.1
Japkowicz, N.2
Dondo, M.3
-
7
-
-
44649195130
-
Autocorrel ii: Unsupervised network event correlation using neural networks
-
CR 2005-155, DRDC Ottawa, Ottawa, ON October
-
Japkowicz, N., Smith, R.: Autocorrel ii: Unsupervised network event correlation using neural networks. Contractor Report CR 2005-155, DRDC Ottawa, Ottawa, ON (October 2005)
-
(2005)
Contractor Report
-
-
Japkowicz, N.1
Smith, R.2
-
8
-
-
0242540448
-
Mining intrusion detection alarms for actionable knowledge
-
Edmonton, Alberta, Canada, July, ACM Press, New York
-
Julisch, K., Dacier, M.: Mining intrusion detection alarms for actionable knowledge. In: Proceedings of SIGKDD 2002, the 8th International Conference on Knowledge Discovery and Data Mining, Edmonton, Alberta, Canada, July 2002, pp. 366-375. ACM Press, New York (2002)
-
(2002)
Proceedings of SIGKDD 2002, the 8th International Conference on Knowledge Discovery and Data Mining
, pp. 366-375
-
-
Julisch, K.1
Dacier, M.2
-
9
-
-
0038289761
-
Fusing a heterogeneous alert stream into scenarios
-
Philadelphia, PA, November, ACM Press, New York
-
Dain, O., Cunningham, R.K.: Fusing a heterogeneous alert stream into scenarios. In: Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications, Philadelphia, PA, November 2001, pp. 1-13. ACM Press, New York (2001)
-
(2001)
Proceedings of the 2001 ACM Workshop on Data Mining for Security Applications
, pp. 1-13
-
-
Dain, O.1
Cunningham, R.K.2
-
10
-
-
2442526701
-
Unsupervised learning techniques for an intrusion detection system
-
Nicosia, Cyprus, pp, ACM, New York
-
Zanero, S., Savaresi, S.M.: Unsupervised learning techniques for an intrusion detection system. In: Proceedings of the 2004 ACM Symposium on Applied Computing, Nicosia, Cyprus, pp. 412-419. ACM, New York (2004)
-
(2004)
Proceedings of the 2004 ACM Symposium on Applied Computing
, pp. 412-419
-
-
Zanero, S.1
Savaresi, S.M.2
-
11
-
-
33745163595
-
-
Laskov, P., Dussel, P., Rieck, C.S.: Learning intrusion detection: Supervised or unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, 3617, pp. 50-57. Springer, Heidelberg (2005)
-
Laskov, P., Dussel, P., Rieck, C.S.: Learning intrusion detection: Supervised or unsupervised? In: Roli, F., Vitulano, S. (eds.) ICIAP 2005. LNCS, vol. 3617, pp. 50-57. Springer, Heidelberg (2005)
-
-
-
-
12
-
-
0002629270
-
Maximum likelihood from incoming data via the EM algorithm
-
Dempster, A., Laird, N., Rubin, D.: Maximum likelihood from incoming data via the EM algorithm. J. Royal Stat. Soc., Series B 39(1), 1-36 (1977)
-
(1977)
J. Royal Stat. Soc., Series B
, vol.39
, Issue.1
, pp. 1-36
-
-
Dempster, A.1
Laird, N.2
Rubin, D.3
-
13
-
-
0003209045
-
Self-Organizing Maps
-
Springer, Berlin , Second Extended Edition
-
Kohonen, T.: Self-Organizing Maps. Springer Series in Information Sciences, vol. 30. Springer, Berlin (1995); (Second Extended Edition 1997)
-
(1995)
Springer Series in Information Sciences
, vol.30
-
-
Kohonen, T.1
-
14
-
-
85090433665
-
Snort - lightweight intrusion detection for networks
-
Seattle, Washington, November 7-12, The USENIX Association
-
Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of LISA 1999: 13th Systems Administration Conference, Seattle, Washington, November 7-12, 1999, pp. 229-238. The USENIX Association (1999)
-
(1999)
Proceedings of LISA 1999: 13th Systems Administration Conference
, pp. 229-238
-
-
Roesch, M.1
-
15
-
-
0034301517
-
The 1999 darpa off-line intrusion detection evaluation
-
Lippmann, R., Haines, J.W., Fried, D.J., Korba. J., Das, K.: The 1999 darpa off-line intrusion detection evaluation. Computer Networks 34(4), 579-595 (2000)
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
|