-
1
-
-
0003964874
-
Next-generation intrusion-detection expert system (NIDES)
-
Computer Science Laboratory, SRI International, Menlo Park, California, May
-
D. Andersen, T. Frivold, and A. Valdes. Next-generation intrusion-detection expert system (NIDES). Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May 1995.
-
(1995)
Technical Report
, vol.SRI-CSL-95-07
-
-
Andersen, D.1
Frivold, T.2
Valdes, A.3
-
3
-
-
0004309520
-
Research in intrusion-detection systems: A survey
-
Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden, Dec. 15
-
S. Axelsson. Research in intrusion-detection systems: A survey. Technical Report 98-17, Department of Computer Engineering, Chalmers University of Technology, Göteborg, Sweden, Dec. 15, 1998.
-
(1998)
Technical Report
, vol.98
, Issue.17
-
-
Axelsson, S.1
-
7
-
-
0002629270
-
Maximum likelihood from incomplete data via the em algorithm
-
A. P. Dempster, N. M. Laird, and D. B. Rubin. Maximum likelihood from incomplete data via the em algorithm. Journal of the Royal Statistical Society, Series B, 39(1):1-38, 1977.
-
(1977)
Journal of the Royal Statistical Society, Series B
, vol.39
, Issue.1
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
8
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection
-
D. Barbará and S. Jajodia, editors, Advances in Information Security. Kluwer Academic Publishers, Boston
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo. A geometric framework for unsupervised anomaly detection. In D. Barbará and S. Jajodia, editors, Applications of Data Mining in Computer Security, Advances in Information Security, pages 77-101. Kluwer Academic Publishers, Boston, 2002.
-
(2002)
Applications of Data Mining in Computer Security
, pp. 77-101
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
9
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, California, May 6-8
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 120-128, Oakland, California, May 6-8, 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
11
-
-
0000636553
-
Text categorization with support vector machines: Learning with many relevant features
-
Springer-Verlag
-
T. Joachims. Text categorization with support vector machines: Learning with many relevant features. In Proceedings of the European Conference on Machine Learning (ECML). Springer-Verlag, 1998.
-
(1998)
Proceedings of the European Conference on Machine Learning (ECML)
-
-
Joachims, T.1
-
12
-
-
0002714543
-
Making large-scale SVM learning practical
-
B. Schölkopf, C. Burges, and A. Smola, editors. The MIT Press
-
T. Joachims. Making large-scale SVM learning practical. In B. Schölkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods - Support Vector Learning. The MIT Press, 1999.
-
(1999)
Advances in Kernel Methods - Support Vector Learning
-
-
Joachims, T.1
-
13
-
-
0032676506
-
A data mining framework for building intrusion detection models
-
Oakland, California, May 9-12
-
W. Lee, S. J. Stolfo, and K. W. Mok. A data mining framework for building intrusion detection models. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, pages 120-132, Oakland, California, May 9-12, 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
15
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
Hilton Head, South Carolina, Jan. 25-27
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman. Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In DARPA Information Survivability Conference and Exposition (DISCEX), volume 2, pages 12-26, Hilton Head, South Carolina, Jan. 25-27 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition (DISCEX)
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
16
-
-
84872315768
-
A synthetic fraud data generation methodology
-
R. H. Deng, S. Qing, F. Bao, and J. Zhou, editors. Springer-Verlag
-
E. Lundin, H. Kvarnström, and E. Jonsson. A synthetic fraud data generation methodology. In R. H. Deng, S. Qing, F. Bao, and J. Zhou, editors, Proceedings of the 4th International Conference on Information and Communications Security (ICICS 2002), volume 2513 of Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Proceedings of the 4th International Conference on Information and Communications Security (ICICS 2002), Volume 2513 of Lecture Notes in Computer Science
, vol.2513
-
-
Lundin, E.1
Kvarnström, H.2
Jonsson, E.3
-
17
-
-
84944239811
-
The 1998 Lincoln laboratory IDS evaluation: A critique
-
Toulouse, France, Oct. 2-4 Lecture Notes in Computer Science #1907, Springer-Verlag, Berlin
-
J. McHugh. The 1998 Lincoln Laboratory IDS evaluation: A critique. In Recent Advances in Intrusion Detection (RAID 2000), pages 145-161, Toulouse, France, Oct. 2-4 2000. Lecture Notes in Computer Science #1907, Springer-Verlag, Berlin.
-
(2000)
Recent Advances in Intrusion Detection (RAID 2000)
, pp. 145-161
-
-
McHugh, J.1
-
18
-
-
84873309550
-
Penetration state transition analysis: A rule-based intrusion detection approach
-
San Antonio, Texas, Nov. 30-Dec. 4
-
P. A. Porras and R. A. Kemmerer. Penetration state transition analysis: A rule-based intrusion detection approach. In Proceedings of the Eighth Annual Computer Security Applications Conference, pages 220-229, San Antonio, Texas, Nov. 30-Dec. 4, 1992.
-
(1992)
Proceedings of the Eighth Annual Computer Security Applications Conference
, pp. 220-229
-
-
Porras, P.A.1
Kemmerer, R.A.2
-
19
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Baltimore, Maryland, Oct 7-10. National Institute of Standards and Technology/National Computer Security Center
-
P. A. Porras and P. G. Neumann. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20th National Information Systems Security Conference, pages 353-365, Baltimore, Maryland, Oct 7-10, 1997. National Institute of Standards and Technology/National Computer Security Center.
-
(1997)
Proceedings of the 20th National Information Systems Security Conference
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
20
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
Seattle, Washington, Nov. 7-12
-
M. Roesch. Snort: Lightweight intrusion detection for networks. Is. Proceedings of LISA '99:13th Systems Administration Conference, pages 229-238, Seattle, Washington, Nov. 7-12, 1999.
-
(1999)
Proceedings of LISA '99:13th Systems Administration Conference
, pp. 229-238
-
-
Roesch, M.1
-
21
-
-
0242456811
-
Interactive deduplication using active learning
-
Edmonton, Alberta, Canada, July 23-26. ACM Press, New York, NY, USA
-
S. Sarawagi and A. Bhamidipaty. Interactive deduplication using active learning. In Proceedings of the Eighth ACM SIGKDD international conference on Knowledge Discovery and Data Mining (SIGKDD 02), pages 269-278, Edmonton, Alberta, Canada, July 23-26, 2002. ACM Press, New York, NY, USA.
-
(2002)
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD 02)
, pp. 269-278
-
-
Sarawagi, S.1
Bhamidipaty, A.2
-
23
-
-
0042868698
-
Support vector machine active learning with applications to text classification
-
Nov
-
S. Tong and D. Koller. Support vector machine active learning with applications to text classification. Machine Learning Research, 2(11):45-66, Nov 2001.
-
(2001)
Machine Learning Research
, vol.2
, Issue.11
, pp. 45-66
-
-
Tong, S.1
Koller, D.2
-
24
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
H. Debar, L. Mé, and S. F. Wu, editors, Toulouse, France, Oct. 2-4. Springer-Verlag
-
A. Valdes and K. Skinner. Adaptive, model-based monitoring for cyber attack detection. In H. Debar, L. Mé, and S. F. Wu, editors, Recent Advances in Intrusion Detection (RAID 2000), volume 1907 of LNCS, pages 80-92, Toulouse, France, Oct. 2-4, 2000. Springer-Verlag.
-
(2000)
Recent Advances in Intrusion Detection (RAID 2000), Volume 1907 of LNCS
, vol.1907
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
-
25
-
-
84899022519
-
Active learning in the drug discovery process
-
M. K. Warmuth, G. Rätsch, M. Mathieson, I. Liao, and C. Lemmen. Active learning in the drug discovery process. In Neural Information Processing Systems (NIPS01), 2001.
-
(2001)
Neural Information Processing Systems (NIPS01)
-
-
Warmuth, M.K.1
Rätsch, G.2
Mathieson, M.3
Liao, I.4
Lemmen, C.5
|