-
1
-
-
33746368833
-
Self-Regulating Network Utilization in Mobile Ad-Hoc Wireless Networks
-
July
-
S. Ci et al., "Self-Regulating Network Utilization in Mobile Ad-Hoc Wireless Networks," IEEE Trans. Vehic. Tech., vol. 55, no. 4, July 2006, pp. 1302-10.
-
(2006)
IEEE Trans. Vehic. Tech
, vol.55
, Issue.4
, pp. 1302-1310
-
-
Ci, S.1
-
2
-
-
50949103638
-
-
X. Du et al., A Secure Routing Protocol for Heterogeneous Sensor Networks, Proc. IEEE GLOBECOM '06, San Francisco, CA, Nov. 2006.
-
X. Du et al., "A Secure Routing Protocol for Heterogeneous Sensor Networks," Proc. IEEE GLOBECOM '06, San Francisco, CA, Nov. 2006.
-
-
-
-
3
-
-
0024610919
-
A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
-
Feb
-
L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, Feb. 1989, pp. 257-86.
-
(1989)
Proc. IEEE
, vol.77
, pp. 257-286
-
-
Rabiner, L.R.1
-
4
-
-
34247391599
-
System Approach to Intrusion Detection Using Hidden Markov Model
-
July
-
R. Khanna and H. Liu, "System Approach to Intrusion Detection Using Hidden Markov Model," Proc. 2006 Int'l. Conf. Commun, and Mobile Comp., July 2006, pp. 349-54.
-
(2006)
Proc. 2006 Int'l. Conf. Commun, and Mobile Comp
, pp. 349-354
-
-
Khanna, R.1
Liu, H.2
-
5
-
-
77953783421
-
Investigating Hidden Markov Models Capabilities in Anomaly Detection
-
Kennesaw, GA, Mar
-
S. S. Joshi and V. V. Phoha, "Investigating Hidden Markov Models Capabilities in Anomaly Detection," Proc. 43rd Annual Southeast Regional Conf.), Kennesaw, GA, Mar. 2005, pp. 98-103.
-
(2005)
Proc. 43rd Annual Southeast Regional Conf.)
, pp. 98-103
-
-
Joshi, S.S.1
Phoha, V.V.2
-
6
-
-
43949095092
-
Using Hidden Markov Models to Evaluate the Risks of Intrusions: System Architecture and Model Validation
-
Hamburg, Germany, Sept
-
A. Arnes et al., "Using Hidden Markov Models to Evaluate the Risks of Intrusions: System Architecture and Model Validation," Proc. Int'l. Symp. Recent Advances in Intrusion Detection, Hamburg, Germany, Sept. 2006.
-
(2006)
Proc. Int'l. Symp. Recent Advances in Intrusion Detection
-
-
Arnes, A.1
-
7
-
-
84969506768
-
Applications of hidden Markov Models to Detecting Multi-stage Network Attacks
-
Jan
-
D. Ourston et al., "Applications of hidden Markov Models to Detecting Multi-stage Network Attacks," Proc. 36th Annual Hawaii Int'l. Conf. (Sys. Sci. '03), Jan. 2003.
-
(2003)
Proc. 36th Annual Hawaii Int'l. Conf. (Sys. Sci. '03)
-
-
Ourston, D.1
-
8
-
-
6344239144
-
Modeling Program Behaviors by Hidden Markov Models for Intrusion Detection
-
Aug
-
W. Wang, X. -H. Guan, and X.-L. Zhang, "Modeling Program Behaviors by Hidden Markov Models for Intrusion Detection," Proc. Int'l. Conf. Machine Learning and Cybernetics, 2004, Aug. 2004, pp. 2830-35.
-
(2004)
Proc. Int'l. Conf. Machine Learning and Cybernetics
, pp. 2830-2835
-
-
Wang, W.1
Guan, X.-H.2
Zhang, X.-L.3
-
9
-
-
35048846516
-
Behavioral Intrusion Detection
-
S. Zanero, "Behavioral Intrusion Detection," ISCIS '04, 2004.
-
(2004)
ISCIS '04
-
-
Zanero, S.1
-
11
-
-
29844441257
-
A Data Mining Analysis of RTID Alarms
-
Purdue Univ, West Lafayette, IN, Sept
-
S. Manganaris et al., "A Data Mining Analysis of RTID Alarms," 2nd Int'l. Wksp. Recent Advances in Intrusion Detection, Purdue Univ., West Lafayette, IN, Sept. 1999.
-
(1999)
2nd Int'l. Wksp. Recent Advances in Intrusion Detection
-
-
Manganaris, S.1
-
12
-
-
0030126609
-
Learning in the Presence of Concept Drifting and Hidden Contexts
-
G. Widmer and M. Kubat, "Learning in the Presence of Concept Drifting and Hidden Contexts," Machine Learning, vol. 23, 1996, pp. 69-101.
-
(1996)
Machine Learning
, vol.23
, pp. 69-101
-
-
Widmer, G.1
Kubat, M.2
-
13
-
-
12244286335
-
Systematic Data Selection to Mine Concept-Drifting Data Streams
-
W. Fan, "Systematic Data Selection to Mine Concept-Drifting Data Streams," ACM SIGKDD, 2004.
-
(2004)
ACM SIGKDD
-
-
Fan, W.1
-
16
-
-
0030287048
-
The Expectation-Maximization Algorithm
-
Nov
-
T. K. Moon, "The Expectation-Maximization Algorithm," IEEE Signal Processing, Nov. 1996, pp. 47-59.
-
(1996)
IEEE Signal Processing
, pp. 47-59
-
-
Moon, T.K.1
-
17
-
-
0032639421
-
Detecting Intrusions Using System Calls: Alternative Data Models
-
Oakland, CA
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models," IEEE Symp. Sec. and Privacy, Oakland, CA, 1999, pp. 133-45.
-
(1999)
IEEE Symp. Sec. and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|