-
2
-
-
0030211964
-
Bagging Predictors
-
L. Breiman. Bagging Predictors. Machine Learning, 24(2):123-140, 1996.
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
4
-
-
33745788387
-
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits
-
Alexandria, VA
-
J. R. Crandall, Z. Su, S. F. Wu, and F. T. Chong. On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits. In ACM Conference on Computer and Communications Security, Alexandria, VA, 2005.
-
(2005)
ACM Conference on Computer and Communications Security
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
6
-
-
33644565261
-
Polymorphic Shellcode Engine Using Spectrum Analysis
-
T. Detristan, T. Ulenspiegel, Y. Malcom, and M. S. von Underduk. Polymorphic Shellcode Engine Using Spectrum Analysis. Phrack, 11(61-9), 2003.
-
(2003)
Phrack
, vol.11
, Issue.61-69
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
von Underduk, M.S.4
-
8
-
-
0344324689
-
Metacost: A general method for making classifiers cost-sensitive
-
P. Domingos. Metacost: A general method for making classifiers cost-sensitive. In Knowledge Discovery and Data Mining, pages 155-164, 1999.
-
(1999)
Knowledge Discovery and Data Mining
, pp. 155-164
-
-
Domingos, P.1
-
11
-
-
84983110889
-
A decision-theoretic generalization of on-line learning and an application to boosting
-
Y. Freund and R. E. Schapire. A decision-theoretic generalization of on-line learning and an application to boosting. In European Conference on Computational Learning Theory, pages 23-37, 1995.
-
(1995)
European Conference on Computational Learning Theory
, pp. 23-37
-
-
Freund, Y.1
Schapire, R.E.2
-
15
-
-
85019691440
-
Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory
-
J. McHugh. Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. ACM TISSEC, 3(4):262-291, 2000.
-
(2000)
ACM TISSEC
, vol.3
, Issue.4
, pp. 262-291
-
-
McHugh, J.1
-
17
-
-
27544498978
-
Polygraph: Automatically Generating Signatures for Polymorphic Worms
-
Oakland, CA
-
J. Newsome, B. Karp, and D. Song. Polygraph: Automatically Generating Signatures for Polymorphic Worms. In IEEE Security and Privacy, Oakland, CA, 2005.
-
(2005)
IEEE Security and Privacy
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
19
-
-
50249154097
-
-
B. Parmanto, M. P. W., and H. R. Doyle. Improving Committee Diagnosis with Resampling Techniques. Advances in Neural Information Processing Systems, 8:882-888, 1996.
-
B. Parmanto, M. P. W., and H. R. Doyle. Improving Committee Diagnosis with Resampling Techniques. Advances in Neural Information Processing Systems, 8:882-888, 1996.
-
-
-
-
23
-
-
41549098765
-
On the Infeasibility of Modeling Polymorphic Shellcode
-
Y. Song, M. E. Locasto, A. Stavrou, A. D. Keromytis, and S. J. Stolfo. On the Infeasibility of Modeling Polymorphic Shellcode. In ACM Computer and Communications Security Conference (CCS), 2007.
-
(2007)
ACM Computer and Communications Security Conference (CCS)
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
24
-
-
84962238645
-
Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project
-
S. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. Chan. Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project. In Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX), 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition (DISCEX)
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.5
-
25
-
-
0036085540
-
Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector
-
May
-
K. M. Tan and R. A. Maxion. Why 6? Defining the Operational Limits of stide, an Anomaly-Based Intrusion Detector. In Proceedings of the IEEE Symposium on Security and Privacy, pages 188-201, May 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 188-201
-
-
Tan, K.M.1
Maxion, R.A.2
-
27
-
-
0038011184
-
Mimicry Attacks on Host-Based Intrusion Detection Systems
-
D. Wagner and P. Soto. Mimicry Attacks on Host-Based Intrusion Detection Systems. In ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Wagner, D.1
Soto, P.2
-
31
-
-
0026692226
-
Stacked Generalization
-
D. Wolpert. Stacked Generalization. In Neural Networks, volume 5, pages 241-259, 1992.
-
(1992)
Neural Networks
, vol.5
, pp. 241-259
-
-
Wolpert, D.1
|