-
1
-
-
11844281602
-
-
Florida Institute of Technology: Melbourne, FL, USA
-
Chan, P.K., M.V. Mahoney, and M.H. Arshad, A Machine Learning Approach to Anomaly Detection. 2003, Florida Institute of Technology: Melbourne, FL, USA.
-
(2003)
A Machine Learning Approach to Anomaly Detection
-
-
Chan, P.K.1
Mahoney, M.V.2
Arshad, M.H.3
-
2
-
-
51849159397
-
-
McHugh, J. The 1998 Lincoln Laboratory IDS Evaluation (A Critique). in Recent Advances in Intrusion Detection 2000 (RAID 2000). 2000. Toulouse, France: Springer.
-
McHugh, J. The 1998 Lincoln Laboratory IDS Evaluation (A Critique). in Recent Advances in Intrusion Detection 2000 (RAID 2000). 2000. Toulouse, France: Springer.
-
-
-
-
3
-
-
51849142535
-
-
Philadelphia, PA, USA: ACM Press
-
Portnoy, L., E. Eskin, and S. Stolfo. Intrusion detection with unlabeled data using clustering. in Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001). 2001. Philadelphia, PA, USA: ACM Press.
-
(2001)
Intrusion detection with unlabeled data using clustering. in Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001)
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
4
-
-
51849137203
-
-
ACM. KDD CUP 1999 data. [cited 12 January 2007]; Available from: http://kdd.ics.uci.edU//databases/kddcup99/kddcup99.html.
-
ACM. KDD CUP 1999 data. [cited 12 January 2007]; Available from: http://kdd.ics.uci.edU//databases/kddcup99/kddcup99.html.
-
-
-
-
5
-
-
0242456133
-
An Empirical Analysis of NATE: Network Analysis of Anomalous Traffic Events
-
Virginia Beach, Virginia, USA: ACM Press
-
Taylor, C. and J. Alves-Foss. An Empirical Analysis of NATE: Network Analysis of Anomalous Traffic Events. in 10th New Security Paradigms Workshop. 2002. Virginia Beach, Virginia, USA: ACM Press.
-
(2002)
10th New Security Paradigms Workshop
-
-
Taylor, C.1
Alves-Foss, J.2
-
6
-
-
0242456143
-
NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach
-
Cloudcroft, New Mexico, USA
-
Taylor, C. and J. Alves-Foss. NATE: Network Analysis of Anomalous Traffic Events, a low-cost approach. in Proceedings of New Security Paradigms Workshop. 2001. Cloudcroft, New Mexico, USA.
-
(2001)
Proceedings of New Security Paradigms Workshop
-
-
Taylor, C.1
Alves-Foss, J.2
-
7
-
-
0003993827
-
-
cited 2006 15 October 2006, Available from
-
DARPA. DARPA Intrusion Detection Evaluation Data Sets. 1999 [cited 2006 15 October 2006]; Available from: http://www.ll.mit.edu/IST/ideval/data/ data_index.html.
-
(1999)
DARPA Intrusion Detection Evaluation Data Sets
-
-
-
8
-
-
51849145518
-
-
Li, X. and N. Ye. Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. in Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics. 2004. Tucson, AZ, USA: Springer-Verlag.
-
Li, X. and N. Ye. Mining Normal and Intrusive Activity Patterns for Computer Intrusion Detection. in Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics. 2004. Tucson, AZ, USA: Springer-Verlag.
-
-
-
-
9
-
-
11844281602
-
Clustering as an add-on for firewalls
-
Malaga, Spain: WIT Press, Southampton, UK
-
Caruso, C. and D. Malerba. Clustering as an add-on for firewalls. in Fifth International Conference on Data Mining, Text Mining and Their Business Applications (DATA MINING 2004). 2004. Malaga, Spain: WIT Press, Southampton, UK.
-
(2004)
Fifth International Conference on Data Mining, Text Mining and Their Business Applications (DATA MINING
-
-
Caruso, C.1
Malerba, D.2
-
10
-
-
27544463917
-
A clustering algorithm for intrusion detection
-
Orlando, Florida, USA
-
Wang, Q. and V. Megalooikonomou. A clustering algorithm for intrusion detection. in SPIE Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security. 2005. Orlando, Florida, USA.
-
(2005)
SPIE Conference on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security
-
-
Wang, Q.1
Megalooikonomou, V.2
-
11
-
-
0000924888
-
Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection: Results from the JAM Project
-
Stolfo, S.J., W. Fan, et al. Cost-based Modeling and Evaluation for Data Mining With Application to Fraud and Intrusion Detection: Results from the JAM Project, in Proceedings of 2000 DARPA Information Survivability Conference and Exposition. 2000.
-
(2000)
Proceedings of 2000 DARPA Information Survivability Conference and Exposition
-
-
Stolfo, S.J.1
Fan, W.2
|