-
1
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security 3 3 (2000) 186-205
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
2
-
-
0003907293
-
-
Macmillan Technical Publishing, Indianapolis, IN
-
Bace R. Intrusion Detection (2000), Macmillan Technical Publishing, Indianapolis, IN
-
(2000)
Intrusion Detection
-
-
Bace, R.1
-
3
-
-
55949089754
-
-
Briney, A. 2001. 2001 industry survey. Information Security Magazine, October, 34-46.
-
Briney, A. 2001. 2001 industry survey. Information Security Magazine, October, 34-46.
-
-
-
-
4
-
-
18944385964
-
The value of intrusion detection systems (idss) in information technology security architecture
-
Cavusoglu H., Mishra B., and Raghunathan S. The value of intrusion detection systems (idss) in information technology security architecture. Information Systems Research 16 (2005) 28-47
-
(2005)
Information Systems Research
, vol.16
, pp. 28-47
-
-
Cavusoglu, H.1
Mishra, B.2
Raghunathan, S.3
-
5
-
-
34548502174
-
Configuration of detection software: A comparison of decision and game theory approaches
-
Cavusoglu H., and Raghunathan S. Configuration of detection software: A comparison of decision and game theory approaches. Decision Analysis 1 3 (2004) 131-148
-
(2004)
Decision Analysis
, vol.1
, Issue.3
, pp. 131-148
-
-
Cavusoglu, H.1
Raghunathan, S.2
-
6
-
-
55949113909
-
-
Ernst & Young 2003. Global information security survey 2003. White paper, Ernst & Young LLP.
-
Ernst & Young 2003. Global information security survey 2003. White paper, Ernst & Young LLP.
-
-
-
-
7
-
-
33750736286
-
A decisional framework system for computer network intrusion detection
-
Fessi B.A., Hamdi M., Benabdallah S., and Boudriga N. A decisional framework system for computer network intrusion detection. European Journal of Operational Research 177 3 (2007) 1824-1838
-
(2007)
European Journal of Operational Research
, vol.177
, Issue.3
, pp. 1824-1838
-
-
Fessi, B.A.1
Hamdi, M.2
Benabdallah, S.3
Boudriga, N.4
-
9
-
-
55949120510
-
-
Gordon, L.A., Loeb, M.P., Lucyshyn, W., 2005. 2005 CSI/FBI computer crime and security survey. White paper, Computer Security Institute.
-
Gordon, L.A., Loeb, M.P., Lucyshyn, W., 2005. 2005 CSI/FBI computer crime and security survey. White paper, Computer Security Institute.
-
-
-
-
10
-
-
2342646110
-
The effect of intrusion detection management methods on the return on investment
-
Iheagwara C. The effect of intrusion detection management methods on the return on investment. Computers and Security 23 3 (2004) 213-228
-
(2004)
Computers and Security
, vol.23
, Issue.3
, pp. 213-228
-
-
Iheagwara, C.1
-
11
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch K. Clustering intrusion detection alarms to support root cause analysis. ACM Transactions on Information and System Security 6 4 (2003) 443-471
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.4
, pp. 443-471
-
-
Julisch, K.1
-
13
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W., and Stolfo S.J. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security 3 4 (2000) 227-261
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
15
-
-
0018079655
-
Basic principles of ROC analysis
-
Metz C.E. Basic principles of ROC analysis. Seminars in Nuclear Medicine 8 4 (1978) 283-298
-
(1978)
Seminars in Nuclear Medicine
, vol.8
, Issue.4
, pp. 283-298
-
-
Metz, C.E.1
-
16
-
-
55949135562
-
-
PriceWaterhouseCoopers, 2004. Information security breaches survey 2004. Technical Report, Department of Trade and Industry (DTI), United Kingdom.
-
PriceWaterhouseCoopers, 2004. Information security breaches survey 2004. Technical Report, Department of Trade and Industry (DTI), United Kingdom.
-
-
-
-
17
-
-
55949129743
-
Security gets top-level attention
-
Stein T. Security gets top-level attention. Optimize (2003) 23
-
(2003)
Optimize
, pp. 23
-
-
Stein, T.1
-
18
-
-
33746449221
-
A decision analysis method for evaluating computer intrusion detection systems
-
Ulvila J.W., and Gaffney Jr. J.E. A decision analysis method for evaluating computer intrusion detection systems. Decision Analysis 1 1 (2004) 39-54
-
(2004)
Decision Analysis
, vol.1
, Issue.1
, pp. 39-54
-
-
Ulvila, J.W.1
Gaffney Jr., J.E.2
-
19
-
-
0027457620
-
Receiver-operating characteristic (ROC) plots: A fundamental evaluation tool in clinical medicine
-
Zweig M.H., and Campbell G. Receiver-operating characteristic (ROC) plots: A fundamental evaluation tool in clinical medicine. Clinical Chemistry 39 (1993) 561-577
-
(1993)
Clinical Chemistry
, vol.39
, pp. 561-577
-
-
Zweig, M.H.1
Campbell, G.2
|