-
1
-
-
0041419360
-
The mixture transition distribution model for high-order Markov chains and non-Gaussian time series
-
A. Berchtold, and E. Raftery The mixture transition distribution model for high-order Markov chains and non-Gaussian time series Stat. Sci. 17 2002 328 356
-
(2002)
Stat. Sci.
, vol.17
, pp. 328-356
-
-
Berchtold, A.1
Raftery, E.2
-
2
-
-
0028516811
-
Sublinear approximate string matching and biological applications
-
W.I. Chang, and E.L. Lawler Sublinear approximate string matching and biological applications Algorithmica 12 4/5 1994 327 344
-
(1994)
Algorithmica
, vol.12
, Issue.4-5
, pp. 327-344
-
-
Chang, W.I.1
Lawler, E.L.2
-
4
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
D. Barbara S. Jajodia Kluwer Academic Publishers Netherlands
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data D. Barbara S. Jajodia Applications of Data Mining in Computer Security 2002 Kluwer Academic Publishers Netherlands
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
5
-
-
2342576784
-
Predicting the intrusion intentions by observing system call sequences
-
L. Feng, X. Guan, S. Guo, Y. Gao, and P. Liu Predicting the intrusion intentions by observing system call sequences Comput. Secur. 23 2004 241 252
-
(2004)
Comput. Secur.
, vol.23
, pp. 241-252
-
-
Feng, L.1
Guan, X.2
Guo, S.3
Gao, Y.4
Liu, P.5
-
7
-
-
0001553729
-
From Ukkonen to McCreight and Weiner: A unifying view of linear-time suffix tree construction
-
R. Giegerich, and S. Kurtz From Ukkonen to McCreight and Weiner: a unifying view of linear-time suffix tree construction Algorithmica 19 3 1997 331 353
-
(1997)
Algorithmica
, vol.19
, Issue.3
, pp. 331-353
-
-
Giegerich, R.1
Kurtz, S.2
-
8
-
-
0035616570
-
A hybrid high-order Markov chain model for computer intrusion detection
-
W. Ju, and Y. Vardi A hybrid high-order Markov chain model for computer intrusion detection J. Comput. Gr. Stat. 10 2001 277 295
-
(2001)
J. Comput. Gr. Stat.
, vol.10
, pp. 277-295
-
-
Ju, W.1
Vardi, Y.2
-
12
-
-
0041965869
-
Text classification using string kernels
-
H. Lodhi, C. Saunders, J. Shawe-Taylor, N. Cristianini, and C. Watkins Text classification using string kernels J. Mach. Learn. Res. 2 2002 419 444
-
(2002)
J. Mach. Learn. Res.
, vol.2
, pp. 419-444
-
-
Lodhi, H.1
Saunders, C.2
Shawe-Taylor, J.3
Cristianini, N.4
Watkins, C.5
-
13
-
-
0038091288
-
-
Technical Report MSR-TR-99-87, Microsoft Research
-
B. Schölkopf, B.J.C. Platt, J. Shawe-Taylor, A.J. Smola, Estimating the support of a high-dimensional distribution, Technical Report MSR-TR-99-87, Microsoft Research, 1999.
-
(1999)
Estimating the Support of a High-dimensional Distribution
-
-
Schölkopf, B.1
Platt, B.J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
-
17
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
N. Ye, X. Li, Q. Chen, S.M. Emran, and M. Xu Probabilistic techniques for intrusion detection based on computer audit data IEEE Trans. Syst. Man Cybern. - Part A: Syst. Hum. 31 2001 266 274
-
(2001)
IEEE Trans. Syst. Man Cybern. - Part A: Syst. Hum.
, vol.31
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
18
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D. Yeung, and Y. Ding Host-based intrusion detection using dynamic and static behavioral models Pattern Recognition 36 2003 229 243
-
(2003)
Pattern Recognition
, vol.36
, pp. 229-243
-
-
Yeung, D.1
Ding, Y.2
-
19
-
-
20444395427
-
Research on technology of intrusion detection based on linear prediction and Markov model
-
Q.B. Yin, R.B. Zhang, X.Y. Li, and H.Q. Wang Research on technology of intrusion detection based on linear prediction and Markov model Chin. J. Comput. 28 5 2005 900 907
-
(2005)
Chin. J. Comput.
, vol.28
, Issue.5
, pp. 900-907
-
-
Yin, Q.B.1
Zhang, R.B.2
Li, X.Y.3
Wang, H.Q.4
-
20
-
-
38649097589
-
Efficient computations of gapped string kernels based on suffix kernel
-
C.H. Yin, S.F. Tian, S.M. Mu, and C. Shao Efficient computations of gapped string kernels based on suffix kernel Neurocomputing 71 2008 944 962
-
(2008)
Neurocomputing
, vol.71
, pp. 944-962
-
-
Yin, C.H.1
Tian, S.F.2
Mu, S.M.3
Shao, C.4
|