-
1
-
-
84882582017
-
An inside look at botnets
-
Part III
-
Barford, P., Yegneswaran, V.: An inside look at botnets. In: Book Series Advances in Information Security: Malware Detection, Part III, vol. 27, pp. 171-191 (2007)
-
(2007)
Book Series Advances in Information Security: Malware Detection
, vol.27
, pp. 171-191
-
-
Barford, P.1
Yegneswaran, V.2
-
2
-
-
58349086272
-
-
The Honeynet Project (ed.): Know Your Enemy: Learning about Security Threats, 2nd edn. Addison Wesley Professional, Reading (May 2004)
-
The Honeynet Project (ed.): Know Your Enemy: Learning about Security Threats, 2nd edn. Addison Wesley Professional, Reading (May 2004)
-
-
-
-
4
-
-
48749114837
-
Internet attack knowledge discovery via clusters and cliques of attack traces
-
Pouget, F., Dacier, M., Zimmerman, J., Clark, A., Mohay, G.: Internet attack knowledge discovery via clusters and cliques of attack traces. Journal of Information Assurance and Security 1, 21-32 (2006)
-
(2006)
Journal of Information Assurance and Security
, vol.1
, pp. 21-32
-
-
Pouget, F.1
Dacier, M.2
Zimmerman, J.3
Clark, A.4
Mohay, G.5
-
5
-
-
85093847546
-
-
Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., Dagon, D.: Peer-to-peer botnets: Overview and case study. In: HotBots 2007 (April 2007) Paper No. 1
-
Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., Dagon, D.: Peer-to-peer botnets: Overview and case study. In: HotBots 2007 (April 2007) Paper No. 1
-
-
-
-
6
-
-
58349095295
-
-
Nazario, J.: Botnet tracking: Tools, techniques, and lessons learned (2007) (accessed November 14, 2007), http://www.blackhat.com/presentations/bh- dc-07/Nazario/Paper/bh-dc-07-Nazario-WP.pdf
-
Nazario, J.: Botnet tracking: Tools, techniques, and lessons learned (2007) (accessed November 14, 2007), http://www.blackhat.com/presentations/bh- dc-07/Nazario/Paper/bh-dc-07-Nazario-WP.pdf
-
-
-
-
7
-
-
0347172110
-
OPTICS: Ordering points to identify the clustering structure
-
Ankerst, M., Breunig, M.M., Kriegel, H.P., Sander, J.: OPTICS: ordering points to identify the clustering structure. In: SIGMOD 1999, pp. 49-60 (1999)
-
(1999)
SIGMOD 1999
, pp. 49-60
-
-
Ankerst, M.1
Breunig, M.M.2
Kriegel, H.P.3
Sander, J.4
-
9
-
-
28044431838
-
Scalable model-based clustering for large data-bases based on data summarization
-
Jin, H., Wong, M.L., Leung, K.S.: Scalable model-based clustering for large data-bases based on data summarization. IEEE Transactions on Pattern Analysis and Machine Intelligence 27(11), 1710-1719 (2005)
-
(2005)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.27
, Issue.11
, pp. 1710-1719
-
-
Jin, H.1
Wong, M.L.2
Leung, K.S.3
-
10
-
-
0039845384
-
Efficient algorithms for mining outliers from large data sets
-
Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: SIGMOD 2000, pp. 427-438 (2000)
-
(2000)
SIGMOD 2000
, pp. 427-438
-
-
Ramaswamy, S.1
Rastogi, R.2
Shim, K.3
-
11
-
-
0039253819
-
-
Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: SIGMOD 2000, pp. 93-104 (2000)
-
Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: SIGMOD 2000, pp. 93-104 (2000)
-
-
-
-
12
-
-
20444444362
-
A comparative study of anomaly detection schemes in network intrusion detection
-
Lazarevic, A., Ertöz, L., Kumar, V., Ozgur, A., Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection. In: SDM 2003 (2003)
-
(2003)
SDM
-
-
Lazarevic, A.1
Ertöz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
13
-
-
85084163349
-
-
Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: USENIX SSYM 1998, p. 6 (1998)
-
Lee, W., Stolfo, S.J.: Data mining approaches for intrusion detection. In: USENIX SSYM 1998, p. 6 (1998)
-
-
-
|