-
1
-
-
84878041682
-
-
Securityfocus (BID 2674). Microsoft IIS 5.0 .printer ISAPI Extension buffer overflow vulnerability, 2006.
-
Securityfocus (BID 2674). Microsoft IIS 5.0 .printer ISAPI Extension buffer overflow vulnerability, 2006.
-
-
-
-
2
-
-
84878104803
-
-
Securityfocus (BID 3526). ActivePerl perlIIS.dll buffer overflow vulnerability, 2006.
-
Securityfocus (BID 3526). ActivePerl perlIIS.dll buffer overflow vulnerability, 2006.
-
-
-
-
7
-
-
2942723846
-
A divisive information-theoretic feature clustering algorithm for text classification
-
I. S. Dhillon, S. Mallela, and R. Kumar. A divisive information-theoretic feature clustering algorithm for text classification. Journal of Machine Learning Research, 3:1265-1287, 2003.
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 1265-1287
-
-
Dhillon, I.S.1
Mallela, S.2
Kumar, R.3
-
10
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
D. Barbara and S. Jajodia, editors, Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo. A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In D. Barbara and S. Jajodia, editors, Applications of Data Mining in Computer Security. Kluwer, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
12
-
-
85077703150
-
Polymorphic blending attack
-
P. Fogla, M. Sharif, R. Perdisci, O. M. Kolesnikov, and W Lee. Polymorphic blending attack. In USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.M.4
Lee, W.5
-
13
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
G. Giacinto, F. Roli, and L. Didaci. Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters, 24(12): 1795-1803, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.12
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
14
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna. Automating mimicry attacks using static binary analysis. In USENIX Security Symposium, 2005.
-
(2005)
USENIX Security Symposium
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
17
-
-
0036161242
-
Text categorization with support vector machines. How to represent texts in input space?
-
E. Leopold and J. Kindermann. Text categorization with support vector machines. How to represent texts in input space? Machine Learning, 46:423-444, 2002.
-
(2002)
Machine Learning
, vol.46
, pp. 423-444
-
-
Leopold, E.1
Kindermann, J.2
-
19
-
-
0034270431
-
Defending your-self: The role of intrusion detection systems
-
Sept./Oct
-
J. McHugh, A. Christie, and J. Allen. Defending your-self: The role of intrusion detection systems. IEEE Software, pages 42-51, Sept./Oct. 2000.
-
(2000)
IEEE Software
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
21
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
B. Schölkopf, J. Platt, J. Shawe-Taylor, A. J. Smola, and RC Williamson. Estimating the support of a high-dimensional distribution. Neural Computation, 13:1443-1471, 2001.
-
(2001)
Neural Computation
, vol.13
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
22
-
-
0002442796
-
Machine learning in automated text categorization
-
March
-
F. Sebastiani. Machine learning in automated text categorization. ACM Computing Surveys, 34(1): 1-47, March 2002.
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.1
, pp. 1-47
-
-
Sebastiani, F.1
-
23
-
-
9444240096
-
-
PhD thesis, Delft University of Technology, Delft, Netherland
-
D. M. J. Tax. One-Class Classification, Concept Learning in the Absence of Counter Examples. PhD thesis, Delft University of Technology, Delft, Netherland, 2001.
-
(2001)
One-Class Classification, Concept Learning in the Absence of Counter Examples
-
-
Tax, D.M.J.1
|