-
1
-
-
12844286929
-
The shellcode generation
-
Arce I. The shellcode generation. IEEE Security and Privacy 2 5 (2004) 72-76
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.5
, pp. 72-76
-
-
Arce, I.1
-
3
-
-
0031191630
-
The use of the area under the roc curve in the evaluation of machine learning algorithms
-
Bradley A.P. The use of the area under the roc curve in the evaluation of machine learning algorithms. Pattern Recognition 30 7 (1997) 1145-1159
-
(1997)
Pattern Recognition
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.P.1
-
6
-
-
27244448490
-
Network intrusion detection by a multi-stage classification system
-
MCS
-
L.P. Cordella, A. Limongiello, C. Sansone, Network intrusion detection by a multi-stage classification system, in: Multiple Classifier Systems (MCS), 2004, pp. 324-333.
-
(2004)
Multiple Classifier Systems
, pp. 324-333
-
-
Cordella, L.P.1
Limongiello, A.2
Sansone, C.3
-
7
-
-
21844435105
-
Confidence intervals for the area under the roc curve
-
Advances in Neural Information Processing Systems
-
C. Cortes, M. Mohri, Confidence intervals for the area under the roc curve, in: NIPS 2004: Advances in Neural Information Processing Systems, 2004.
-
(2004)
NIPS
-
-
Cortes, C.1
Mohri, M.2
-
8
-
-
27544481859
-
-
T. Detristan, T. Ulenspiegel, Y. Malcom, M. Underduk, Polymorphic shellcode engine using spectrum analysis, Phrack Issue 0x3d, 2003.
-
(2003)
Polymorphic shellcode engine using spectrum analysis, Phrack Issue 0x3d
-
-
Detristan, T.1
Ulenspiegel, T.2
Malcom, Y.3
Underduk, M.4
-
9
-
-
2942723846
-
A divisive information-theoretic feature clustering algorithm for text classification
-
Dhillon I.S., Mallela S., and Kumar R. A divisive information-theoretic feature clustering algorithm for text classification. Journal of Machine Learning Research 3 (2003) 1265-1287
-
(2003)
Journal of Machine Learning Research
, vol.3
, pp. 1265-1287
-
-
Dhillon, I.S.1
Mallela, S.2
Kumar, R.3
-
12
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data
-
Barbara D., and Jajodia S. (Eds), Kluwer
-
Eskin E., Arnold A., Prerau M., Portnoy L., and Stolfo S. A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. In: Barbara D., and Jajodia S. (Eds). Applications of Data Mining in Computer Security (2002), Kluwer
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
14
-
-
85077703150
-
Polymorphic blending attack
-
P. Fogla, M. Sharif, R. Perdisci, O.M. Kolesnikov, W. Lee, Polymorphic blending attack, in: USENIX Security Symposium, 2006.
-
(2006)
USENIX Security Symposium
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.M.4
Lee, W.5
-
15
-
-
35348821822
-
Intrusion detection in computer networks by a modular ensemble of one-class classifiers
-
Giacinto G., Perdisci R., Del Rio M., and Roli F. Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Information Fusion 9 1 (2008) 69-82
-
(2008)
Information Fusion
, vol.9
, Issue.1
, pp. 69-82
-
-
Giacinto, G.1
Perdisci, R.2
Del Rio, M.3
Roli, F.4
-
16
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
Giacinto G., Roli F., and Didaci L. Fusion of multiple classifiers for intrusion detection in computer networks. Pattern Recognition Letters 24 12 (2003) 1795-1803
-
(2003)
Pattern Recognition Letters
, vol.24
, Issue.12
, pp. 1795-1803
-
-
Giacinto, G.1
Roli, F.2
Didaci, L.3
-
18
-
-
0032021555
-
On combining classifiers
-
Kittler J., Hatef M., Duin R.P.W., and Matas J. On combining classifiers. IEEE Transactions Pattern Analysis and Machine Intelligence 20 3 (1998) 226-239
-
(1998)
IEEE Transactions Pattern Analysis and Machine Intelligence
, vol.20
, Issue.3
, pp. 226-239
-
-
Kittler, J.1
Hatef, M.2
Duin, R.P.W.3
Matas, J.4
-
21
-
-
0036161242
-
Text categorization with support vector machines. How to represent texts in input space?
-
Leopold E., and Kindermann J. Text categorization with support vector machines. How to represent texts in input space?. Machine Learning 46 (2002) 423-444
-
(2002)
Machine Learning
, vol.46
, pp. 423-444
-
-
Leopold, E.1
Kindermann, J.2
-
22
-
-
0034301517
-
The 1999 darpa off-line intrusion detection evaluation
-
Lippmann R., Haines J.W., Fried D.J., Korba J., and Das K. The 1999 darpa off-line intrusion detection evaluation. Computer Networks 34 4 (2000) 579-595
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
23
-
-
10844237614
-
An analysis of the 1999 darpa lincoln laboratory evaluation data for network anomaly detection
-
M.V. Mahoney, P.K. Chan, An analysis of the 1999 darpa lincoln laboratory evaluation data for network anomaly detection, in: Recent Advances in Intrusion Detection (RAID), 2003.
-
(2003)
Recent Advances in Intrusion Detection (RAID)
-
-
Mahoney, M.V.1
Chan, P.K.2
-
24
-
-
85019691440
-
Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh J. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security 3 4 (2000) 262-294
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
25
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
McHugh J., Christie A., and Allen J. Defending yourself: The role of intrusion detection systems. IEEE Software (2000) 42-51
-
(2000)
IEEE Software
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
26
-
-
60349101742
-
Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems
-
R. Perdisci, G. Gu, W. Lee, Using an ensemble of one-class svm classifiers to harden payload-based anomaly detection systems, in: ICDM'06: Proceedings of the Sixth International Conference on Data Mining, 2006, pp. 488-498.
-
(2006)
ICDM'06: Proceedings of the Sixth International Conference on Data Mining
, pp. 488-498
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
28
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Schölkopf B., Platt J., Shawe-Taylor J., Smola A.J., and Williamson R.C. Estimating the support of a high-dimensional distribution. Neural Computation 13 (2001) 1443-1471
-
(2001)
Neural Computation
, vol.13
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
29
-
-
0002442796
-
Machine learning in automated text categorization
-
Sebastiani F. Machine learning in automated text categorization. ACM Computing Surveys 34 1 (2002) 1-47
-
(2002)
ACM Computing Surveys
, vol.34
, Issue.1
, pp. 1-47
-
-
Sebastiani, F.1
-
30
-
-
41549098765
-
On the infeasibility of modeling polymorphic shellcode
-
Y. Song, M.E. Locasto, A. Stavrou, A.D. Keromytis, S.J. Stolfo, On the infeasibility of modeling polymorphic shellcode, in: CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007.
-
(2007)
CCS'07: Proceedings of the 14th ACM Conference on Computer and Communications Security
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
31
-
-
9444240096
-
-
Ph.D. Thesis, Delft University of Technology, Delft, Netherland
-
D.M.J. Tax, One-Class Classification, Concept Learning in the Absence of Counter Examples. Ph.D. Thesis, Delft University of Technology, Delft, Netherland, 2001.
-
(2001)
One-Class Classification, Concept Learning in the Absence of Counter Examples
-
-
Tax, D.M.J.1
|