-
1
-
-
0742290133
-
An introduction to biometric recognition
-
Video Technol
-
A. K. Jain, A. Ross, and S. Prabhakar, "An introduction to biometric recognition, " IEEE Trans. Circuits Syst., Vol. 14., pp. 4-20, Video Technol, 2004.
-
(2004)
IEEE Trans. Circuits Syst.
, vol.14
, pp. 4-20
-
-
Jain, A.K.1
Ross, A.2
Prabhakar, S.3
-
2
-
-
84866686035
-
Motor-Skill Based Biometrics, In Assuring Business processes
-
Ed. G. Dhillon. Global Publishing, Las Vegas, NV, USA., April 11-12
-
R. V. Yampolskiy, "Motor-Skill Based Biometrics, " In Assuring Business processes, Proceedings of the 6th Annual Security Conference, Ed. G. Dhillon. Global Publishing, Las Vegas, NV, USA., April 11-12, 2007.
-
(2007)
Proceedings of the 6th Annual Security Conference
-
-
Yampolskiy, R.V.1
-
3
-
-
34548127995
-
Human Computer Interaction Based Intrusion Detection
-
Las Vegas, Nevada, USA, April 2-4
-
R. V. Yampolskiy, "Human Computer Interaction Based Intrusion Detection, " 4th International Conference on Information Technology: New Generations (ITNG 2007), Las Vegas, Nevada, USA, April 2-4, 2007.
-
(2007)
4th International Conference on Information Technology: New Generations (ITNG 2007)
-
-
Yampolskiy, R.V.1
-
4
-
-
34147151570
-
-
Available at, Retrieved July 12
-
J. Ilonen, "Keystroke dynamics, " Available at: www.it.lut.fi/kurssit/03-04/010970000/seminars /Ilonen.pdf, Retrieved July 12, 2006.
-
(2006)
Keystroke dynamics
-
-
Ilonen, J.1
-
8
-
-
47849125043
-
Keystroke Analysis of Different Languages: A Case Study
-
Madrid, Spain
-
D. Gunetti, C. Picardi, and G. Ruffo, "Keystroke Analysis of Different Languages: a Case Study, " Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005), Madrid, Spain, 2005.
-
(2005)
Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005)
-
-
Gunetti, D.1
Picardi, C.2
Ruffo, G.3
-
9
-
-
79956145257
-
Keystroke Biometric Recognition on Long-Text Input: A Feasibility Study
-
Hong Kong, June
-
M. Curtin, C. C. Tappert, M. Villani, G. Ngo, J. Simone, H. S. Fort, and S. Cha, "Keystroke Biometric Recognition on Long-Text Input: A Feasibility Study, " Proc. Int. Workshop Sci Comp/Comp Stat (IWSCCS 2006), Hong Kong, June 2006.
-
(2006)
Proc. Int. Workshop Sci Comp/Comp Stat (IWSCCS 2006)
-
-
Curtin, M.1
Tappert, C.C.2
Villani, M.3
Ngo, G.4
Simone, J.5
Fort, H.S.6
Cha, S.7
-
10
-
-
60749096615
-
-
MLMTA
-
G. Bartolacci, M. Curtin, M. Katzenberg, N. Nwana, S.-H. Cha, and C. C. Tappert, " Long-Text Keystroke Biometric Applications over the Internet, " MLMTA, 2005.
-
(2005)
Long-Text Keystroke Biometric Applications over the Internet
-
-
Bartolacci, G.1
Curtin, M.2
Katzenberg, M.3
Nwana, N.4
Cha, S.-H.5
Tappert, C.C.6
-
12
-
-
84883286001
-
Detecting Computer Intrusions Using Behavioral Biometrics
-
Security and Trust, St. Andrews, New Brunswick, Canada, October
-
A. A. E. Ahmed and I. Traore, "Detecting Computer Intrusions Using Behavioral Biometrics, " Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, October, 2005.
-
(2005)
Third Annual Conference on Privacy
-
-
Ahmed, A.A.E.1
Traore, I.2
-
13
-
-
33745449771
-
Anomaly Intrusion Detection based on Biometrics
-
United States Military Academy, West Point, NY, June
-
A. A. E. Ahmed and I. Traore, "Anomaly Intrusion Detection based on Biometrics, " Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2005.
-
(2005)
Workshop on Information Assurance
-
-
Ahmed, A.A.E.1
Traore, I.2
-
14
-
-
8844279221
-
A Behavioral Biometric System Based on Human Computer Interaction
-
H. Gamboa and V.-. A. Fred., 2004., "A Behavioral Biometric System Based on Human Computer Interaction, " In Proceedings of SPIE, 2004.
-
(2004)
Proceedings of SPIE
-
-
Gamboa, H.1
Fred, V.-.A.2
-
16
-
-
33845498470
-
Automatic Identification of Participants in Haptic Systems
-
Ottawa, Canada, 17-19 May
-
M. Orozco, Y. Asfaw, A. Adler, S. Shirmohammadi, and A. E. Saddik, "Automatic Identification of Participants in Haptic Systems, " 2005 IEEE Instrumentation and Measurement Technology Conference, Ottawa, Canada, 17-19 May 2005.
-
(2005)
2005 IEEE Instrumentation and Measurement Technology Conference
-
-
Orozco, M.1
Asfaw, Y.2
Adler, A.3
Shirmohammadi, S.4
Saddik, A.E.5
-
17
-
-
33750122385
-
Haptic-Based Biometrics: A Feasibility Study
-
Alexandria, Virginia, USA, March 25-29
-
M. Orozco, Y. Asfaw, S. Shirmohammadi, A. Adler, and A. E. Saddik, "Haptic-Based Biometrics: A Feasibility Study, " IEEE Virtual Reality Conference, Alexandria, Virginia, USA, March 25-29, 2006.
-
(2006)
IEEE Virtual Reality Conference
-
-
Orozco, M.1
Asfaw, Y.2
Shirmohammadi, S.3
Adler, A.4
Saddik, A.E.5
-
18
-
-
84883097385
-
Haptic: The new biometrics-embedded media to recognizing and quantifying human patterns
-
Hilton, Singapore
-
M. O. Trujillo, I. Shakra, and A. E. Saddik, "Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns, " MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia, Hilton, Singapore, 2005.
-
(2005)
MULTIMEDIA '05: Proceedings of the 13th annual ACM international conference on Multimedia
-
-
Trujillo, M.O.1
Shakra, I.2
Saddik, A.E.3
-
19
-
-
84903111169
-
-
Available at, Retrieved October 2, 2005
-
Caslon-Analytics, Available at: http://www.caslon.com.au/biometricsnote6.htm, Retrieved October 2, 2005.
-
Caslon-Analytics
-
-
-
20
-
-
67650697862
-
A Behavior-based Approach to Securing Email Systems
-
Models and Architectures for Computer Networks Security, Sept
-
S. J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern, and C.-W. Hu, "A Behavior-based Approach to Securing Email Systems, " Mathematical Methods, Models and Architectures for Computer Networks Security, Sept. 2003.
-
(2003)
Mathematical Methods
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.-W.5
-
21
-
-
44349106280
-
Combining Behavior Models to Secure Email Systems
-
April., Available at
-
S. J. Stolfo, C.-W. Hu, W.-J. Li, S. Hershkop, K. Wang, and O. Nimeskern, "Combining Behavior Models to Secure Email Systems, " CU Tech Report, Available at: www1.cs.columbia.edu/ids/publications /EMT-weijen.pdf, April 2003.
-
(2003)
CU Tech Report
-
-
Stolfo, S.J.1
Hu, C.-W.2
Li, W.-J.3
Hershkop, S.4
Wang, K.5
Nimeskern, O.6
-
24
-
-
67649949220
-
Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process
-
Setubal Portugal, August
-
G. Frantzeskou, S. Gritzalis, and S. MacDonell, "Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process, " 1st International Conference on eBusiness and Telecommunication Networks-Security and Reliability in Information Systems and Networks Track, Setubal Portugal, August 2004.
-
(2004)
1st International Conference on eBusiness and Telecommunication Networks-Security and Reliability in Information Systems and Networks Track
-
-
Frantzeskou, G.1
Gritzalis, S.2
McDonell, S.3
-
27
-
-
47849107001
-
Opponent modeling by analysing play
-
Edmonton, Albera, Canada
-
J. Ramon and N. Jacobs, "Opponent modeling by analysing play, " Proceedings of the Computers and Games workshop on Agents in Computer Games, Edmonton, Albera, Canada, 2002.
-
(2002)
Proceedings of the Computers and Games workshop on Agents in Computer Games
-
-
Ramon, J.1
Jacobs, N.2
-
28
-
-
84860278177
-
Multifactor Biometric Sketch Authentication
-
In A. Brömme and C. Busch, editors, Darmstadt, Germany, 24. July
-
A. Brömme and S. Al-Zubi, "Multifactor Biometric Sketch Authentication, " In A. Brömme and C. Busch, editors, Proceedings of the BIOSIG 2003, Darmstadt, Germany, 24. July 2003.
-
(2003)
Proceedings of the BIOSIG 2003
-
-
Brömme, A.1
Al-Zubi, S.2
-
29
-
-
84860283359
-
Using an Active Shape Structural Model for Biometric Sketch Recognition
-
Magdeburg, Germany, 10.-12. September
-
S. Al-Zubi, A. Brömme, and K. Tönnies, "Using an Active Shape Structural Model for Biometric Sketch Recognition, " In Proceedings of DAGM, Magdeburg, Germany, 10.-12. September 2003.
-
(2003)
Proceedings of DAGM
-
-
Al-Zubi, S.1
Brömme, A.2
Tönnies, K.3
-
30
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D. Y. Yeung and Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models, " Pattern Recognition, vol. 36, pp. 229-243.
-
Pattern Recognition
, vol.36
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
-
33
-
-
0013378353
-
Detecting the Abnormal: Machine Learning in Computer Security
-
Purdue University Technical Report ECE-97-1, West Lafayette, January
-
T. Lane and C. E. Brodley, "Detecting the Abnormal: Machine Learning in Computer Security, " Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette, January 1997.
-
(1997)
Department of Electrical and Computer Engineering
-
-
Lane, T.1
Brodley, C.E.2
-
34
-
-
33845948788
-
Profiling Users in GUI Based Systems for Masquerade Detection
-
West Point, New York, USA, June 21-23
-
A. Garg, R. Rahalkar, S. Upadhyaya, and K. Kwiat, "Profiling Users in GUI Based Systems for Masquerade Detection, " The 7th IEEE Information Assurance Workshop (IAWorkshop 2006), West Point, New York, USA, June 21-23, 2006.
-
(2006)
The 7th IEEE Information Assurance Workshop (IAWorkshop 2006)
-
-
Garg, A.1
Rahalkar, R.2
Upadhyaya, S.3
Kwiat, K.4
-
36
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection approach, " Software Engineering, Vol. 21(3), pp. 188-199, 1995.
-
(1995)
Software Engineering
, vol.21
, Issue.3
, pp. 188-199
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
38
-
-
3943082567
-
Detecting malicious software by monitoring anomalous windows registry accesses
-
CUCS Technical Report
-
F. Apap, A. Honig, S. Hershkop, E. Eskin, and S. Stolfo, "Detecting malicious software by monitoring anomalous windows registry accesses, " Technical report, CUCS Technical Report, 2001.
-
(2001)
Technical report
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
39
-
-
34548114499
-
Storagebased intrusion detection: Watching storage activity for suspicious behavior
-
October
-
A. G. Pennington, J. D. Strunk, J. L. Griffin, C. A. N. Soules, G. R. Goodson, and G. R. Ganger, "Storagebased intrusion detection: Watching storage activity for suspicious behavior, " Technical report CMU--CS--02--179. Carnegie Mellon University, October 2002.
-
(2002)
Technical report CMU--CS--02--179. Carnegie Mellon University
-
-
Pennington, A.G.1
Strunk, J.D.2
Griffin, J.L.3
Soules, C.A.N.4
Goodson, G.R.5
Ganger, G.R.6
-
40
-
-
70349100099
-
Anomaly detection using call stack information
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong, "Anomaly detection using call stack information, " In Proceedings of IEEE Symposium on Security and Privacy, 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
41
-
-
37349092111
-
Digital Forensic Analysis of E-mails: A trusted E-mail Protocol
-
G. Gupta, C. Mazumdar, and M. S. Rao, "Digital Forensic Analysis of E-mails: A trusted E-mail Protocol, " International Journal of Digital Evidance, vol. 2, 2004.
-
(2004)
International Journal of Digital Evidance
, vol.2
-
-
Gupta, G.1
Mazumdar, C.2
Rao, M.S.3
-
42
-
-
0042367634
-
Mining Email Content for Author Identification Forensics
-
O. D. Vel, A. Anderson, M. Corney, and G. Mohay, "Mining Email Content for Author Identification Forensics, " SIGMOD: Special Section on Data Mining for Intrusion Detection and Threat Analysis, 2001.
-
(2001)
SIGMOD: Special Section on Data Mining for Intrusion Detection and Threat Analysis
-
-
Vel, O.D.1
Anderson, A.2
Corney, M.3
Mohay, G.4
-
45
-
-
85084161999
-
The Design and Analysis of Graphical Passwords
-
Washington, D.C., August 23-36
-
I. Jermyn, A. Mayer, F. Monrose, M. K. Reiter, and A. D. Rubin, "The Design and Analysis of Graphical Passwords, " Proceedings of the 8th USENIX Security Symposium, Washington, D.C., August 23-36, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Jermyn, I.1
Mayer, A.2
Monrose, F.3
Reiter, M.K.4
Rubin, A.D.5
-
46
-
-
33751109662
-
Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective
-
Available at
-
K. Renaud, "Quantifying the Quality of Web Authentication Mechanisms. A Usability Perspective, " Journal of Web Engineering, Vol. 0, No. 0, Available at: http://www.dcs.gla.ac.uk/~karen/Papers/j.pdf, 2003.
-
(2003)
Journal of Web Engineering
, vol.0
, Issue.0
-
-
Renaud, K.1
-
47
-
-
0012282403
-
Computer Intrusion: Detecting Maquerades
-
M. Schonlau, W. DuMouchel, W.-H. Ju, A. F. Karr, M. Theus, and Y. Vardi, "Computer Intrusion: Detecting Maquerades, " Statistical Science, vol. 16, pp. 1-17, 2001.
-
(2001)
Statistical Science
, vol.16
, pp. 1-17
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
50
-
-
34548122028
-
User Profiling for Intrusion Detection in Windows NT
-
T. Goldring, "User Profiling for Intrusion Detection in Windows NT, " Computing Science and Statistics, vol. 35, 2003.
-
(2003)
Computing Science and Statistics
, vol.35
-
-
Goldring, T.1
-
51
-
-
78651566234
-
An Application of Symbolic Learning to Intrusion Detection: Preliminary Results From the LUS Methodology
-
MLI 03-2, George Mason University, Fairfax, VA, June
-
K. Kaufman, G. Cervone, and R. S. Michalski, "An Application of Symbolic Learning to Intrusion Detection: Preliminary Results From the LUS Methodology, " Reports of the Machine Learning and Inference Laboratory, MLI 03-2, George Mason University, Fairfax, VA, June, 2003.
-
(2003)
Reports of the Machine Learning and Inference Laboratory
-
-
Kaufman, K.1
Cervone, G.2
Michalski, R.S.3
-
52
-
-
47849105422
-
Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems
-
Ottawa, Canada, October 9-11, (to appear)
-
R. V. Yampolskiy, "Indirect Human Computer Interaction-Based Biometrics for Intrusion Detection Systems, " The 41st Annual IEEE International Carnahan Conference on Security Technology (ICCST2007), Ottawa, Canada, October 9-11, 2007 (to appear).
-
(2007)
The 41st Annual IEEE International Carnahan Conference on Security Technology (ICCST2007)
-
-
Yampolskiy, R.V.1
-
55
-
-
0004048154
-
Computer Security Threat Monitoring and Surveillance
-
Fort Washington, Pennsylvania, April
-
J. P. Anderson, "Computer Security Threat Monitoring and Surveillance, " Technical Report. James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
-
(1980)
Technical Report. James P. Anderson Company
-
-
Anderson, J.P.1
-
56
-
-
0003201842
-
A markov chain model of temporal behavior for anomaly detection
-
Man, and Cybernetics Information Assurance and Security Workshop
-
N. Ye, "A markov chain model of temporal behavior for anomaly detection, " In Proceedings of the 2000 IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop, 2000.
-
(2000)
Proceedings of the 2000 IEEE Systems
-
-
Ye, N.1
-
59
-
-
84940104123
-
A Data Mining Framework for Building Intrusion Detection Models
-
Okland, CA
-
W. Lee, S. J. Stolfo, and K. W. Mok, "A Data Mining Framework for Building Intrusion Detection Models, " IEEE Symposium on Security and Privacy, Okland, CA, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
60
-
-
0036095845
-
Enhancing Profiles for Anomaly Detection Using Time Granularities
-
Y. Li, N. Wu, S. Jajodia, and X. S. Wang, "Enhancing Profiles for Anomaly Detection Using Time Granularities, " Journal of Computer Security, Vol. 10(1), pp. 137-157, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1
, pp. 137-157
-
-
Li, Y.1
Wu, N.2
Jajodia, S.3
Wang, X.S.4
-
63
-
-
70349100099
-
Anomaly Detection using Call Stack Information
-
Oakland, CA, USA, May 11-14
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong, "Anomaly Detection using Call Stack Information, " Proceedings of the IEEE Security and Privacy, Oakland, CA, USA, May 11-14, 2003.
-
(2003)
Proceedings of the IEEE Security and Privacy
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
64
-
-
33846312311
-
Efficient contextsensitive intrusion detection
-
San Diego, California, February
-
J. Giffin, S. Jha, and B. Miller, "Efficient contextsensitive intrusion detection, " In 11th Annual Network and Distributed Systems Security Symposium (NDSS), San Diego, California, February 2004.
-
(2004)
11th Annual Network and Distributed Systems Security Symposium (NDSS)
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
65
-
-
33750798519
-
Baseline Profile Stability for Network Anomaly Detection
-
Las Vegas, NV, April
-
Y. Kim, J.-Y. Jo, and K. Suh, "Baseline Profile Stability for Network Anomaly Detection, " IEEE ITNG 2006, Internet and Wireless Network Security track, Las Vegas, NV, April 2006.
-
(2006)
IEEE ITNG 2006Internet and Wireless Network Security track
-
-
Kim, Y.1
Jo, J.-Y.2
Suh, K.3
-
66
-
-
47849096614
-
A Neural Network Application for Attack Detection in Computer Networks
-
L. d. S. Silva, A. F. d. Santos, J. D. d. Silva, and A. Montes, "A Neural Network Application for Attack Detection in Computer Networks, " Instituto Nacional de Pesquisas Espanciais, 2004.
-
(2004)
Instituto Nacional de Pesquisas Espanciais
-
-
Silva, L.D.S.1
Santos, A.F.D.2
Silva, J.D.D.3
Montes, A.4
-
69
-
-
47849130842
-
Artificial Intelligence Approaches for Intrusion Detection
-
New York., May 5
-
D. Novikov, R. V. Yampolskiy, and L. Reznik, "Artificial Intelligence Approaches for Intrusion Detection, " Long Island Systems Applications and Technology Conference (LISAT2006). Long Island, New York., May 5, 2006.
-
(2006)
Long Island Systems Applications and Technology Conference (LISAT2006). Long Island
-
-
Novikov, D.1
Yampolskiy, R.V.2
Reznik, L.3
-
70
-
-
33750804406
-
Anomaly Detection Based Intrusion Detection
-
Las Vegas, Nevada, USA, April 10-12
-
D. Novikov, R. V. Yampolskiy, and L. Reznik, "Anomaly Detection Based Intrusion Detection, " Third International Conference on Information Technology: New Generations (ITNG 2006), Las Vegas, Nevada, USA, April 10-12, 2006.
-
(2006)
Third International Conference on Information Technology: New Generations (ITNG 2006)
-
-
Novikov, D.1
Yampolskiy, R.V.2
Reznik, L.3
-
71
-
-
33747630166
-
Neural Networks to Intrusion Detection
-
Rochester Institute of Technology. Rochester, NY, October
-
D. Novikov., "Neural Networks to Intrusion Detection., " MS thesis, Rochester Institute of Technology. Rochester, NY, October 2005.
-
(2005)
MS thesis
-
-
Novikov, D.1
-
73
-
-
0031274649
-
Wide area Internet traffic patterns and characteristics
-
November
-
K. Thompson, G. Miller, and R. Wilder, "Wide area Internet traffic patterns and characteristics, " In IEEE Network, Vol. 11, pp. 10-23, November 1997.
-
(1997)
IEEE Network
, vol.11
, pp. 10-23
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
74
-
-
27144528230
-
Storage-based intrusion detection for storage area networks (SANs)
-
2005., 11-14 April
-
M. Banikazemi, D. Poff, and B. Abali, "Storage-based intrusion detection for storage area networks (SANs), " Proceedings. 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies, 2005., 11-14 April 2005.
-
(2005)
Proceedings. 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies
-
-
Banikazemi, M.1
Poff, D.2
Abali, B.3
-
76
-
-
27144437024
-
On the Feasibility of Intrusion Detection Inside Workstation Disks
-
Carnegie Mellon University
-
J. L. Griffin, A. G. Pennington, J. S. Bucy, D. Choundappan, N. Muralidharan, and G. R. Ganger, "On the Feasibility of Intrusion Detection Inside Workstation Disks, " Technical Report CMU-PDL-03-106, Carnegie Mellon University, 2003.
-
(2003)
Technical Report CMU-PDL-03-106
-
-
Griffin, J.L.1
Pennington, A.G.2
Bucy, J.S.3
Choundappan, D.4
Muralidharan, N.5
Ganger, G.R.6
-
78
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls, " Journal of Computer Security, Vol. 6, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
79
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, CA, USA, May 9
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: alternative data models, " Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 9, 1999.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
80
-
-
84946410215
-
Detecting insider threats by monitoring system call activity
-
Man and Cybernetics Society Information Assurance Workshop, 18-20 June
-
N. Nguyen, P. Reiher, and G. H. Kuenning, "Detecting insider threats by monitoring system call activity, " IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, 18-20 June 2003.
-
(2003)
IEEE Systems
-
-
Nguyen, N.1
Reiher, P.2
Kuenning, G.H.3
-
81
-
-
0034593307
-
Characterizing the Behavior of a Program Using Multiple-Length N-grams
-
Cork, Ireland, Sept. 19-21
-
C. Marceau, "Characterizing the Behavior of a Program Using Multiple-Length N-grams, " Proceedings of the New Security Paradigms Workshop 2000, Cork, Ireland, Sept. 19-21, 2000.
-
(2000)
Proceedings of the New Security Paradigms Workshop 2000
-
-
Marceau, C.1
-
83
-
-
85042797742
-
Learning Program Behavior Profiles for Intrusion Detection
-
Santa Clara, California, April
-
A. K. Ghosh, A. Schwatzbard, and M. Shatz, "Learning Program Behavior Profiles for Intrusion Detection, " in Proceedings 1 st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999.
-
(1999)
Proceedings 1 st USENIX Workshop on Intrusion Detection and Network Monitoring
-
-
Ghosh, A.K.1
Schwatzbard, A.2
Shatz, M.3
-
86
-
-
26444562687
-
The problem of concept drift: Definitions and related work
-
Computer Science Department, Trinity College, Dublin, Ireland
-
A. Tsymbal, "The problem of concept drift: definitions and related work, " Technical Report TCDCS-2004-15, Computer Science Department, Trinity College, Dublin, Ireland, 2004.
-
(2004)
Technical Report TCDCS-2004-15
-
-
Tsymbal, A.1
-
87
-
-
35649007957
-
Dissimilarity Functions for Behavior-Based Biometrics
-
Orlando, Florida, April 9-13
-
R. V. Yampolskiy and V. Govindaraju, "Dissimilarity Functions for Behavior-Based Biometrics, " Biometric Technology for Human Identification IV. SPIE Defense and Security Symposium, Orlando, Florida, April 9-13, 2007.
-
(2007)
Biometric Technology for Human Identification IV. SPIE Defense and Security Symposium
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
89
-
-
84866671112
-
-
Poker-edge. com, Available at, Retrieved June 7
-
Poker-edge. com, "Stats and Analysis, " Available at: http://www.poker-edge.com/stats.php, Retrieved June 7, 2006.
-
(2006)
Stats and Analysis
-
-
-
90
-
-
84866704262
-
Intrusion Detection Evaluation
-
DARPA, Available at
-
DARPA, "Intrusion Detection Evaluation, " MIT Lincoln Laboratory, Available at: http://www.ll.mit.edu/ist/ideval, 1998.
-
(1998)
MIT Lincoln Laboratory
-
-
-
91
-
-
0013114810
-
Mining in a Data-Flow Environment: Experience in Network Intrusion Detection
-
San Diego, CA
-
W. Lee, S. Stolfo, and K. Mok, "Mining in a Data-Flow Environment: Experience in Network Intrusion Detection, " In Proceedings of the 5th ACM SIGKDD, San Diego, CA, 1999.
-
(1999)
Proceedings of the 5th ACM SIGKDD
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
92
-
-
84866705514
-
Feature Extraction Methods for Character Recognition
-
Rochester, NY, May 10,
-
R. V. Yampolskiy, "Feature Extraction Methods for Character Recognition, " Master's Thesis. Rochester Institute of Technology, Rochester, NY, May 10, 2004.
-
(2004)
Master's Thesis. Rochester Institute of Technology
-
-
Yampolskiy, R.V.1
|