-
1
-
-
0141574623
-
-
MIT Lincoln Lab., Information Systems Technology Group, 25 March 1998
-
The 1998 intrusion detection off-line evaluation plan. MIT Lincoln Lab., Information Systems Technology Group. http://www.11.mit.edu/IST/ideval/docs/1998/id98-eval-11.txt, 25 March 1998.
-
The 1998 Intrusion Detection Off-Line Evaluation Plan
-
-
-
2
-
-
84947198779
-
Knowledge discovery in databases DARPA archive
-
Knowledge discovery in databases DARPA archive. Task Description. http://www.kdd.ics.uci.edu/databases/kddcup99/task.html
-
Task Description
-
-
-
3
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
J. McHugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory," ACM Transactions on Information and System Security, 3(4), pp. 262-294, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
4
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
14 Dec
-
Paxson V., "Bro: A System for Detecting Network Intruders in Real-Time", Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
5
-
-
0003704318
-
-
Irvine, CA: University of California, Department of Information and Computer Science
-
S. Hettich, S.D. Bay, The UCI KDD Archive. Irvine, CA: University of California, Department of Information and Computer Science, http://kdd.ics.uci.edu, 1999.
-
(1999)
The UCI KDD Archive
-
-
Hettich, S.1
Bay, S.D.2
-
7
-
-
0029272732
-
Visualizing network data
-
March
-
R. Becker, S. Eick, and A. Wilks, "Visualizing network data", IEEE Transactions on Visualization and Computer Graphics, vol. 1, pp. 16-28, March 1995.
-
(1995)
IEEE Transactions on Visualization and Computer Graphics
, vol.1
, pp. 16-28
-
-
Becker, R.1
Eick, S.2
Wilks, A.3
-
8
-
-
0029477046
-
Case study: 3d displays of Internet traffic", in Proceedings of Information Visualization (INFOVIS)
-
Oct
-
K. Cox and S. Eick, "Case study: 3d displays of Internet traffic", in Proceedings of Information Visualization (INFOVIS), IEEE Computer Society, pp. 129-131, Oct. 1995.
-
(1995)
IEEE Computer Society
, pp. 129-131
-
-
Cox, K.1
Eick, S.2
-
10
-
-
0001863796
-
Exploratory Data Analysis by the Self-Organizing Map: Structures of Welfare and Poverty in the World
-
S. Kaski & T. Kohonen. Exploratory Data Analysis by the Self-Organizing Map: Structures of Welfare and Poverty in the World, Proceedings of the Third International Conference on Neural Networks in the Capital Markets, World Scientific, Singapore, 1995, 498-507.
-
(1995)
Proceedings of the Third International Conference on Neural Networks in the Capital Markets, World Scientific, Singapore
, pp. 498-507
-
-
Kaski, S.1
Kohonen, T.2
-
11
-
-
0002432308
-
Kohonen's self-organizing feature maps for exploratory data analysis
-
Kluwer
-
Ultsch A. and Siemon H. "Kohonen's self-organizing feature maps for exploratory data analysis", In Proceedings of the International Neural Network Conference (INNC'90), Dordrecht, Netherlands, pages 305-308. Kluwer, 1990.
-
(1990)
Proceedings of the International Neural Network Conference (INNC'90), Dordrecht, Netherlands
, pp. 305-308
-
-
Ultsch, A.1
Siemon, H.2
-
12
-
-
84883271942
-
Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets
-
October
-
Kayacik H. G., Zincir-Heywood A. N., Heywood M. I., "Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD 99 Intrusion Detection Datasets", Proceedings of the Third Annual Conference on Privacy, Security and Trust (PST-2005), October 2005.
-
(2005)
Proceedings of the Third Annual Conference on Privacy, Security and Trust (PST-2005)
-
-
Kayacik, H.G.1
Zincir-Heywood, A.N.2
Heywood, M.I.3
-
15
-
-
1642516070
-
The Honeynet Project: Trapping the Hackers
-
March-April
-
Spitzner L., "The Honeynet Project: Trapping the Hackers", IEEE Security & Privacy March-April 2003 (Vol. 1, No. 2) pp. 15-23
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.2
, pp. 15-23
-
-
Spitzner, L.1
|