-
2
-
-
0002607026
-
Bayesian Classification (Autoclass): Theory and Results
-
Fayyad, U., Piatesky-Shapiro, G., and Uthurusamy, R., eds., AAAI Press/MIT Press
-
Cheeseman, P. "Bayesian Classification (Autoclass): Theory and Results", in Fayyad, U., Piatesky-Shapiro, G., and Uthurusamy, R., eds., "Advances in Knowledge Discovery and Data Mining". AAAI Press/MIT Press, 1996.
-
(1996)
Advances in Knowledge Discovery and Data Mining
-
-
Cheeseman, P.1
-
3
-
-
0002629270
-
Maximum Likelihood from Incomplete Data Sets by the EM Algorithm
-
Dempster, A P., Laird, N. M., and Rubin, D. B. "Maximum Likelihood from Incomplete Data Sets by the EM Algorithm", Journal of the Royal Statistical Society 39(1): pp. 1-38, 1977.
-
(1977)
Journal of the Royal Statistical Society
, vol.39
, Issue.1
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
4
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Forest, S., Hofmeyr, S., Somayaji, A., and Longstaff, T. "A Sense of Self for Unix Processes," proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 1996.
-
Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 1996
-
-
Forest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
5
-
-
0344439823
-
-
Eskin, E., Arnold, A., Portnoy, L., and Stolfo, S. "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data", http://www.cs.columbia.edu/~eeskin/
-
A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
-
-
Eskin, E.1
Arnold, A.2
Portnoy, L.3
Stolfo, S.4
-
7
-
-
0026154682
-
The SRI IDES Statistical Anomaly Detector
-
Javitz, H. and Valdes, A. "The SRI IDES Statistical Anomaly Detector," Proceedings of the IEEE Symposium in Security and Privacy, Oakland, CA, May 1991.
-
Proceedings of the IEEE Symposium in Security and Privacy, Oakland, CA, May 1991
-
-
Javitz, H.1
Valdes, A.2
-
9
-
-
84962260018
-
Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation
-
Lippmann, Richard, et al. "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proceedings of DARPA Information Survivability Conference and Exposition, DISCEX'00, Jan 25-27, Hilton Head, SC, 2000, http://www.ll.mit.edu/IST/ideval/index.html
-
Proceedings of DARPA Information Survivability Conference and Exposition, DISCEX'00, Jan 25-27, Hilton Head, SC, 2000
-
-
Lippmann, R.1
-
10
-
-
84880858814
-
Why 6? Defining the Operational Limits of STIDE, and Anomaly-Based Intrusion Detector
-
Maxion, R. and Tan, K. "Why 6? Defining the Operational Limits of STIDE, and Anomaly-Based Intrusion Detector," Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, CA, May 2002.
-
Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, CA, May 2002
-
-
Maxion, R.1
Tan, K.2
-
12
-
-
0001608026
-
Feature Discovery by Competitive Learning
-
Rummelhart, D. and McLelland, J., eds., MIT Press
-
Rummelhart, D. and Zipser, D. "Feature Discovery by Competitive Learning," in Rummelhart, D. and McLelland, J., eds., "Parallel Distributed Processing," MIT Press, 1988
-
(1988)
Parallel Distributed Processing
-
-
Rummelhart, D.1
Zipser, D.2
-
15
-
-
77955899936
-
Adaptive, Model-based Monitoring for Cyber Attack Detection
-
Valdes, A. and Skinner, K. "Adaptive, Model-based Monitoring for Cyber Attack Detection," proceedings of "Recent Advances in Intrusion Detection (RAID 2000)," Toulouse, France, October 2000.
-
Proceedings of "Recent Advances in Intrusion Detection (RAID 2000)," Toulouse, France, October 2000
-
-
Valdes, A.1
Skinner, K.2
-
16
-
-
84880174811
-
Detecting Intrusions Using System Calls: Alternative Data Models
-
Warrender, C., Forest, S., and Pearlmutter, B. "Detecting Intrusions Using System Calls: Alternative Data Models," proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 1999.
-
Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 1999
-
-
Warrender, C.1
Forest, S.2
Pearlmutter, B.3
-
17
-
-
0037636215
-
Intrusion Detection Using Variable-Length Audit Trail Patterns
-
Wespi, A., Dacier, M., and Debar, H. "Intrusion Detection Using Variable-Length Audit Trail Patterns," Proceedings of "Recent Advances in Intrusion Detection (RAID 2000)," Toulouse, France, October 2000.
-
Proceedings of "Recent Advances in Intrusion Detection (RAID 2000)," Toulouse, France, October 2000
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
|