-
1
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson S. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information Systems Security 3 3 (2000) 186-205
-
(2000)
ACM Transactions on Information Systems Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
2
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
Technical Report 99-15, Chalmers Univ
-
Axelsson, S., 2000. Intrusion detection systems: A survey and taxonomy, Technical Report 99-15, Chalmers Univ.
-
(2000)
-
-
Axelsson, S.1
-
4
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows using hidden markov model
-
Cho S.B., and Park H.J. Efficient anomaly detection by modeling privilege flows using hidden markov model. Computer and Security 22 1 (2003) 45-55
-
(2003)
Computer and Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Cho, S.B.1
Park, H.J.2
-
7
-
-
0029716418
-
A sense of self for Unix processes
-
IEEE Computer Society Press, pp
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A., 1996. A sense of self for Unix processes. In: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, pp. 120-128.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
8
-
-
55949124178
-
Fast intrusion detection based on a non-negative matrix factorization model
-
Guan X., Wang W., and Zhang X. Fast intrusion detection based on a non-negative matrix factorization model. Journal of Network and Computer Applications, Elsevier 31 1 (2009) 31-44
-
(2009)
Journal of Network and Computer Applications, Elsevier
, vol.31
, Issue.1
, pp. 31-44
-
-
Guan, X.1
Wang, W.2
Zhang, X.3
-
9
-
-
24944563451
-
Robust support vector machines for anomaly detection in computer security
-
International Conference on Machine Learning and Applications
-
Hu, W., Liao, Y., Vemuri, V.R., 2003. Robust support vector machines for anomaly detection in computer security. In: Proceeding of the 2003 International Conference on Machine Learning and Applications.
-
(2003)
Proceeding of the
-
-
Hu, W.1
Liao, Y.2
Vemuri, V.R.3
-
11
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, TX, pp
-
Lee, W., Stolfo, S., 1998. Data mining approaches for intrusion detection. In: Proceedings of the Seventh USENIX Security Symposium, San Antonio, TX, pp. 79-94.
-
(1998)
Proceedings of the Seventh USENIX Security Symposium
, pp. 79-94
-
-
Lee, W.1
Stolfo, S.2
-
13
-
-
85084160262
-
Using text categorization techniques for intrusion detection
-
Liao, Y., Vemuri, V.R., 2002. Using text categorization techniques for intrusion detection. In: 11th USENIX Security Symposium, pp. 51-59.
-
(2002)
11th USENIX Security Symposium
, pp. 51-59
-
-
Liao, Y.1
Vemuri, V.R.2
-
14
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
Schonlau M., and Theus M. Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters 76 (2000) 33-38
-
(2000)
Information Processing Letters
, vol.76
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
15
-
-
0012282403
-
Computer Intrusion: Detecting Masquerades
-
Schonlau M., Dumouchel W., Ju W.-H., Karr A.F., Theus M., and Vardi Y. Computer Intrusion: Detecting Masquerades. Statistical Science 16 1 (2001) 58-74
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
16
-
-
38149030678
-
Comparing and combining dimension reduction techniques for efficient text clustering
-
Newport Beach, CA
-
Tang, B., Shepherd, M., Milios, E., Heywood, M.I., 2005. Comparing and combining dimension reduction techniques for efficient text clustering. International Workshop on Feature Selection for Data Mining - Interfacing Machine Learning and Statistics in conjunction with 2005 SIAM International Conference on Data Mining, Newport Beach, CA.
-
(2005)
International Workshop on Feature Selection for Data Mining - Interfacing Machine Learning and Statistics in conjunction with 2005 SIAM International Conference on Data Mining
-
-
Tang, B.1
Shepherd, M.2
Milios, E.3
Heywood, M.I.4
-
17
-
-
62349107432
-
Distance measures for anomaly intrusion detection
-
Las Vegas, NV, pp
-
Wang, W., Gombault, S., 2007a. Distance measures for anomaly intrusion detection. In: Proceedings of 2007 International Conference on Security and Management (SAM'07), Las Vegas, NV, pp. 17-23.
-
(2007)
Proceedings of 2007 International Conference on Security and Management (SAM'07)
, pp. 17-23
-
-
Wang, W.1
Gombault, S.2
-
18
-
-
85083870977
-
Detecting masquerades with principal component analysis based on cross frequency weights
-
Munich, Germany, pp
-
Wang, W., Gombault, S., 2007b. Detecting masquerades with principal component analysis based on cross frequency weights. In: Proceedings of 14th Anniversary HP-SUA Workshop, Munich, Germany, pp. 227-232.
-
(2007)
Proceedings of 14th Anniversary HP-SUA Workshop
, pp. 227-232
-
-
Wang, W.1
Gombault, S.2
-
19
-
-
6344239144
-
Modeling program behaviors by hidden Markov models for intrusion detection
-
Wang, W., Guan, X., Zhang, X., 2004. Modeling program behaviors by hidden Markov models for intrusion detection. In: Proceedings of the Third International Conference on Machine Learning and Cybernetics (ICMLC'2004), pp. 2830-2835.
-
(2004)
Proceedings of the Third International Conference on Machine Learning and Cybernetics (ICMLC'2004)
, pp. 2830-2835
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
20
-
-
33750333036
-
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
-
Wang W., Guan X., Zhang X., and Yang L. Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. Computers and Security, Elsevier 25 7 (2006) 539-550
-
(2006)
Computers and Security, Elsevier
, vol.25
, Issue.7
, pp. 539-550
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
Yang, L.4
-
21
-
-
37049002837
-
Processing of massive audit data streams for real-time anomaly intrusion detection
-
Wang W., Guan X., and Zhang X. Processing of massive audit data streams for real-time anomaly intrusion detection. Computer Communications Elsevier 31 1 (2008) 58-72
-
(2008)
Computer Communications Elsevier
, vol.31
, Issue.1
, pp. 58-72
-
-
Wang, W.1
Guan, X.2
Zhang, X.3
-
22
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Warrender, C., Forrest, S., Pearlmutter, B., 1999. Detecting intrusions using system calls: Alternative data models. In: Proceedings of 1999 IEEE Symposium on Security and Privacy, pp. 133-145.
-
(1999)
Proceedings of 1999 IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
23
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
Ye N., Li X., Chen Q., Emran S.M., and Xu M. Probabilistic techniques for intrusion detection based on computer audit data. IEEE Transactions on Systems, Man, and Cybernetics 31 4 (2001) 266-274
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
24
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
Yeung D.Y., and Ding Y. Host-based intrusion detection using dynamic and static behavioral models. Pattern Recognition 36 1 (2003) 229-243
-
(2003)
Pattern Recognition
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.Y.1
Ding, Y.2
-
25
-
-
21844433474
-
Application of online-training SVMS for real-time intrusion detection with different considerations
-
Zhang Z., and Shen H. Application of online-training SVMS for real-time intrusion detection with different considerations. Computer Communications 28 (2005) 1428-1442
-
(2005)
Computer Communications
, vol.28
, pp. 1428-1442
-
-
Zhang, Z.1
Shen, H.2
|