-
1
-
-
0034301662
-
A data mining analysis of RTID alarms
-
Manganaris S., Christensen M., Zerkle D., Hermiz K.: A data mining analysis of RTID alarms. J. Comput. Netw. 34, 571-577 (2000).
-
(2000)
J. Comput. Netw.
, vol.34
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
2
-
-
3142623031
-
Clustering intrusion detection alarms to support root cause analysis
-
Julisch K.: Clustering intrusion detection alarms to support root cause analysis. ACM Trans. Inf. Syst. Secur. 6, 443-471 (2003).
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, pp. 443-471
-
-
Julisch, K.1
-
3
-
-
23944456320
-
TRINETR: An architecture for collaborative intrusion detection and knowledge-based alert evaluation
-
Yu J., Reddy Y. V. R., Selliah S., Reddy S., Bharadwaj V., Kankanahalli S.: TRINETR: an architecture for collaborative intrusion detection and knowledge-based alert evaluation. J. Adv. Eng. Inf. 19, 93-101 (2005).
-
(2005)
J. Adv. Eng. Inf.
, vol.19
, pp. 93-101
-
-
Yu, J.1
Reddy, Y.V.R.2
Selliah, S.3
Reddy, S.4
Bharadwaj, V.5
Kankanahalli, S.6
-
4
-
-
33646037321
-
Alarm clustering for intrusion detection systems in computer networks
-
Perdisci R., Giacinto G., Roli F.: Alarm clustering for intrusion detection systems in computer networks. J. Eng. Appl. Artif. Intell. 19, 429-438 (2006).
-
(2006)
J. Eng. Appl. Artif. Intell.
, vol.19
, pp. 429-438
-
-
Perdisci, R.1
Giacinto, G.2
Roli, F.3
-
10
-
-
3142632087
-
Techniques and tools for analyzing intrusion alerts
-
Ning P., Cui Y., Reeves D. S., Xu D.: Techniques and tools for analyzing intrusion alerts. ACM Trans. Inf. Syst. Secur. 7, 274-318 (2004).
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, pp. 274-318
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
Xu, D.4
-
11
-
-
77956988169
-
M2D2: A formal data model for IDS alert correlation
-
Morin, B., Me, L., Debar, H., Ducasse, M.: M2D2: A formal data model for IDS alert correlation. In: Proceeding of the International Symposium on Recent Advances in Intrusion Detection, pp. 115-137 (2002).
-
(2002)
Proceeding of the International Symposium on Recent Advances in Intrusion Detection
, pp. 115-137
-
-
Morin, B.1
Me, L.2
Debar, H.3
Ducasse, M.4
-
12
-
-
26444436687
-
Using adaptive alert classification to reduce false positives in intrusion detection
-
Pietraszek, T.: Using adaptive alert classification to reduce false positives in intrusion detection. In: Proceeding of the Recent advances in intrusion detection, France, pp. 102-124 (2004).
-
(2004)
Proceeding of the Recent advances in intrusion detection
, pp. 102-124
-
-
Pietraszek, T.1
-
14
-
-
0009060610
-
Packets found on an Internet
-
Bellovin S. M.: Packets found on an Internet. J. Comput. Commun. Rev. 23, 26-31 (1993).
-
(1993)
J. Comput. Commun. Rev.
, vol.23
, pp. 26-31
-
-
Bellovin, S.M.1
-
15
-
-
0002479811
-
Exploration of the power of attribute-oriented induction in data mining
-
U. M. Fayyad, G. Piatetsky-Shapiro, P. Smyth, and R. Uthurusamy (Eds.), Cambridge: AAAI/MIT Press
-
Han J., Fu Y.: Exploration of the power of attribute-oriented induction in data mining. In: Fayyad, U. M., Piatetsky-Shapiro, G., Smyth, P., Uthurusamy, R.(eds) Advances in Knowledge Discovery and Data Mining, pp. 399-421. AAAI/MIT Press, Cambridge (1996).
-
(1996)
Advances in Knowledge Discovery and Data Mining
, pp. 399-421
-
-
Han, J.1
Fu, Y.2
-
16
-
-
0027542839
-
Data-driven discovery of quantitative rules in relational databases
-
Han J., Cai Y., Cercone N.: Data-driven discovery of quantitative rules in relational databases. IEEE Trans. Knowl. Data Eng. 5, 29-40 (1993).
-
(1993)
IEEE Trans. Knowl. Data Eng.
, vol.5
, pp. 29-40
-
-
Han, J.1
Cai, Y.2
Cercone, N.3
-
22
-
-
35048874596
-
Quality scheme assessment in the clustering process
-
Halkidi, M., Vazirgiannis, M., Batistakis, I.: Quality scheme assessment in the clustering process. In: Proceeding of the 4th European Conference on Principles of Data Mining and Knowledge Discovery, pp. 265-276 (2000).
-
(2000)
Proceeding of the 4th European Conference on Principles of Data Mining and Knowledge Discovery
, pp. 265-276
-
-
Halkidi, M.1
Vazirgiannis, M.2
Batistakis, I.3
-
26
-
-
0023453329
-
Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
-
Rousseeuw P. J.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20(1), 53-65 (1987).
-
(1987)
J. Comput. Appl. Math.
, vol.20
, Issue.1
, pp. 53-65
-
-
Rousseeuw, P.J.1
-
31
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
Valeur, F., Vigna, G., Kruegel, C., Kemmerer, R. A.: A comprehensive approach to intrusion detection alert correlation. In: IEEE Transactions on Dependable and Secure Computing 1(3) (2004).
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.3
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.A.4
-
32
-
-
74849112342
-
-
PhD dissertation, Institut für Informatik, Albert-Ludwigs-Universität Freiburg, Germany, July
-
Pietraszek, T.: Alert classification to reduce false positives in intrusion detection. PhD dissertation, Institut für Informatik, Albert-Ludwigs-Universität Freiburg, Germany, July 2006.
-
(2006)
Alert Classification to Reduce False Positives in Intrusion Detection
-
-
Pietraszek, T.1
-
33
-
-
84947286061
-
-
Wang, J., Lee, I.: Measuring false-positive by automated real-time correlated hacking behavior analysis. In: Proceedings of the 4th International Conference on Information Security. LNCS, vol. 2200, pp. 512-535 (2001).
-
-
-
-
35
-
-
0002738566
-
Knowledge discovery in databases: An attribute-oriented approach
-
Han, J., Cai, Y., Cercone, N.: Knowledge discovery in databases: an attribute-oriented approach. In: Proceeding of the 18th International Conference on Very Large Databases, pp. 547-559 (1992).
-
(1992)
Proceeding of the 18th International Conference on Very Large Databases
, pp. 547-559
-
-
Han, J.1
Cai, Y.2
Cercone, N.3
|