-
1
-
-
59249106693
-
Detecting Targeted Attacks Using Shadow Honeypots
-
Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., Keromytis, A.D.: Detecting Targeted Attacks Using Shadow Honeypots. In: Proceedings of the 14th USENIX Security Symposium (2005)
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Anagnostakis, K.G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.D.6
-
2
-
-
0030211964
-
Bagging Predictors
-
Breiman, L.: Bagging Predictors. Machine Learning 24(2), 123-140 (1996)
-
(1996)
Machine Learning
, vol.24
, Issue.2
, pp. 123-140
-
-
Breiman, L.1
-
3
-
-
0027837024
-
Experiments in Multistrategy Learning by Meta-Learning
-
Washington, DC, pp
-
Chan, P.K., Stolfo, S.J.: Experiments in Multistrategy Learning by Meta-Learning. In: Proceedings of the second international conference on information and knowledge management, Washington, DC, pp. 314-323 (1993)
-
(1993)
Proceedings of the second international conference on information and knowledge management
, pp. 314-323
-
-
Chan, P.K.1
Stolfo, S.J.2
-
4
-
-
50249170401
-
Casting out Demons: Sanitizing Training Data for Anomaly Sensors
-
Cretu, G.F., Stavrou, A., Locasto, M.E., Stolfo, S.J., Keromytis, A.D.: Casting out Demons: Sanitizing Training Data for Anomaly Sensors. In: The Proceedings of the IEEE Symposium on Security and Privacy (2008)
-
(2008)
The Proceedings of the IEEE Symposium on Security and Privacy
-
-
Cretu, G.F.1
Stavrou, A.2
Locasto, M.E.3
Stolfo, S.J.4
Keromytis, A.D.5
-
5
-
-
50249107477
-
Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems
-
Cretu, G.F., Stavrou, A., Stolfo, S.J., Keromytis, A.D.: Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems. In: Workshop on Hot Topics in System Dependability, HotDep (2007)
-
(2007)
Workshop on Hot Topics in System Dependability, HotDep
-
-
Cretu, G.F.1
Stavrou, A.2
Stolfo, S.J.3
Keromytis, A.D.4
-
6
-
-
80053403826
-
-
Dietterich, T.G.: Ensemble Methods in Machine Learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, 1857, pp. 1-15. Springer, Heidelberg (2000)
-
Dietterich, T.G.: Ensemble Methods in Machine Learning. In: Kittler, J., Roli, F. (eds.) MCS 2000. LNCS, vol. 1857, pp. 1-15. Springer, Heidelberg (2000)
-
-
-
-
7
-
-
0344324689
-
Metacost: A general method for making classifiers cost-sensitive
-
Domingos, P.: Metacost: A general method for making classifiers cost-sensitive. In: Knowledge Discovery and Data Mining, pp. 155-164 (1999)
-
(1999)
Knowledge Discovery and Data Mining
, pp. 155-164
-
-
Domingos, P.1
-
9
-
-
0029716418
-
A Sense of Self for Unix Processes
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A Sense of Self for Unix Processes. In: IEEE Symposium on Security and Privacy (1996)
-
(1996)
IEEE Symposium on Security and Privacy
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
10
-
-
0030697765
-
Building Diverse Computer Systems
-
Forrest, S., Somayaji, A., Ackley, D.: Building Diverse Computer Systems. In: Proceedings of the 6th Workshop on Hot Topics in Operating Systems, pp. 67-72 (1997)
-
(1997)
Proceedings of the 6th Workshop on Hot Topics in Operating Systems
, pp. 67-72
-
-
Forrest, S.1
Somayaji, A.2
Ackley, D.3
-
12
-
-
33750725544
-
Learning with drift detection
-
Gama, J., Medas, P., Castillo, G., Rodrigues, P.P.: Learning with drift detection. In: XVII Brazilian Symposium on Artificial Intelligence (2004)
-
(2004)
XVII Brazilian Symposium on Artificial Intelligence
-
-
Gama, J.1
Medas, P.2
Castillo, G.3
Rodrigues, P.P.4
-
13
-
-
84874004542
-
Meta-learning, model selection, and example selection in machine learning domains with concept drift
-
Knowledge Discovery, Adaptivity
-
Klinkenberg, R.: Meta-learning, model selection, and example selection in machine learning domains with concept drift. In: Learning - Knowledge Discovery - Adaptivity (2005)
-
(2005)
Learning
-
-
Klinkenberg, R.1
-
15
-
-
36849093601
-
Concept drift and the importance of examples
-
Franke, J, Nakhaeizadeh, G, Renz, I, eds
-
Klinkenberg, R., Ruping, S.: Concept drift and the importance of examples. In: Franke, J., Nakhaeizadeh, G., Renz, I. (eds.) Text Mining Theoretical Aspects and Applications (2003)
-
(2003)
Text Mining Theoretical Aspects and Applications
-
-
Klinkenberg, R.1
Ruping, S.2
-
16
-
-
0036038437
-
Service Specific Anomaly Detection for Network Intrusion Detection
-
Madrid, Spain
-
Kruegel, C., Toth, T., Kirda, E.: Service Specific Anomaly Detection for Network Intrusion Detection. In: Symposium on Applied Computing (SAC), Madrid, Spain (2002)
-
(2002)
Symposium on Applied Computing (SAC)
-
-
Kruegel, C.1
Toth, T.2
Kirda, E.3
-
19
-
-
27544498978
-
Polygraph: Automatically Generating Signatures for Polymorphic Worms
-
Oakland, CA
-
Newsome, J., Karp, B., Song, D.: Polygraph: Automatically Generating Signatures for Polymorphic Worms. In: IEEE Security and Privacy, Oakland, CA (2005)
-
(2005)
IEEE Security and Privacy
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
20
-
-
26444436687
-
-
Pietraszek, T.: Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, 3224, pp. 102-124. Springer, Heidelberg (2004)
-
Pietraszek, T.: Using Adaptive Alert Classification to Reduce False Positives in Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 102-124. Springer, Heidelberg (2004)
-
-
-
-
21
-
-
36349029177
-
Sensitivity of pca for traffic anomaly detection
-
ACM, New York
-
Ringberg, H., Soule, A., Rexford, J., Diot, C.: Sensitivity of pca for traffic anomaly detection. In: Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pp. 109-120. ACM, New York (2007), http://doi.acm.org/10.1145/1254882.1254895
-
(2007)
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
, pp. 109-120
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
22
-
-
84906497159
-
Building a Reactive Immune System for Software Services
-
Sidiroglou, S., Locasto, M.E., Boyd, S.W., Keromytis, A.D.: Building a Reactive Immune System for Software Services. In: Proceedings of the USENIX Technical Conference (2005)
-
(2005)
Proceedings of the USENIX Technical Conference
-
-
Sidiroglou, S.1
Locasto, M.E.2
Boyd, S.W.3
Keromytis, A.D.4
-
23
-
-
49749086726
-
Cross-disciplinary perspectives on meta-learning for algorithm selection
-
Smith-Miles, K.: Cross-disciplinary perspectives on meta-learning for algorithm selection. ACM Comput. Surv. 41(1) (2008), http://dblp.uni-trier.de/ db/journals/csur/csur41.html#Smith-Miles08
-
(2008)
ACM Comput. Surv
, vol.41
, Issue.1
-
-
Smith-Miles, K.1
-
25
-
-
76649144040
-
-
Song, Y., Keromytis, A.D., Stolfo, S.J.: Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium, NDSS (2009)
-
Song, Y., Keromytis, A.D., Stolfo, S.J.: Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. In: Proceedings of the 16th Annual Network and Distributed System Security Symposium, NDSS (2009)
-
-
-
-
26
-
-
41549098765
-
On the Infeasibility of Modeling Polymorphic Shellcode
-
CCS
-
Song, Y., Locasto, M.E., Stavrou, A., Keromytis, A.D., Stolfo, S.J.: On the Infeasibility of Modeling Polymorphic Shellcode. In: ACM Computer and Communications Security Conference, CCS (2007)
-
(2007)
ACM Computer and Communications Security Conference
-
-
Song, Y.1
Locasto, M.E.2
Stavrou, A.3
Keromytis, A.D.4
Stolfo, S.J.5
-
27
-
-
84962238645
-
Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project
-
Stolfo, S., Fan, W., Lee, W., Prodromidis, A., Chan, P.: Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project. In: Proceedings of the DARPA Information Survivability Conference and Exposition, DISCEX (2000)
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition, DISCEX
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.5
-
28
-
-
0038011184
-
Mimicry Attacks on Host-Based Intrusion Detection Systems
-
Wagner, D., Soto, P.: Mimicry Attacks on Host-Based Intrusion Detection Systems. In: ACM CCS (2002)
-
(2002)
ACM CCS
-
-
Wagner, D.1
Soto, P.2
-
29
-
-
33745641552
-
-
Wang, K., Cretu, G., Stolfo, S.J.: Anomalous Payload-based Worm Detection and Signature Generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, 3858, pp. 227-246. Springer, Heidelberg (2006)
-
Wang, K., Cretu, G., Stolfo, S.J.: Anomalous Payload-based Worm Detection and Signature Generation. In: Valdes, A., Zamboni, D. (eds.) RAID 2005. LNCS, vol. 3858, pp. 227-246. Springer, Heidelberg (2006)
-
-
-
-
30
-
-
33750335757
-
-
Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, 4219, pp. 226-248. Springer, Heidelberg (2006)
-
Wang, K., Parekh, J.J., Stolfo, S.J.: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. In: Zamboni, D., Krügel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 226-248. Springer, Heidelberg (2006)
-
-
-
-
31
-
-
0026692226
-
Stacked Generalization
-
Wolpert, D.: Stacked Generalization. Neural Networks 5, 241-259 (1992)
-
(1992)
Neural Networks
, vol.5
, pp. 241-259
-
-
Wolpert, D.1
|