-
1
-
-
0028514027
-
A taxonomy of computer program security flaws
-
C. E. Landwehr, A. R. Bull, J. P. McDermott, and W. S. Choi, "A taxonomy of computer program security flaws, " ACM Comput. Surv., vol. 26, no. 3, pp. 211-254, 1994.
-
(1994)
ACM Comput. Surv.
, vol.26
, Issue.3
, pp. 211-254
-
-
Landwehr, C.E.1
Bull, A.R.2
McDermott, J.P.3
Choi, W.S.4
-
2
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang, "A novel anomaly detection scheme based on principal component classifier, " Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM03), pp. 172-179, 2003.
-
(2003)
Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, in Conjunction with the Third IEEE International Conference on Data Mining (ICDM03)
, pp. 172-179
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
3
-
-
77950560033
-
-
Available on:, Ocotber
-
KDD Cup 1999. Available on: http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html, Ocotber 2007.
-
(2007)
KDD Cup 1999
-
-
-
4
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh, "Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory, " ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
5
-
-
84962238645
-
Costbased modeling for fraud and intrusion detection: Results from the jam project
-
S. J. Stolfo, W. Fan, W. Lee, A. Prodromidis, and P. K. Chan, "Costbased modeling for fraud and intrusion detection: Results from the jam project, " discex, vol. 02, p. 1130, 2000.
-
(2000)
Discex
, vol.2
, pp. 1130
-
-
Stolfo, S.J.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
6
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, "Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation, " discex, vol. 02, p. 1012, 2000.
-
(2000)
Discex
, vol.2
, pp. 1012
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
7
-
-
0003993827
-
-
Available on:, February 2008
-
MIT Lincoln Labs, 1998 DARPA Intrusion Detection Evaluation. Available on: http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/index.html, February 2008.
-
(1998)
DARPA Intrusion Detection Evaluation
-
-
-
8
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson, "The base-rate fallacy and the difficulty of intrusion detection, " ACM Transactions on Information and System Security (TISSEC), vol. 3, no. 3, pp. 186-205, 2000.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
10
-
-
33646021971
-
Towards a theory of intrusion detection
-
G. Di Crescenzo, A. Ghosh, and R. Talpade, "Towards a theory of intrusion detection, " Lecture notes in computer science, vol. 3679, p. 267, 2005.
-
(2005)
Lecture Notes In Computer Science
, vol.3679
, pp. 267
-
-
Di Crescenzo, G.1
Ghosh, A.2
Talpade, R.3
-
11
-
-
33751035185
-
A framework for the evaluation of intrusion detection systems
-
A. Cardenas, J. Baras, and K. Seamon, "A framework for the evaluation of intrusion detection systems, " in Proceedings of IEEE Symposium on Security and Privacy, (S&P), p. 15, 2006.
-
(2006)
Proceedings of IEEE Symposium on Security and Privacy, (S&P)
, pp. 15
-
-
Cardenas, A.1
Baras, J.2
Seamon, K.3
-
12
-
-
34247332710
-
Measuring intrusion detection capability: An information-theoretic approach
-
DOI 10.1145/1128817.1128834, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
G. Gu, P. Fogla, D. Dagon, W. Lee, and B. Skoríc, "Measuring intrusion detection capability: An information-theoretic approach, " in Proceedings of ACM Symposium on Information, computer and communications security (ASIACCS06), pp. 90-101, ACM New York, NY, USA, 2006. (Pubitemid 46644729)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 90-101
-
-
Gu, O.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
-
13
-
-
35248857893
-
An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection
-
Recent Advances in Intrusion Detection
-
M. Mahoney and P. Chan, "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection, " LECTURE NOTES IN COMPUTER SCIENCE, pp. 220-238, 2003. (Pubitemid 37171501)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2820
, pp. 220-238
-
-
Mahoney, M.V.1
Chan, P.K.2
-
14
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
Philadelphia, PA, November
-
L. Portnoy, E. Eskin, and S. Stolfo, "Intrusion detection with unlabeled data using clustering, " Proceedings of ACM CSS Workshop on Data Mining Applied to Security, Philadelphia, PA, November, 2001.
-
(2001)
Proceedings of ACM CSS Workshop on Data Mining Applied to Security
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
19
-
-
0035478854
-
Random forests
-
L. Breiman, "Random Forests, " Machine Learning, vol. 45, no. 1, pp. 5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
20
-
-
0001981461
-
The continuum random tree. I
-
D. Aldous, "The continuum random tree. I, " The Annals of Probability, pp. 1-28, 1991.
-
(1991)
The Annals of Probability
, pp. 1-28
-
-
Aldous, D.1
-
21
-
-
0025670892
-
The multilayer perceptron as an approximation to a Bayes optimaldiscriminant function
-
D. Ruck, S. Rogers, M. Kabrisky, M. Oxley, and B. Suter, "The multilayer perceptron as an approximation to a Bayes optimaldiscriminant function, " IEEE Transactions on Neural Networks, vol. 1, no. 4, pp. 296-298, 1990.
-
(1990)
IEEE Transactions on Neural Networks
, vol.1
, Issue.4
, pp. 296-298
-
-
Ruck, D.1
Rogers, S.2
Kabrisky, M.3
Oxley, M.4
Suter, B.5
|