-
1
-
-
77952345625
-
-
Kdd cup, data
-
Kdd cup 1999 data. http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html, 2005.
-
(1999)
-
-
-
2
-
-
2442424268
-
Naive bayes vs decision trees in intrusion detection systems
-
New York, NY, USA, ACM Press
-
Nahla Ben Amor, Salem Benferhat, and Zied Elouedi. Naive bayes vs decision trees in intrusion detection systems. In SAC '04: Proceedings of the 2004 ACM symposium on Applied computing, pages 420-424, New York, NY, USA, 2004. ACM Press.
-
(2004)
SAC '04: Proceedings of the 2004 ACM Symposium on Applied Computing
, pp. 420-424
-
-
Amor, N.B.1
Benferhat, S.2
Elouedi, Z.3
-
3
-
-
12844261665
-
Measuring the risk-based value of it security solutions
-
Nov.-Dec
-
Anish Arora, Dennis Hall, C. Ariel Pinto, Dwayne Ramsey, and Rahul Telang. Measuring the risk-based value of it security solutions. IT Professional, 6 (6):35-42, Nov.-Dec. 2004.
-
(2004)
IT Professional
, vol.6
, Issue.6
, pp. 35-42
-
-
Arora, A.1
Hall, D.2
Pinto, C.A.3
Ramsey, D.4
Telang, R.5
-
4
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
November
-
S. Axelsson. The base-rate fallacy and its implications for the difficulty of intrusion detection. In Proceedings of ACM CCS'1999, November 1999.
-
(1999)
Proceedings of ACM CCS'1999
-
-
Axelsson, S.1
-
6
-
-
0347742772
-
Intrusion detection systems and multisensor data fusion
-
Tim Bass. Intrusion detection systems and multisensor data fusion. Commun. ACM, 43 (4):99-105, 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.4
, pp. 99-105
-
-
Bass, T.1
-
9
-
-
33751035185
-
A framework for the evaluation of intrusion detection systems
-
Oakland, California, May
-
Alvaro Cardenas, John Baras, and Karl Seamon. A Framework for the Evaluation of Intrusion Detection Systems. In Proceedings of the 2006 IEEE Symposium on Security and Privacy, Oakland, California, May 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Cardenas, A.1
Baras, J.2
Seamon, K.3
-
10
-
-
4944252600
-
-
Chih-Chung Chang and Chih-Jen Lin, Software available at
-
Chih-Chung Chang and Chih-Jen Lin. LIBSVM: a library for support vector machines, 2001. Software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm.
-
(2001)
LIBSVM: A Library for Support Vector Machines
-
-
-
19
-
-
34247332710
-
Measuring intrusion detection capability: An information-theoretic approach
-
March
-
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, and Boris Skoric. Measuring intrusion detection capability: An information-theoretic approach. In Proceedings of the 2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS'06), March 2006.
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS'06)
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
-
20
-
-
54049112069
-
Towards an information-theoretic framework for analyzing intrusion detection systems
-
September
-
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, and Boris Skoric. Towards an information-theoretic framework for analyzing intrusion detection systems. In Proceedings of the 11th European Symposium on Research in Computer Security (ESORICS'06), September 2006.
-
(2006)
Proceedings of the 11th European Symposium on Research in Computer Security (ESORICS'06)
-
-
Gu, G.1
Fogla, P.2
Dagon, D.3
Lee, W.4
Skoric, B.5
-
24
-
-
0003448310
-
-
Springer-Verlag New York, Inc., Secaucus, NJ, USA
-
Finn V. Jensen. Bayesian Networks and Decision Graphs. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2001.
-
(2001)
Bayesian Networks and Decision Graphs
-
-
Jensen, F.V.1
-
25
-
-
0004283231
-
-
Michael I. Jordan, editor, MIT Press, Cambridge, MA, USA
-
Michael I. Jordan, editor. Learning in graphical models. MIT Press, Cambridge, MA, USA, 1999.
-
(1999)
Learning in Graphical Models
-
-
-
26
-
-
14844319067
-
Anomaly detection of web-based attacks
-
Washington, DC, October, ACM Press
-
th ACM Conference on Computer and Communication Security (CCS '03), pages 251-261, Washington, DC, October 2003. ACM Press.
-
(2003)
th ACM Conference on Computer and Communication Security (CCS '03)
, pp. 251-261
-
-
Kruegel, C.1
Vigna, G.2
-
27
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
DOI 10.1016/j.comnet.2005.01.009, PII S1389128605000083, Web Traffic
-
C. Kruegel, G. Vigna, and W. Robertson. A Multi-model Approach to the Detection of Web-based Attacks. Computer Networks, 48 (5):717-738, August 2005. (Pubitemid 40684159)
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
28
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Las Vegas, NV, December
-
Christopher Kruegel, Darren Mutz, William Robertson, and Fredrik Valeur. Bayesian Event Classification for Intrusion Detection. In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003), Las Vegas, NV, December 2003.
-
(2003)
Proceedings of the Annual Computer Security Applications Conference (ACSAC 2003)
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
30
-
-
0036093229
-
Cost-sensitive modeling for intrusion detection and response
-
W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok. Cost-sensitive modeling for intrusion detection and response. Journal of Computer Security, 10 (1, 2), 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.4
Zadok, E.5
-
31
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Wenke Lee and Salvatore J. Stolfo. A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security (TISSEC), 3 (4): p. 227-261, 2000.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
33
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. P. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman. Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation. In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX'00), 2000.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX'00)
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.P.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
34
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
November
-
M. Mahoney. Network traffic anomaly detection based on packet bytes. In Proceedings of 18th ACM Symp. on Applied Computing, pages 346-350, November 2003.
-
(2003)
Proceedings of 18th ACM Symp. on Applied Computing
, pp. 346-350
-
-
Mahoney, M.1
-
36
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by lincoln laboratory
-
November
-
John McHugh. Testing intrusion detection systems: A critique of the 1998 and 1999 darpa off-line intrusion detection system evaluation as performed by lincoln laboratory. ACM Transactions on Information and System Security, 3 (4), November 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
-
-
McHugh, J.1
-
38
-
-
0000776754
-
On the problem of the most efficient tests of statistical hypotheses
-
J. Neyman and E. S. Pearson. On the problem of the most efficient tests of statistical hypotheses. Philosophical Transactions of the Royal Society of London, Series A, Containing Papers of a Mathematical or Physical Character, 231:289-337, 1933.
-
(1933)
Philosophical Transactions of the Royal Society of London, Series A, Containing Papers of a Mathematical Or Physical Character
, vol.231
, pp. 289-337
-
-
Neyman, J.1
Pearson, E.S.2
-
43
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
Martin Roesch. Snort: Lightweight intrusion detection for networks. In LISA, pages 229-238, 1999.
-
(1999)
LISA
, pp. 229-238
-
-
Roesch, M.1
-
45
-
-
84962238645
-
Cost-based modeling for fraud and intrusion detection: Results from the jam project
-
Sal Stolfo, Wei Fan, Wenke Lee, Andreas Prodromidis, and Phil Chan. Cost-based modeling for fraud and intrusion detection: Results from the jam project. In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX '00), 2000.
-
(2000)
Proceedings of the 2000 DARPA Information Survivability Conference and Exposition (DISCEX '00)
-
-
Stolfo, S.1
Fan, W.2
Lee, W.3
Prodromidis, A.4
Chan, P.5
-
46
-
-
33845536393
-
COTS diversity intrusion detection and application to web servers
-
September
-
Eric Totel, Frederic Majorczyk, and Ludovic Me. COTS diversity intrusion detection and application to web servers. In Proceedings of RAID'2005, September 2005.
-
(2005)
Proceedings of RAID'2005
-
-
Totel, E.1
Majorczyk, F.2
Me, L.3
-
47
-
-
21944457574
-
A comprehensive approach to intrusion detection alert correlation
-
31, July-September
-
F. Valeur, G. Vigna, C. Kruegel, and R. Kemmerer. A Comprehensive Approach to Intrusion Detection Alert Correlation. IEEE Transactions on Dependable and Secure Computing, 31 (3):146-169, July-September 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, Issue.3
, pp. 146-169
-
-
Valeur, F.1
Vigna, G.2
Kruegel, C.3
Kemmerer, R.4
-
50
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
September
-
Ke Wang and Salvatore J. Stolfo. Anomalous payload-based network intrusion detection. In Proceedings of RAID'2004, September 2004.
-
(2004)
Proceedings of RAID'2004
-
-
Wang, K.1
Stolfo, S.J.2
-
52
-
-
0026860706
-
Methods of combining multiple classifiers and their applications to handwriting recognition
-
L. Xu, A. Krzyzak, and CY Suen. Methods of combining multiple classifiers and their applications to handwriting recognition. IEEE Trans. Systems Man Cybernet, 22 (3):418-435, 1992.
-
(1992)
IEEE Trans. Systems Man Cybernet
, vol.22
, Issue.3
, pp. 418-435
-
-
Xu, L.1
Krzyzak, A.2
Cy, S.3
|