-
1
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou, "Specification-based anomaly detection: A new approach for detecting network intrusions," in Proc. 9th ACM Conf. Comput. Commun. Security (CCS), 2002, pp. 265-274.
-
(2002)
Proc. 9th ACM Conf. Comput. Commun. Security (CCS)
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
3
-
-
78650720508
-
The need for simulation in evaluating anomaly detectors
-
H. Ringberg, M. Roughan, and J. Rexford, "The need for simulation in evaluating anomaly detectors," SIGCOMM Comput. Commun. Rev., vol.38, no.1, pp. 55-59, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.1
, pp. 55-59
-
-
Ringberg, H.1
Roughan, M.2
Rexford, J.3
-
4
-
-
84976699258
-
ACM President's Letter: What is experimental computer science?"
-
P. J. Denning, "ACM President's Letter: What is experimental computer science?" Commun. ACM, vol.23, no.10, pp. 543-544, 1980.
-
(1980)
Commun. ACM
, vol.23
, Issue.10
, pp. 543-544
-
-
Denning, P.J.1
-
5
-
-
0029230328
-
Experimental evaluation in computer science: A quantitative study
-
W. F. Tichy, P. Lukowicz, L. Prechelt, and E. A. Heinz, "Experimental evaluation in computer science: a quantitative study," J. Syst. Softw., vol.28, no.1, pp. 9-18, 1995.
-
(1995)
J. Syst. Softw.
, vol.28
, Issue.1
, pp. 9-18
-
-
Tichy, W.F.1
Lukowicz, P.2
Prechelt, L.3
Heinz, E.A.4
-
6
-
-
62349140167
-
Empirical evaluation in computer science research published by ACM
-
J. Wainer, C. N. Barsottini, D. Lacerda, and L. R. M. de Marco, "Empirical evaluation in computer science research published by ACM," Inf. Softw. Technol., vol.51, no.6, pp. 1081-1085, 2009.
-
(2009)
Inf. Softw. Technol.
, vol.51
, Issue.6
, pp. 1081-1085
-
-
Wainer, J.1
Barsottini, C.N.2
Lacerda, D.3
De Marco, L.R.M.4
-
7
-
-
0032074438
-
Experimental models for validating technology
-
M. V. Zelkowitz and D. R. Wallace, "Experimental models for validating technology," Computer, vol.31, no.5, pp. 23-31, 1998.
-
(1998)
Computer
, vol.31
, Issue.5
, pp. 23-31
-
-
Zelkowitz, M.V.1
Wallace, D.R.2
-
8
-
-
61349185752
-
An update to experimental models for validating computer technology
-
M. V. Zelkowitz, "An update to experimental models for validating computer technology," J. Syst. Softw., vol.82, no.3, pp. 373-376, 2009.
-
(2009)
J. Syst. Softw.
, vol.82
, Issue.3
, pp. 373-376
-
-
Zelkowitz, M.V.1
-
9
-
-
27644501818
-
A survey of controlled experiments in software engineering
-
Sep.
-
J. E. Hannay, O. Hansen, V. By Kampenes, A. Karahasanovic, N.-K. Liborg, and A. C. Rekdal, "A survey of controlled experiments in software engineering," IEEE Trans. Softw. Eng., vol.31, no.9, pp. 733-753, Sep. 2005.
-
(2005)
IEEE Trans. Softw. Eng.
, vol.31
, Issue.9
, pp. 733-753
-
-
Hannay, J.E.1
Hansen, O.2
By Kampenes, V.3
Karahasanovic, A.4
Liborg, N.-K.5
Rekdal, A.C.6
-
10
-
-
34247117411
-
On the success of empirical studies in the international conference on software engineering
-
New York, NY: ACM
-
C. Zannier, G. Melnik, and F. Maurer, "On the success of empirical studies in the international conference on software engineering," in Proc. 28th Int. Conf. Softw. Eng. (ICSE), New York, NY: ACM, 2006, pp. 341-350.
-
(2006)
Proc. 28th Int. Conf. Softw. Eng. (ICSE)
, pp. 341-350
-
-
Zannier, C.1
Melnik, G.2
Maurer, F.3
-
11
-
-
0036152263
-
On credibility of simulation studies of telecommunication networks
-
DOI 10.1109/35.978060
-
K. Pawlikowski, H.-D. Jeong, and J.-S. R., "On credibility of simulation studies of telecommunication networks," IEEE Commun. Mag., vol.40, no.1, pp. 132-139, Jan. 2001. (Pubitemid 34110003)
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.1
, pp. 132-139
-
-
Pawlikowski, K.1
Jeong, H.-D.J.2
Lee, J.-S.R.3
-
12
-
-
33646862515
-
MANET simulation studies: The incredibles
-
S. Kurkowski, T. Camp, and M. Colagrosso, "MANET simulation studies: the incredibles," SIGMOBILE Mob. Comput. Commun. Rev., vol.9, no.4, pp. 50-61, 2005.
-
(2005)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.9
, Issue.4
, pp. 50-61
-
-
Kurkowski, S.1
Camp, T.2
Colagrosso, M.3
-
13
-
-
77955852185
-
-
Jan. [Online]. Available
-
Estimated Venue Impact Factors. (2009, Jan.). [Online]. Available: http://citeseerx.ist.psu.edu/stats/venues
-
(2009)
Estimated Venue Impact Factors
-
-
-
15
-
-
0003993827
-
-
MIT Lincoln Labs, [Online], Feb
-
MIT Lincoln Labs. (2008, Feb.). DARPA intrusion detection evaluation [Online]. Available: http://www.ll.mit.edu/mission/communications/ist/corpora/ ideval/index.html
-
(2008)
DARPA Intrusion Detection Evaluation
-
-
-
16
-
-
77955852537
-
-
KDD Cup 1999 (Oct.) [Online] Available:
-
KDD Cup 1999. (2008, Oct.) [Online]. Available: http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html
-
(2008)
-
-
-
18
-
-
35248857893
-
An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection
-
Berlin, Germany: Springer-Verlag
-
M. V. Mahoney and P. K. Chan, "An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection," in Proc. 6th Int. Symp. Recent Adv. Intrusion Detection. Berlin, Germany: Springer-Verlag, 2003, pp. 220-237.
-
(2003)
Proc. 6th Int. Symp. Recent Adv. Intrusion Detection
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
19
-
-
77955848587
-
-
The Internet Traffic Archive Apr. [Online]. Available
-
The Internet Traffic Archive. (2009, Apr.). [Online]. Available: http://ita.ee.lbl.gov/
-
(2009)
-
-
-
20
-
-
84943383590
-
Identifying important features for intrusion detection using support vector machines and neural networks
-
Washington, DC: IEEE Comput. Soc.
-
A. H. Sung and S. Mukkamala, "Identifying important features for intrusion detection using support vector machines and neural networks," in Proc. Symp. Appl. Internet (SAINT). Washington, DC: IEEE Comput. Soc., 2003, pp. 209-216.
-
(2003)
Proc. Symp. Appl. Internet (SAINT)
, pp. 209-216
-
-
Sung, A.H.1
Mukkamala, S.2
-
21
-
-
33144477616
-
Inverting sampled traffic
-
Jan.
-
N. Hohn and D. Veitch, "Inverting sampled traffic," IEEE/ACM Trans. Netw., vol.14, no.1, pp. 68-80, Jan. 2006.
-
(2006)
IEEE/ACM Trans. Netw.
, vol.14
, Issue.1
, pp. 68-80
-
-
Hohn, N.1
Veitch, D.2
-
22
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
New York, NY: ACM
-
J. Mai, C.-N. Chuah, A. Sridharan, T. Ye, and H. Zang, "Is sampled data sufficient for anomaly detection?" in Proc. 6th ACM SIGCOMM Conf. Internet Meas. (IMC). New York, NY: ACM, 2006, pp. 165-176.
-
(2006)
Proc. 6th ACM SIGCOMM Conf. Internet Meas. (IMC)
, pp. 165-176
-
-
Mai, J.1
Chuah, C.-N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
24
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
V. Yegneswaran, P. Barford, and J. Ullrich, "Internet intrusions: global characteristics and prevalence," SIGMETRICS Perform. Eval. Rev., vol.31, no.1, pp. 138-147, 2003.
-
(2003)
SIGMETRICS Perform. Eval. Rev.
, vol.31
, Issue.1
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, J.3
-
25
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya, "Profiling internet backbone traffic: behavior models and applications," SIGCOMM Comput. Commun. Rev., vol.35, no.4, pp. 169-180, 2005.
-
(2005)
SIGCOMM Comput. Commun. Rev.
, vol.35
, Issue.4
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
27
-
-
0003454649
-
-
New York, NY: Wiley-Interscience
-
R. Jain, The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation,and Modeling. New York, NY: Wiley-Interscience, 1991.
-
(1991)
The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation,and Modeling
-
-
Jain, R.1
-
28
-
-
33751035185
-
A framework for the evaluation of intrusion detection systems
-
Washington, DC: IEEE Comput. Soc.
-
A. A. Cárdenas, J. S. Baras, and K. Seamon, "A framework for the evaluation of intrusion detection systems," in Proc. 2006 IEEE Symp. Security Privacy (SP). Washington, DC: IEEE Comput. Soc., 2006, pp. 63-77.
-
(2006)
Proc. 2006 IEEE Symp. Security Privacy (SP)
, pp. 63-77
-
-
Cárdenas, A.A.1
Baras, J.S.2
Seamon, K.3
-
29
-
-
2942631300
-
Evaluation of intrusion detection systems
-
J. W. Ulvila and J. E. Gaffney, "Evaluation of intrusion detection systems," J. Res. Nat. Inst. Standards Technol., vol.108, no.6, pp. 453-471, 2003.
-
(2003)
J. Res. Nat. Inst. Standards Technol.
, vol.108
, Issue.6
, pp. 453-471
-
-
Ulvila, J.W.1
Gaffney, J.E.2
-
30
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
New York, NY: ACM
-
S. Axelsson, "The base-rate fallacy and its implications for the difficulty of intrusion detection," in Proc. 6th ACM Conf. Comput. Commun. Security (CCS), New York, NY: ACM, 1999, pp. 1-7.
-
(1999)
Proc. 6th ACM Conf. Comput. Commun. Security (CCS)
, pp. 1-7
-
-
Axelsson, S.1
-
31
-
-
19544384880
-
A comparative study of anomaly detection schemes in network intrusion detection
-
presented at the San Francisco, CA
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, "A comparative study of anomaly detection schemes in network intrusion detection," presented at the 3rd SIAM Int. Conf. Data Mining, San Francisco, CA, 2003.
-
(2003)
3rd SIAM Int. Conf. Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
|