-
1
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3): 186-205, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
3
-
-
37249080697
-
Combining one class fuzzy knn's
-
Camogli, Italy, July 7-10, 2007, Proceedings, volume 4578 of Lecture Notes in Computer Science, Springer
-
V. D. Gesù and G. L. Bosco. Combining one class fuzzy knn's. In WILT 2007, Camogli, Italy, July 7-10, 2007, Proceedings, volume 4578 of Lecture Notes in Computer Science, pages 152-160. Springer, 2007.
-
(2007)
WILT 2007
, pp. 152-160
-
-
Gesù, V.D.1
Bosco, G.L.2
-
4
-
-
33745768403
-
New similarity rules for mining data
-
Vietri sul Mare, Salerno, Italy, June 8-11, 2005, Proceedings, volume 3931 of Lecture Notes in Computer Science, Springer
-
V. D. Gesú and J. Friedman. New similarity rules for mining data. In WIRN/NAIS 2005, Vietri sul Mare, Salerno, Italy, June 8-11, 2005, Proceedings, volume 3931 of Lecture Notes in Computer Science, pages 179-187. Springer, 2006.
-
(2006)
WIRN/NAIS 2005
, pp. 179-187
-
-
Gesú, V.D.1
Friedman, J.2
-
5
-
-
0027609384
-
A survey of intrusion-detection techniques
-
T. Lunt. A survey of intrusion-detection techniques. Computers & Security, 12(4):405-418, 1993.
-
(1993)
Computers & Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.1
-
6
-
-
0023866666
-
A prototype real-time intrusion-detection expert system
-
Oakland, CA, USA, Apr 18-21, 1998, Proceedings, IEEE Computer Society Press
-
T. Lunt and R. Jagannathan. A prototype real-time intrusion-detection expert system. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, Apr 18-21, 1998, Proceedings, pages 59-66. IEEE Computer Society Press, 1988.
-
(1988)
IEEE Symposium on Security and Privacy
, pp. 59-66
-
-
Lunt, T.1
Jagannathan, R.2
-
7
-
-
0036931591
-
Masquerade detection using truncated command lines
-
Bethesda, Maryland, USA, June 23-26, Proceedings, IEEE Computer Society Press, 2002
-
R. Maxion and T. Townsend. Masquerade detection using truncated command lines. In DSN-2002, Bethesda, Maryland, USA, June 23-26, 2002, Proceedings, pages 219-228. IEEE Computer Society Press, 2002.
-
(2002)
DSN-2002
, pp. 219-228
-
-
Maxion, R.1
Townsend, T.2
-
8
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
M. Schonlau, W. DuMouchel, W. Ju, A. Karr, M. Theus, and Y. Vardi. Computer intrusion: Detecting masquerades. Statistical Science, 16(1):58-74, 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
DuMouchel, W.2
Ju, W.3
Karr, A.4
Theus, M.5
Vardi, Y.6
-
11
-
-
36048968577
-
One-class training for masquerade detection
-
Melbourne, Florida, USA, November 19-22, Proceedings, 2003
-
K. Wang and S. Stolfo. One-class training for masquerade detection. In DMSEC'03, Melbourne, Florida, USA, November 19-22, 2003, Proceedings, pages 1019, 2003.
-
(2003)
DMSEC'03
, pp. 1019
-
-
Wang, K.1
Stolfo, S.2
|