-
3
-
-
0039253819
-
LOF: Identifying densitybased local outliers
-
Dallas, Texas
-
Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) LOF: Identifying densitybased local outliers. In: Proc. of the ACM SIGMOD Conference, Dallas, Texas, pp 93-104
-
(2000)
Proc. of the ACM SIGMOD Conference
, pp. 93-104
-
-
Breunig, M.M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
5
-
-
2942640996
-
Data mining for network intrusion detection
-
Dokas P, Ertoz L, Kumar V, Lazarevic A, Srivastava J, Tan P-N (2002) Data mining for network intrusion detection. In: Proc. of the National Science Foundation Workshop on Next Generation Data Mining. pp 21-30
-
(2002)
Proc. of the National Science Foundation Workshop on Next Generation Data Mining
, pp. 21-30
-
-
Dokas, P.1
Ertoz, L.2
Kumar, V.3
Lazarevic, A.4
Srivastava, J.5
Tan, P.-N.6
-
6
-
-
33746426241
-
Robustness of Canberra metric in computer intrusion detection
-
United States Military Academy, West Point, New York
-
Emran SM, Ye N (2001) Robustness of Canberra metric in computer intrusion detection. In: Proc. of the IEEE Workshop on Information Assurance and Security, United States Military Academy, West Point, New York, pp 80-84
-
(2001)
Proc. of the IEEE Workshop on Information Assurance and Security
, pp. 80-84
-
-
Emran, S.M.1
Ye, N.2
-
7
-
-
0002954125
-
Robust estimates, residuals and outlier detection with multiresponse data
-
Gnanadesikan R, Kettenring JR (1972) Robust estimates, residuals and outlier detection with multiresponse data. Biometrics, 28:81-124
-
(1972)
Biometrics
, vol.28
, pp. 81-124
-
-
Gnanadesikan, R.1
Kettenring, J.R.2
-
8
-
-
0009928479
-
The detection of errors in multivariate data using principal components
-
Hawkins DM (1974) The detection of errors in multivariate data using principal components. Journal of the American Statistical Association, vol 69, no 346:340-344
-
(1974)
Journal of the American Statistical Association
, vol.69
, Issue.346
, pp. 340-344
-
-
Hawkins, D.M.1
-
9
-
-
0003478316
-
The architecture of a network level intrusion detection system
-
Computer Science Department, University of New Mexico
-
Heady R, Luger G, Maccabe A, Servilla M (1990) The architecture of a network level intrusion detection system, Technical Report, Computer Science Department, University of New Mexico
-
(1990)
Technical Report
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
10
-
-
24944563451
-
Robust support vector machines for anomaly detection in computer security
-
Los Angeles, California
-
Hu W, Liao Y, Vemuri VR (2003) Robust support vector machines for anomaly detection in computer security. In: Proc. of the International Conference on Machine Learning and Applications (ICMLA), Los Angeles, California, pp 168-174
-
(2003)
Proc. of the International Conference on Machine Learning and Applications (ICMLA)
, pp. 168-174
-
-
Hu, W.1
Liao, Y.2
Vemuri, V.R.3
-
16
-
-
78049254025
-
-
KDD Cup 1999 Data, Available on
-
KDD Cup 1999 Data, Available on: http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html
-
-
-
-
18
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee W, Stolfo SJ (2000) A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 3:227-261
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
19
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
IEEE Computer Society Press, California, 2000
-
Lippmann RP, Fried DJ, Graf I, Haines JW, Kendall KP, McClung D, Weber D, Webster SE, Wyschogrod D, Cunningham RK, Zissman MA (2000) Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation. In: Proc. of the DARPA Information Survivability Conference and Exposition (DISCEX) 2000, vol 2, IEEE Computer Society Press, California, pp 12-26
-
(2000)
Proc. of the DARPA Information Survivability Conference and Exposition (DISCEX)
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.P.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
20
-
-
0142063407
-
Novelty detection: A review, Part 1: Statistical approaches
-
Markou M, Singh S (2003) Novelty detection: A review, Part 1: Statistical approaches. Signal Processing, 83, 12:2481-2497
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2481-2497
-
-
Markou, M.1
Singh, S.2
-
21
-
-
0142126712
-
Novelty detection: A review, Part 2: Neural network-based approaches
-
Markou M, Singh S (2003) Novelty detection: A review, Part 2: Neural network-based approaches. Signal Processing, 83, 12:2499-2521
-
(2003)
Signal Processing
, vol.83
, Issue.12
, pp. 2499-2521
-
-
Markou, M.1
Singh, S.2
-
23
-
-
27144518261
-
A novel anomaly detection scheme based on principal component classifier
-
Melbourne, Florida
-
Shyu M-L, Chen S-C, Sarinnapakorn K, Chang L (2003) A novel anomaly detection scheme based on principal component classifier. In: Proc. of the IEEE Foundations and New Directions of Data Mining Workshop, in conjunction with the Third IEEE International Conference on Data Mining (ICDM'03), Melbourne, Florida, pp 172-179
-
(2003)
Proc. of the IEEE Foundations and New Directions of Data Mining Workshop, in Conjunction with the Third IEEE International Conference on Data Mining (ICDM'03)
, pp. 172-179
-
-
Shyu, M.-L.1
Chen, S.-C.2
Sarinnapakorn, K.3
Chang, L.4
-
24
-
-
0035271352
-
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
-
Ye N, Chen Q (2001) An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems. Quality and Reliability Eng. Int'l, 17:105-112
-
(2001)
Quality and Reliability Eng. Int'l
, vol.17
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
25
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection
-
Ye N, Emran SM, Chen Q, Vilbert S (2002) Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions on Computers, 51:810-820
-
(2002)
IEEE Transactions on Computers
, vol.51
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
|