-
1
-
-
0242572726
-
Measuring system normality
-
May
-
M. Burgess, H. Haugerud, and S. Straumsnes, "Measuring system normality," ACM Transactions on Computer Systems, vol. 20, no. 2, pp. 125-160, May 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.2
, pp. 125-160
-
-
Burgess, M.1
Haugerud, H.2
Straumsnes, S.3
-
2
-
-
0038633398
-
Comparing data streams using hamming norms (How to zero in)
-
May/June
-
G. Cormode, M. Datar, P. Lndyk, and S. Muthukrishnan, "Comparing data streams using hamming norms (How to zero in)," IEEE Transaction on Knowledge and Data Engineering, vol. 15, no. 3, pp. 529-540, May/June 2003.
-
(2003)
IEEE Transaction on Knowledge and Data Engineering
, vol.15
, Issue.3
, pp. 529-540
-
-
Cormode, G.1
Datar, M.2
Lndyk, P.3
Muthukrishnan, S.4
-
3
-
-
21844476566
-
A performance comparison of different back propagation neural networks methods in computer network intrusion detection
-
Jan.&Apr
-
V. N. P. Dao and V. R. Vemuri, "A performance comparison of different back propagation neural networks methods in computer network intrusion detection," Differential Equations and Dynamical Systems, vol. 10, no. 1&2, pp. 201-21, Jan.&Apr., 2002.
-
(2002)
Differential Equations and Dynamical Systems
, vol.10
, Issue.1-2
, pp. 201-221
-
-
Dao, V.N.P.1
Vemuri, V.R.2
-
4
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
Y. D. Yan and Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models,' Pttern Recognition, vol. 36, pp. 229-243, 2003.
-
(2003)
Pttern Recognition
, vol.36
, pp. 229-243
-
-
Yan, Y.D.1
Ding, Y.2
-
5
-
-
0029716418
-
A sense of self for UNIX processes
-
Los Alamitos, CA: IEEE Computer Society Press
-
S. Forrest, S. A. Hofmeyr, and T. A. Longstaff "A sense of self for UNIX processes," in proceedings of 1996 IEEE Symposium on Security and Privacy, Los Alamitos, CA: IEEE Computer Society Press, pp. 120-128, 1996.
-
(1996)
proceedings of 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Longstaff, T.A.3
-
6
-
-
0038633423
-
Clustering data streams: Theory and practice
-
May/June
-
S. Guha, A. M. Meyerson, N. Mishra, R. Motwani, and L. O'Callaghan, "Clustering data streams: Theory and practice," IEEE Transaction on Knowledge and Data Engineering, vol. 15, no. 3, pp. 515-528, May/June 2003.
-
(2003)
IEEE Transaction on Knowledge and Data Engineering
, vol.15
, Issue.3
, pp. 515-528
-
-
Guha, S.1
Meyerson, A.M.2
Mishra, N.3
Motwani, R.4
O'Callaghan, L.5
-
7
-
-
0027668428
-
Statistical foundataions of audit trail analysis for the detection of computer misuse
-
Sep
-
P. Helman and G. Liepins, "Statistical foundataions of audit trail analysis for the detection of computer misuse," IEEE Transaction on Software Engineering, vol. 19, no. 9, Sep. 1993.
-
(1993)
IEEE Transaction on Software Engineering
, vol.19
, Issue.9
-
-
Helman, P.1
Liepins, G.2
-
8
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, A. Somayaji, "Intrusion detection using sequences of system calls," Journal of Computer Security, vol. 6, no. 3, pp. 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
9
-
-
0039396062
-
Grouped data exponentially weighted moving average control charts
-
S. H. Steiner, "Grouped data exponentially weighted moving average control charts," Journal of the Royal Statistical Society: Series C (Applied Statistics), vol. 47, no. 2, pp. 203-216, 1998.
-
(1998)
Journal of the Royal Statistical Society: Series C (Applied Statistics)
, vol.47
, Issue.2
, pp. 203-216
-
-
Steiner, S.H.1
-
10
-
-
24944563451
-
Robust support vetor machines for anomaly detection in computer security
-
Los Angeles, California, June
-
W. Hu, Y. Liao, and V. R. Vemuri, "Robust support vetor machines for anomaly detection in computer security," The 2003 International Conference on Machine Learning and Applications (ICMLA'03), Los Angeles, California, pp. 168-174, June 2003.
-
(2003)
The 2003 International Conference on Machine Learning and Applications (ICMLA'03)
, pp. 168-174
-
-
Hu, W.1
Liao, Y.2
Vemuri, V.R.3
-
11
-
-
4644374039
-
Optimality of universal Bayesian sequence prediction for general loss and alphabet
-
M. Hutter, "Optimality of universal Bayesian sequence prediction for general loss and alphabet," Journal of Machine Learning Research, vol. 4, pp. 971-1000, 2003.
-
(2003)
Journal of Machine Learning Research
, vol.4
, pp. 971-1000
-
-
Hutter, M.1
-
12
-
-
0037400054
-
An empirical study of two approaches to sequence learning for anomaly detection
-
T. Lane, and C. E. Brodley, "An empirical study of two approaches to sequence learning for anomaly detection," Machine Learning, vol. 51, pp. 73-107, 2003.
-
(2003)
Machine Learning
, vol.51
, pp. 73-107
-
-
Lane, T.1
Brodley, C.E.2
-
14
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Los Alamitos, Oakland, California, 14- 16 May
-
W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection," in IEEE Symposium on Security and Privacy, IEEE Computer Society Press, pp. 130-143, Los Alamitos, Oakland, California, 14- 16 May, 2001.
-
(2001)
IEEE Symposium on Security and Privacy, IEEE Computer Society Press
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
15
-
-
0036321445
-
Use of K-Nearest neighbor classifier for intrusion detection
-
Oct
-
Y. Liao and V. R. Vemuri, "Use of K-Nearest neighbor classifier for intrusion detection," Computers&Security, vol. 21, no. 5, pp. 439-448, Oct. 2002.
-
(2002)
Computers&Security
, vol.21
, Issue.5
, pp. 439-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
16
-
-
1842709394
-
IDES: An ingelligent system for detecting intruders
-
Rome, Italy
-
T. F. Lunt, "IDES: An ingelligent system for detecting intruders," in Proceedings of the Symposium: Computer Security, Threat and Countermeasures, Rome, Italy, pp. 30-45, 1990.
-
(1990)
Proceedings of the Symposium: Computer Security, Threat and Countermeasures
, pp. 30-45
-
-
Lunt, T.F.1
-
17
-
-
0035481772
-
Modeling heterogeneous network traffic in wavelet domain
-
Oct
-
S. Ma, and C. Ji, "Modeling heterogeneous network traffic in wavelet domain," IEEE/ACM Transactions On Networking, vol. 9, no. 5, pp. 634-649, Oct. 2001.
-
(2001)
IEEE/ACM Transactions On Networking
, vol.9
, Issue.5
, pp. 634-649
-
-
Ma, S.1
Ji, C.2
-
18
-
-
0036472459
-
Anomaly detection in embedded systems
-
Feb
-
R. A. Maxion, and K. M. C. Tan, "Anomaly detection in embedded systems," IEEE Transaction on Computers, vol. 51, no. 2, Feb. 2002.
-
(2002)
IEEE Transaction on Computers
, vol.51
, Issue.2
-
-
Maxion, R.A.1
Tan, K.M.C.2
-
20
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincolnlaboratory
-
Nov
-
J. Mchugh, "Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincolnlaboratory," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, Nov. 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
Mchugh, J.1
-
21
-
-
84874797794
-
-
MIT Lincoln Laboratory
-
MIT Lincoln Laboratory, http://www.ll.mit.edu/IST/ideval/data/dataindex.html.
-
-
-
-
25
-
-
84958984156
-
Undermining an anomaly-based intrusion detection system using common exploits
-
Springer-Verlag
-
K. M. C. Tan, K. S. Killourhy, and R. A. Maxion, "Undermining an anomaly-based intrusion detection system using common exploits," RAID 2002, LNCS 2516, pp. 54-73, Springer-Verlag, 2002.
-
(2002)
RAID 2002, LNCS 2516
, pp. 54-73
-
-
Tan, K.M.C.1
Killourhy, K.S.2
Maxion, R.A.3
-
26
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. Pearlumtter, "Detecting intrusions using system calls: Alternative data models," 1999 IEEE Symposium on Security and Privacy, pp. 133-145, 1999.
-
(1999)
1999 IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlumtter, B.3
-
27
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
July
-
N. Ye, X. Li, Q. Chen, S. M. Emran, and M. Xu, "Probabilistic techniques for intrusion detection based on computer audit data," IEEE Transaction on Systems, Man, and Cybernetics-Part A:Systems and Humans, vol. 31, no. 4, July 2001.
-
(2001)
IEEE Transaction on Systems, Man, and Cybernetics-Part A:Systems and Humans
, vol.31
, Issue.4
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Emran, S.M.4
Xu, M.5
-
28
-
-
0036647172
-
Multivariate statistical analysis of audit trails for hostbased intrusion detection
-
July
-
N. Ye, S. M. Emran, Q. Chen, and S. Vilber, "Multivariate statistical analysis of audit trails for hostbased intrusion detection," IEEE Transaction on Computers, vol. 51, no. 7, pp. 810-820, July 2002.
-
(2002)
IEEE Transaction on Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilber, S.4
-
29
-
-
0036575252
-
First-order versus high-order stochastic models for computer intrusion detection
-
N. Ye, T. Ehiabor and Y. Zhang, "First-order versus high-order stochastic models for computer intrusion detection," Quqlity and Reliability Engineering Internation, vol. 18, pp. 243-250, 2002.
-
(2002)
Quqlity and Reliability Engineering Internation
, vol.18
, pp. 243-250
-
-
Ye, N.1
Ehiabor, T.2
Zhang, Y.3
-
30
-
-
21844433474
-
Application of onlinetraining SVMs for real-time intrusiondetection with different considerations
-
July
-
Z. Zhang and H. Shen, "Application of onlinetraining SVMs for real-time intrusiondetection with different considerations", Computer Communications, Elsevier Science, vol. 28, no. 12, pp. 1428-1442, July 2005.
-
(2005)
Computer Communications, Elsevier Science
, vol.28
, Issue.12
, pp. 1428-1442
-
-
Zhang, Z.1
Shen, H.2
-
31
-
-
27544472033
-
Constructing multi-layer boundary to defend against intrusive anomalies: An autonomic detection coordinator
-
Yokohama, Japan, June 28-July 1
-
Z. Zhang and H. Shen, "Constructing multi-layer boundary to defend against intrusive anomalies: An autonomic detection coordinator," in Proceedings of the International Conference on Dependable Systems and Networks(DSN2005), Yokohama, Japan, pp. 118-127, June 28-July 1, 2005.
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks(DSN2005)
, pp. 118-127
-
-
Zhang, Z.1
Shen, H.2
|