-
3
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
M. Schonlau, W. Dumouchel, W. hua Ju, A. F. Karr, M. Theus, and Y. Vardi, "Computer intrusion: Detecting masquerades," Statistical Science, vol. 16, pp. 58-74, 2001.
-
(2001)
Statistical Science
, vol.16
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Hua Ju, W.3
Karr, A.F.4
Theus, M.5
Vardi, Y.6
-
4
-
-
0013420742
-
-
88/333/45, Department of Computer Science, University of Calgary, Alberta, Canada, Tech. Rep.
-
S. Greenberg, "Using unix: Collected traces of 168 users," 88/333/45, Department of Computer Science, University of Calgary, Alberta, Canada, Tech. Rep., 1998.
-
(1998)
Using Unix: Collected Traces of 168 Users
-
-
Greenberg, S.1
-
5
-
-
33845941202
-
Hybrid method for detecting masqueraders using session folding and hidden markov models
-
R. Posadas, J. C. Mex-Perera, R. Monroy, and J. A. Nolazco-Flores, "Hybrid method for detecting masqueraders using session folding and hidden markov models," in MICAI, 2006, pp. 622-631.
-
(2006)
MICAI
, pp. 622-631
-
-
Posadas, R.1
Mex-Perera, J.C.2
Monroy, R.3
Nolazco-Flores, J.A.4
-
6
-
-
8344223697
-
Towards an immunitybased system for detecting masqueraders
-
T. Okamoto, T. Watanabe, and Y. Ishida, "Towards an immunitybased system for detecting masqueraders," in KES, 2003, pp. 488-495.
-
(2003)
KES
, pp. 488-495
-
-
Okamoto, T.1
Watanabe, T.2
Ishida, Y.3
-
7
-
-
38049096241
-
Framework of an immunity-based anomaly detection system for user behavior
-
T. Okamoto and Y. Ishida, "Framework of an immunity-based anomaly detection system for user behavior," in KES (3), 2007, pp. 821-829.
-
(2007)
KES
, Issue.3
, pp. 821-829
-
-
Okamoto, T.1
Ishida, Y.2
-
8
-
-
85166317163
-
Approaches to online learning and concept drift for user identificatio in computer security
-
AAAI Press
-
T. Lane and C. E. Brodley, "Approaches to online learning and concept drift for user identificatio in computer security," in In KDD. AAAI Press, 1998, pp. 259-263.
-
(1998)
KDD
, pp. 259-263
-
-
Lane, T.1
Brodley, C.E.2
-
10
-
-
41249096616
-
Sequence alignment for masquerade detection
-
S. Coull and B. Szymanski, "Sequence alignment for masquerade detection." Comput. Stat. Data Anal., vol. 52, no. 8, pp. 4116-4131, 2008.
-
(2008)
Comput. Stat. Data Anal.
, vol.52
, Issue.8
, pp. 4116-4131
-
-
Coull, S.1
Szymanski, B.2
-
12
-
-
33646848466
-
-
Technical Report 869, Newcastle University, School of Computing Science, Tech. Rep.
-
K. S. Killhourhy and R. A. Maxion, "Investigating a possible fl w in a masquerade detection system," Technical Report 869, Newcastle University, School of Computing Science, Tech. Rep., 2004.
-
(2004)
Investigating a Possible Fl W in a Masquerade Detection System
-
-
Killhourhy, K.S.1
Maxion, R.A.2
-
13
-
-
17844372755
-
Empirical evaluation of svm-based masquerade detection using unix commands
-
H.-S. Kim and S. D. Cha, "Empirical evaluation of svm-based masquerade detection using unix commands," Computers & Security, vol. 24, no. 2, pp. 160-168, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.2
, pp. 160-168
-
-
Kim, H.-S.1
Cha, S.D.2
-
17
-
-
70149113077
-
-
R Development Core Team, Vienna, Austria, ISBN 3-900051-07-0. [Online]. Available
-
R Development Core Team, R: A Language and Environment for Statistical Computing, R Foundation for Statistical Computing, Vienna, Austria, 2009, ISBN 3-900051-07-0. [Online]. Available: http://www.R-project.org
-
(2009)
R: A Language and Environment for Statistical Computing, R Foundation for Statistical Computing
-
-
-
18
-
-
0141430928
-
Radius margin bounds for support vector machines with the rbf kernel
-
K.-M. Chung, W.-C. Kao, C.-L. Sun, L.-L. Wang, and C.-J. Lin, "Radius margin bounds for support vector machines with the rbf kernel," Neural Comput., vol. 15, no. 11, pp. 2643-2681, 2003.
-
(2003)
Neural Comput.
, vol.15
, Issue.11
, pp. 2643-2681
-
-
Chung, K.-M.1
Kao, W.-C.2
Sun, C.-L.3
Wang, L.-L.4
Lin, C.-J.5
|