-
2
-
-
14344257107
-
A game theoretic analysis of intrusion detection in access control systems
-
Alpcan, T., Başar, T.: A game theoretic analysis of intrusion detection in access control systems. In: Proc. IEEE Conf. Decision and Control, pp. 1568-1573 (2004).
-
(2004)
Proc. IEEE Conf. Decision and Control
, pp. 1568-1573
-
-
Alpcan, T.1
Başar, T.2
-
3
-
-
0033281215
-
The base-rate fallacy and its implications for the difficulty of intrusion detection
-
Axelsson, S.: The base-rate fallacy and its implications for the difficulty of intrusion detection. In: Proc. ACM Conf. on Computer and Communications Security, pp. 1-7 (1999).
-
(1999)
Proc. ACM Conf. on Computer and Communications Security
, pp. 1-7
-
-
Axelsson, S.1
-
4
-
-
62749086310
-
An optimal control approach to malware filtering
-
New Orleans, LA (December)
-
Bloem, M., Alpcan, T., Başar, T.: An optimal control approach to malware filtering. In: Proc. 46th IEEE Conference on Decision and Control, New Orleans, LA (December 2007).
-
(2007)
Proc. 46th IEEE Conference on Decision and Control
-
-
Bloem, M.1
Alpcan, T.2
Başar, T.3
-
5
-
-
43049167460
-
Malware filtering for network security using weighted optimality measures
-
Singapore (October)
-
Bloem, M., Alpcan, T., Schmidt, S., Başar, T.: Malware filtering for network security using weighted optimality measures. In: IEEE Conference on Control Applicatons (CCA), Singapore (October 2007).
-
(2007)
IEEE Conference on Control Applicatons (CCA)
-
-
Bloem, M.1
Alpcan, T.2
Schmidt, S.3
Başar, T.4
-
6
-
-
38349070683
-
Decentralized detector generation in cooperative intrusion detection systems
-
Masuzawa, T. Tixeuil, S. (eds.), LNCS, Springer, Heidelberg
-
Bye, R., Luther, K., Camtepe, S.A., Alpcan, T., Albayrak, S., Yener, B.: Decentralized detector generation in cooperative intrusion detection systems. In: Masuzawa, T., Tixeuil, S. (eds.) SSS 2007. LNCS, vol. 4838, pp. 37-51. Springer, Heidelberg (2007).
-
(2007)
SSS 2007
, vol.4838
, pp. 37-51
-
-
Bye, R.1
Luther, K.2
Camtepe, S.A.3
Alpcan, T.4
Albayrak, S.5
Yener, B.6
-
7
-
-
35448979944
-
Smartsiren: Virus detection and alert for smartphones
-
Cheng, J., Wong, S.H.Y., Yang, H., Lu, S.: Smartsiren: virus detection and alert for smartphones. In: Proc. of Int. Conf. on Mobile Systems, Applications, and Services (Mobisys 2007), pp. 258-271 (2007).
-
(2007)
Proc. of Int. Conf. on Mobile Systems, Applications, and Services (Mobisys 2007)
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
8
-
-
27544433210
-
Semantics-aware malware detection
-
Christodorescu, M., Jha, S., Seshia, S., Song, D., Bryant, R.: Semantics-Aware Malware Detection. In: Proc. IEEE Symp. on Security and Privacy, pp. 32-46 (2005).
-
(2005)
Proc. IEEE Symp. on Security and Privacy
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.3
Song, D.4
Bryant, R.5
-
9
-
-
34547919197
-
The future of mobile malware
-
August
-
Coursen, S.: The future of mobile malware. Network Security (8), 7-11 (August 2007).
-
(2007)
Network Security
, Issue.8
, pp. 7-11
-
-
Coursen, S.1
-
10
-
-
33645146449
-
Histograms of oriented gradients for human detection
-
Dalal, N., Triggs, B.: Histograms of Oriented Gradients for Human Detection. In: Proc. CVPR, vol. 2, pp. 886-893 (2005).
-
(2005)
Proc. CVPR
, vol.2
, pp. 886-893
-
-
Dalal, N.1
Triggs, B.2
-
11
-
-
33645311516
-
Reality mining: Sensing complex social systems
-
Eagle, N., Pentland, A.S.: Reality mining: sensing complex social systems. Personal Ubiquitous Computing 10(4), 255-268 (2006).
-
(2006)
Personal Ubiquitous Computing
, vol.10
, Issue.4
, pp. 255-268
-
-
Eagle, N.1
Pentland, A.S.2
-
12
-
-
33847766633
-
Random-walk computation of similarities between nodes of a graph with application to collaborative recommendation
-
Fouss, F., Pirotte, A., Renders, J.M., Saerens, M.: Random-Walk Computation of Similarities between Nodes of a Graph with Application to Collaborative Recommendation. IEEE Trans. on Knowledge and Data Engineering 19(3), 355-369 (2007).
-
(2007)
IEEE Trans. on Knowledge and Data Engineering
, vol.19
, Issue.3
, pp. 355-369
-
-
Fouss, F.1
Pirotte, A.2
Renders, J.M.3
Saerens, M.4
-
13
-
-
47949102777
-
Star-structured higher-order heterogeneous data co-clustering based on consistent information theory
-
Gao, B., Liu, T.Y., Ma, W.Y.: Star-Structured Higher-Order Heterogeneous Data Co-Clustering Based on Consistent Information Theory. In: Proc. ICDM, pp. 880-884 (2006).
-
(2006)
Proc. ICDM
, pp. 880-884
-
-
Gao, B.1
Liu, T.Y.2
Ma, W.Y.3
-
15
-
-
33750317385
-
Kernels for graphs
-
Schölkopf, B. Tsuda, K. Vert, J.P. (eds.), MIT Press, Cambridge
-
Kashima, H., Tsuda, K., Inokuchi, A.: Kernels for graphs. In: Schölkopf, B., Tsuda, K., Vert, J.P. (eds.) Kernel Methods in Computational Biology, pp. 155-170. MIT Press, Cambridge (2004).
-
(2004)
Kernel Methods in Computational Biology
, pp. 155-170
-
-
Kashima, H.1
Tsuda, K.2
Inokuchi, A.3
-
16
-
-
0041775676
-
Diffusion kernels on graphs and other discrete input spaces
-
Kondor, R., Lafferty, J.: Diffusion Kernels on Graphs and Other Discrete Input Spaces. In: Proc. ICML, pp. 315-322 (2002).
-
(2002)
Proc. ICML
, pp. 315-322
-
-
Kondor, R.1
Lafferty, J.2
-
17
-
-
17444429623
-
A survey of eigenvector methods for web information retrieval
-
Langville, A., Meyer, C.: A Survey of Eigenvector Methods for Web Information Retrieval. SIAM Review 47(1), 135-161 (2005).
-
(2005)
SIAM Review
, vol.47
, Issue.1
, pp. 135-161
-
-
Langville, A.1
Meyer, C.2
-
18
-
-
38349068770
-
A cooperative AIS framework for intrusion detection
-
Glasgow, Scotland, June 2007
-
Luther, K., Bye, R., Alpcan, T., Muller, A., Albayrak, S.: A cooperative AIS framework for intrusion detection. In: Proc. of the IEEE Conference on Communication (ICC), Glasgow, Scotland, June 2007, pp. 1409-1416 (2007).
-
(2007)
Proc. of the IEEE Conference on Communication (ICC)
, pp. 1409-1416
-
-
Luther, K.1
Bye, R.2
Alpcan, T.3
Muller, A.4
Albayrak, S.5
-
20
-
-
78650338440
-
New approaches to malware detection coming into view
-
April
-
Messmer, E.: New approaches to malware detection coming into view. Network World (April 2007), http://www.networkworld.com/news/2007/042507- malware-detection.html.
-
(2007)
Network World
-
-
Messmer, E.1
-
21
-
-
33751084887
-
Host-based intrusion detection for advanced mobile devices
-
IEEE Computer Society, Washington
-
Miettinen, M., Halonen, P.: Host-based intrusion detection for advanced mobile devices. In: Proc. of 20th Intl. Conf. on Advanced Information Networking and Applications (AINA'06), vol. 2, pp. 72-76. IEEE Computer Society, Washington (2006).
-
(2006)
Proc. of 20th Intl. Conf. on Advanced Information Networking and Applications (AINA'06)
, vol.2
, pp. 72-76
-
-
Miettinen, M.1
Halonen, P.2
-
23
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
(February)
-
Schmidt, A.D., Peters, F., Lamour, F., Albayrak, Ş .: Monitoring smartphones for anomaly detection. In: Proc. of First Int. Conf. on Mobile Wireless Middleware, Operating Systems, and Applications (MOBILWARE 2008) (February 2008).
-
(2008)
Proc. of First Int. Conf. on Mobile Wireless Middleware, Operating Systems, and Applications (MOBILWARE 2008)
-
-
Schmidt, A.D.1
Peters, F.2
Lamour, F.3
Albayrak, Ş.4
-
24
-
-
77953711643
-
A malware detector placement game for intrusion detection
-
Lopez, J. Hämmerli, B.M. (eds.), LNCS, Springer, Heidelberg
-
Schmidt, S., Alpcan, T., Albayrak, S., Başar, T., Muller, A.: A malware detector placement game for intrusion detection. In: Lopez, J., Hämmerli, B.M. (eds.) CRITIS 2007. LNCS, vol. 5141. Springer, Heidelberg (2008).
-
(2008)
CRITIS 2007
, vol.5141
-
-
Schmidt, S.1
Alpcan, T.2
Albayrak, S.3
Başar, T.4
Muller, A.5
-
25
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
Jonsson, E. Valdes, A. Almgren, M. (eds.), LNCS, Springer, Heidelberg
-
Wang, K., Stolfo, S.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004).
-
(2004)
RAID 2004
, vol.3224
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.2
-
26
-
-
33748126220
-
Factor-analysis based anomaly detection and clustering
-
DOI 10.1016/j.dss.2005.01.005, PII S0167923605000096
-
Wu, N., Zhang, J.: Factor-analysis Based Anomaly Detection and Clustering. Decision Support Systems 42(1), 375-389 (2006). (Pubitemid 44308263)
-
(2006)
Decision Support Systems
, vol.42
, Issue.1
, pp. 375-389
-
-
Wu, N.1
Zhang, J.2
-
27
-
-
26444504890
-
A mobile phone malicious software detection model with behavior checker
-
Shimojo, S. Ichii, S. Ling, T.-W. Song, K.-H. (eds.), LNCS, Springer, Heidelberg
-
Yap, T.S., Ewe, H.T.: A mobile phone malicious software detection model with behavior checker. In: Shimojo, S., Ichii, S., Ling, T.-W., Song, K.-H. (eds.) HSI 2005. LNCS, vol. 3597, pp. 57-65. Springer, Heidelberg (2005).
-
(2005)
HSI 2005
, vol.3597
, pp. 57-65
-
-
Yap, T.S.1
Ewe, H.T.2
-
28
-
-
84899013566
-
Ranking on data manifolds
-
Zhou, D., Weston, J., Gretton, A., Bousquet, O., Schölkopf, B.: Ranking on Data Manifolds. In: Proc. NIPS, pp. 169-176 (2004).
-
(2004)
Proc. NIPS
, pp. 169-176
-
-
Zhou, D.1
Weston, J.2
Gretton, A.3
Bousquet, O.4
Schölkopf, B.5
|