-
1
-
-
0000353178
-
A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
-
L.E. Baum, T. Petrie, G. Soules, and N. Weiss. A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains. Annals of Mathematical Statistics, 41(1):164–171, 1970.
-
(1970)
Annals of Mathematical Statistics
, vol.41
, Issue.1
, pp. 164-171
-
-
Baum, L.E.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
4
-
-
0026075750
-
Autoassociation and novelty detection by neuromechanics
-
W.J. Daunicht. Autoassociation and novelty detection by neuromechanics. Science, 253(5025):1289–1291, 1991.
-
(1991)
Science
, vol.253
, Issue.5025
, pp. 1289-1291
-
-
Daunicht, W.J.1
-
5
-
-
0002629270
-
Maximum likelihood from incomplete data via the EM algorithm (With discussion)
-
A.P. Dempster, N.M. Laird, and D.B. Rubin. Maximum likelihood from incomplete data via the EM algorithm (with discussion). Journal of the Royal Statistical Society, Series B, 39:1–38, 1977.
-
(1977)
Journal of the Royal Statistical Society, Series B
, vol.39
, pp. 1-38
-
-
Dempster, A.P.1
Laird, N.M.2
Rubin, D.B.3
-
7
-
-
85036529638
-
Intrusion detection: Applying machine learning to Solaris audit data
-
Phoenix, AZ, USA, 7–11 December
-
D. Endler. Intrusion detection: applying machine learning to Solaris audit data. In Proceedings of the Fourteenth Annual Computer Security Applications Conference, pages 268–279, Phoenix, AZ, USA, 7–11 December 1998.
-
(1998)
Proceedings of the Fourteenth Annual Computer Security Applications Conference
, pp. 268-279
-
-
Endler, D.1
-
8
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, CA, USA, 6–8 May
-
S. Forrest, S.A. Hofmeyr, A. Somayaji, and T.A. Longstaff. A sense of self for Unix processes. In Proceedings of the IEEE Symposium on Security and Privacy, pages 120–128, Oakland, CA, USA, 6–8 May 1996.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
10
-
-
85015336184
-
Intelligent agents for intrusion detection
-
Syracuse, NY, USA, 1-3 September
-
G.G. Helmer, J.S.K. Wong, V. Honavar, and L. Miller. Intelligent agents for intrusion detection. In Proceedings of the 1998 IEEE Information Technology Conference-Information Environment for the Future, pages 121–124, Syracuse, NY, USA, 1-3 September 1998.
-
(1998)
Proceedings of the 1998 IEEE Information Technology Conference-Information Environment for the Future
, pp. 121-124
-
-
Helmer, G.G.1
Wong, J.2
Honavar, V.3
Miller, L.4
-
11
-
-
0001201703
-
A novelty detection approach to classification
-
Montréal, Quebec, Canada, 20–25 August
-
N. Japkowicz, C. Myers, and M. Gluck. A novelty detection approach to classification. In Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence, volume 1, pages 518–523, Montréal, Quebec, Canada, 20–25 August 1995.
-
(1995)
Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence
, vol.1
, pp. 518-523
-
-
Japkowicz, N.1
Myers, C.2
Gluck, M.3
-
12
-
-
84913827229
-
Comments on and correction to’axiomatic derivation of the principle of maximum entropy and the principle of minimum crossentropy’ (Jan 80 26–37)
-
R.W. Johnson and J.E. Shore. Comments on and correction to’axiomatic derivation of the principle of maximum entropy and the principle of minimum crossentropy’ (Jan 80 26–37). IEEE Transactions on Information Theory, 29(6):942–943, 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.29
, Issue.6
, pp. 942-943
-
-
Johnson, R.W.1
Shore, J.E.2
-
14
-
-
0002979739
-
Hidden Markov models for human/computer interface modeling
-
Stockholm, Sweden, 31 July
-
T. Lane. Hidden Markov models for human/computer interface modeling. In Proceedings of the IJCAI-99 Workshop on Learning about Users, pages 35–44, Stockholm, Sweden, 31 July 1999.
-
(1999)
Proceedings of the IJCAI-99 Workshop on Learning about Users
, pp. 35-44
-
-
Lane, T.1
-
15
-
-
0032218214
-
Temporal sequence learning and data reduction for anomaly detection
-
San Francisco, CA, USA, 2–5 November
-
T. Lane and C.E. Brodley. Temporal sequence learning and data reduction for anomaly detection. In Proceedings of the Fifth ACM Conference on Computer and Communications Security, pages 150–158, San Francisco, CA, USA, 2–5 November 1998.
-
(1998)
Proceedings of the Fifth ACM Conference on Computer and Communications Security
, pp. 150-158
-
-
Lane, T.1
Brodley, C.E.2
-
17
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, TX, USA, 26-29 January
-
W. Lee and S.J. Stolfo. Data mining approaches for intrusion detection. In Proceedings of the Seventh USENIX Security Symposium, pages 79–93, San Antonio, TX, USA, 26-29 January 1998.
-
(1998)
Proceedings of the Seventh USENIX Security Symposium
, pp. 79-93
-
-
Lee, W.1
Stolfo, S.J.2
-
18
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
Oakland, CA, USA, 9-12 May
-
W. Lee, S.J. Stolfo, and K.W. Mok. A data mining framework for building intrusion detection models. In Proceedings of the IEEE Symposium on Security and Privacy, pages 120–132, Oakland, CA, USA, 9-12 May 1999.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
19
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L.R. Rabiner. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 77(2):257–286, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
20
-
-
84898944587
-
Intrusion detection with neural networks
-
M.I. Jordan, M.J. Kearns, and S.A. Solla, editors, MIT Press
-
J. Ryan, M.J. Lin, and R. Miikkulainen. Intrusion detection with neural networks. In M.I. Jordan, M.J. Kearns, and S.A. Solla, editors, Advances in Neural Information Processing Systems 10, pages 943–949. MIT Press, 1998.
-
(1998)
Advances in Neural Information Processing Systems
, vol.10
, pp. 943-949
-
-
Ryan, J.1
Lin, M.J.2
Miikkulainen, R.3
-
21
-
-
0034325396
-
Detecting masquerades in intrusion detection based on unpopular commands
-
M. Schonlau and M. Theus. Detecting masquerades in intrusion detection based on unpopular commands. Information Processing Letters, 76(1/2):33–38, 2000.
-
(2000)
Information Processing Letters
, vol.76
, Issue.1-2
, pp. 33-38
-
-
Schonlau, M.1
Theus, M.2
-
22
-
-
0018877134
-
Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy
-
J.E. Shore and R.W. Johnson. Axiomatic derivation of the principle of maximum entropy and the principle of minimum cross-entropy. IEEE Transactions on Information Theory, 26(1):26–37, 1980.
-
(1980)
IEEE Transactions on Information Theory
, vol.26
, Issue.1
, pp. 26-37
-
-
Shore, J.E.1
Johnson, R.W.2
-
23
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Oakland, CA, USA, 9-12 May
-
C. Warrender, S. Forrest, and B. Pearlmutter. Detecting intrusions using system calls: alternative data models. In Proceedings of the IEEE Symposium on Security and Privacy, pages 133–145, Oakland, CA, USA, 9-12 May 1999.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
|