-
1
-
-
80052182829
-
An adaptive anomaly detector for worm detection
-
Agosta, J. M., Duik-Wasser, C., Chandrashekar, J., & Livadas, C. (2007). An adaptive anomaly detector for worm detection. In Workshop on Tackling Computer Systems Problems with Machine Learning Techniques.
-
(2007)
Workshop on Tackling Computer Systems Problems with Machine Learning Techniques
-
-
Agosta, J.M.1
Duik-Wasser, C.2
Chandrashekar, J.3
Livadas, C.4
-
2
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
A.Hofmeyr, S., Forrest, S., & Somayaji, A. (1998). Intrusion detection using sequences of system calls. Journal of Computer Security, 6, 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, A.1
Forrest, S.2
Somayaji, A.3
-
3
-
-
33646903968
-
Host anomaly detection performance analysis based on system call of neuro-fuzzy using soundex algorithm and n-gram technique
-
Cha, B. (2005). Host anomaly detection performance analysis based on system call of neuro-fuzzy using soundex algorithm and n-gram technique. In Systems Communications (ICW).
-
(2005)
Systems Communications (ICW)
-
-
Cha, B.1
-
5
-
-
80053135175
-
Mean field variational approximation for continous-time Bayesian networks
-
Cohn, I., El-Hay, T., Friedman, N., & Kupferman, R. (2009). Mean field variational approximation for continous-time Bayesian networks. In Uncertainty in Artificial Intelligence.
-
(2009)
Uncertainty in Artificial Intelligence
-
-
Cohn, I.1
El-Hay, T.2
Friedman, N.3
Kupferman, R.4
-
6
-
-
56049084701
-
Extracting hidden anomalies using sketch and non Gaussian multiresulotion statistical detection procedures
-
Dewaele, G., Fukuda, K., & Borgnat, P. (2007). Extracting hidden anomalies using sketch and non Gaussian multiresulotion statistical detection procedures. In ACM SIGCOMM.
-
(2007)
ACM SIGCOMM
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
-
7
-
-
0002165558
-
Rao-Blackwellised particle filtering for dynamic Bayesian networks
-
Doucet, A., de Freitas, N., Murphy, K., & Russel, S. (2000). Rao-Blackwellised particle filtering for dynamic Bayesian networks. In Uncertainty in Artificial Intelligence.
-
(2000)
Uncertainty in Artificial Intelligence
-
-
Doucet, A.1
De Freitas, N.2
Murphy, K.3
Russel, S.4
-
8
-
-
77956555218
-
Continuous-time belief propagation
-
El-Hay, T., Cohn, I., Friedman, N., & Kupferman, R. (2010). Continuous-time belief propagation. In Proceedings of the Twenty-Seventh International Conference on Machine Learning.
-
(2010)
Proceedings of the Twenty-Seventh International Conference on Machine Learning
-
-
El-Hay, T.1
Cohn, I.2
Friedman, N.3
Kupferman, R.4
-
10
-
-
0009900351
-
Anomaly detection over noisy data using learned probability distributions
-
Eskin, E. (2000). Anomaly detection over noisy data using learned probability distributions. In International Conference on Machine Learning.
-
(2000)
International Conference on Machine Learning
-
-
Eskin, E.1
-
11
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Barbara, D., & Jajodia, S. (Eds.) Kluwer
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., & Stolfo, S. (2002). A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In Barbara, D., & Jajodia, S. (Eds.), Applications of Data Mining in Computer Security. Kluwer.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
14
-
-
0029716418
-
A sense of self for unix processes
-
Forrest, S., A.Hofmeyr, S., Somayaji, A., & A.Longstaff, T. (1996). A sense of self for unix processes. In IEEE Symposium on Security and Privacy, pp. 120-128.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, A.2
Somayaji, A.3
Longstaff, T.4
-
18
-
-
84944737204
-
Bayesian event classification for intrusion detection
-
Kruegel, C., Mutz, D., Robertson, W., & Valeur, F. (2003). Bayesian event classification for intrusion detection. In Annual Computer Security Applications Conference.
-
(2003)
Annual Computer Security Applications Conference
-
-
Kruegel, C.1
Mutz, D.2
Robertson, W.3
Valeur, F.4
-
19
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
Lakhina, A., Crovella, M., & Diot, C. (2005). Mining anomalies using traffic feature distributions. In ACM SIGCOMM, pp. 21-26.
-
(2005)
ACM SIGCOMM
, pp. 21-26
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
20
-
-
32344452166
-
A compare study of anomaly detection schemes in network intrusion detection
-
Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., & Srivastava, J. (2003). A compare study of anomaly detection schemes in network intrusion detection. In SIAM International Conference on Data Mining.
-
(2003)
SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
22
-
-
0036358995
-
The spectrum kernel: A string kernel for SVM protein classification
-
Leslie, C., Eskin, E., & Noble, W. S. (2002). The spectrum kernel: A string kernel for SVM protein classification. In Pacific Symposium on Biocomputing 7:566-575.
-
(2002)
Pacific Symposium on Biocomputing
, vol.7
, pp. 566-575
-
-
Leslie, C.1
Eskin, E.2
Noble, W.S.3
-
23
-
-
31844455702
-
Host-based detection of worms through peer to peer cooperation
-
Malan, D. J., & Smith, M. D. (2005). Host-based detection of worms through peer to peer cooperation. In Workshop on Rapid Malcode.
-
(2005)
Workshop on Rapid Malcode
-
-
Malan, D.J.1
Smith, M.D.2
-
25
-
-
14344265818
-
Internet traffic classification using Bayesian analysis techniques
-
Moore, A. W., & Zuev, D. (2005). Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS.
-
(2005)
ACM SIGMETRICS
-
-
Moore, A.W.1
Zuev, D.2
-
26
-
-
84880748714
-
Continuous time particle filtering
-
Ng, B., Pfeffer, A., & Dearden, R. (2005). Continuous time particle filtering. In National Conference on Artificial Intelligence, pp. 1360-1365.
-
(2005)
National Conference on Artificial Intelligence
, pp. 1360-1365
-
-
Ng, B.1
Pfeffer, A.2
Dearden, R.3
-
28
-
-
77956943618
-
Expectation propagation for continuous time Bayesian networks
-
Nodelman, U., Koller, D., & Shelton, C. R. (2005). Expectation propagation for continuous time Bayesian networks. In Uncertainty in Artificial Intelligence, pp. 431-440.
-
(2005)
Uncertainty in Artificial Intelligence
, pp. 431-440
-
-
Nodelman, U.1
Koller, D.2
Shelton, C.R.3
-
29
-
-
29344449098
-
-
Nodelman, U., Shelton, C. R., & Koller, D. (2002). Continuous time Bayesian networks. In Uncertainty in Artificial Intelligence, pp. 378-387.
-
(2002)
Continuous Time Bayesian Networks, Uncertainty in Artificial Intelligence
, pp. 378-387
-
-
Nodelman, U.1
Shelton, C.R.2
Koller, D.3
-
30
-
-
33749257956
-
Learning continuous time Bayesian networks
-
Nodelman, U., Shelton, C. R., & Koller, D. (2003). Learning continuous time Bayesian networks. In Uncertainty in Artificial Intelligence, pp. 451-458.
-
(2003)
Uncertainty in Artificial Intelligence
, pp. 451-458
-
-
Nodelman, U.1
Shelton, C.R.2
Koller, D.3
-
31
-
-
77958587560
-
Expectation maximization and complex duration distributions for continuous time Bayesian networks
-
Nodelman, U., Shelton, C. R., & Koller, D. (2005). Expectation maximization and complex duration distributions for continuous time Bayesian networks. In Uncertainty in Artificial Intelligence, pp. 421-430.
-
(2005)
Uncertainty in Artificial Intelligence
, pp. 421-430
-
-
Nodelman, U.1
Shelton, C.R.2
Koller, D.3
-
32
-
-
0004161838
-
-
(Second edition). Cambridge University Press
-
Press, W. H., Teukolsky, S. A., Vetterling, W. T., & Flannery, B. P. (1992). Numerical Recipes in C (Second edition). Cambridge University Press.
-
(1992)
Numerical Recipes in C
-
-
Press, W.H.1
Teukolsky, S.A.2
Vetterling, W.T.3
Flannery, B.P.4
-
34
-
-
33846910249
-
Language models for detection of unknown attacks in network traffic
-
Rieck, K., & Laskov, P. (2007). Language models for detection of unknown attacks in network traffic. In Journal in Computer Virology.
-
(2007)
Journal in Computer Virology
-
-
Rieck, K.1
Laskov, P.2
-
36
-
-
80053231942
-
CT-NOR: Representing and reasoning about events in continuous time
-
Simma, A., Goldszmidt, M., MacCormick, J., Barham, P., Black, R., Isaacs, R., & Mortier, R. (2008). CT-NOR: Representing and reasoning about events in continuous time. In Uncertainty in Artificial Intelligence.
-
(2008)
Uncertainty in Artificial Intelligence
-
-
Simma, A.1
Goldszmidt, M.2
MacCormick, J.3
Barham, P.4
Black, R.5
Isaacs, R.6
Mortier, R.7
-
37
-
-
33645813594
-
Flow classification by histogram
-
Soule, A., Salamatian, L., Taft, N., Emilion, R., & Papagiannali, K. (2004). Flow classification by histogram. In ACM SIGMETRICS.
-
(2004)
ACM SIGMETRICS
-
-
Soule, A.1
Salamatian, L.2
Taft, N.3
Emilion, R.4
Papagiannali, K.5
-
38
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
Soule, A., Salamatian, K., & Taft, N. (2005). Combining filtering and statistical methods for anomaly detection. In Internet Measurement Conference, pp. 331-344.
-
(2005)
Internet Measurement Conference
, pp. 331-344
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
40
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Warrender, C., Forrest, S., & Pearlmutter, B. (1999). Detecting intrusions using system calls: Alternative data models. In IEEE Symposium on Security and Privacy, IEEE Computer Society.
-
(1999)
IEEE Symposium on Security and Privacy, IEEE Computer Society
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
41
-
-
77956942179
-
Continuous time Bayesian networks for host level network intrusion detection
-
Xu, J., & Shelton, C. R. (2008). Continuous time Bayesian networks for host level network intrusion detection. In European Conference on Machine Learning.
-
(2008)
European Conference on Machine Learning
-
-
Xu, J.1
Shelton, C.R.2
-
42
-
-
33750375994
-
Profiling internet backbone traffic: Behavior models and applications
-
Xu, K., Zhang, Z.-L., & Bhattacharyya, S. (2005). Profiling internet backbone traffic: Behavior models and applications. In ACM SIGCOMM.
-
(2005)
ACM SIGCOMM
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
43
-
-
0036647172
-
Multivariate statistical analysis of audit trails for host-based intrusion detection.
-
Ye, N., Emran, S. M., Chen, Q., & Vilbert, S. (2002). Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions of Computers, 51(7), 810-820.
-
(2002)
IEEE Transactions of Computers
, vol.51
, Issue.7
, pp. 810-820
-
-
Ye, N.1
Emran, S.M.2
Chen, Q.3
Vilbert, S.4
-
45
-
-
78651413507
-
User profiling for intrusion detection using dynamic and static behavioral models
-
Yeung, D.-Y., & Ding, Y. (2002). User profiling for intrusion detection using dynamic and static behavioral models. Advances in Knowledge Discovery and Data Mining, 2336, 494-505.
-
(2002)
Advances in Knowledge Discovery and Data Mining
, vol.2336
, pp. 494-505
-
-
Yeung, D.-Y.1
Ding, Y.2
-
46
-
-
84869166587
-
Internet traffic classification using Bayesian analysis techniques
-
Zuev, D., & Moore, A. (2005). Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS.
-
(2005)
ACM SIGMETRICS
-
-
Zuev, D.1
Moore, A.2
|