-
1
-
-
84965063004
-
An inequality with applications to statistical estimation for probabilistic function of a Markov process and to a model for ecology
-
L. Baum, and J. Egon An inequality with applications to statistical estimation for probabilistic function of a Markov process and to a model for ecology Bulletin American Metereology Society 73 1967 360 363
-
(1967)
Bulletin American Metereology Society
, vol.73
, pp. 360-363
-
-
Baum, L.1
Egon, J.2
-
2
-
-
84972571328
-
Growth functions for transformations on manifolds
-
L. Baum, and G. Sell Growth functions for transformations on manifolds Pacific Journal of Mathematics 27 2 1968 211 227
-
(1968)
Pacific Journal of Mathematics
, vol.27
, Issue.2
, pp. 211-227
-
-
Baum, L.1
Sell, G.2
-
3
-
-
0000353178
-
A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains
-
L. Baum, T. Petrie, G. Soules, and N. Weiss A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains The Annals of Mathematical Statistics 41 1 1970 164 171
-
(1970)
The Annals of Mathematical Statistics
, vol.41
, Issue.1
, pp. 164-171
-
-
Baum, L.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
4
-
-
58349121261
-
Adversarial pattern classification using multiple classifiers and randomisation
-
SSPR/SPR
-
B. Biggio, G. Fumera, and F. Roli Adversarial pattern classification using multiple classifiers and randomisation N. da Vitoria Lobo, T. Kasparis, F. Roli, JT.-Y. Kwok, M. Georgiopoulos, G.C. Anagnostopoulos, M. Loog, SSPR/SPR Lecture notes in computer science vol. 5342 2008 Springer 500 509
-
(2008)
Lecture Notes in Computer Science
, vol.5342
, pp. 500-509
-
-
Biggio, B.1
Fumera, G.2
Roli, F.3
-
5
-
-
70349319703
-
Multiple classifier systems for adversarial classification tasks
-
MCS
-
A. Biggio, G. Fumera, and F. Roli Multiple classifier systems for adversarial classification tasks J.A. Benediktsson, J. Kittler, F. Roli, MCS Lecture notes in computer science vol. 5519 2009 Springer 132 141
-
(2009)
Lecture Notes in Computer Science
, vol.5519
, pp. 132-141
-
-
Biggio, A.1
Fumera, G.2
Roli, F.3
-
6
-
-
0031191630
-
The use of the area under the ROC curve in the evaluation of machine learning algorithms
-
PII S0031320396001422
-
A.P. Bradley The use of the area under the roc curve in the evaluation of machine learning algorithms Pattern Recognition 30 7 1997 1145 1159 (Pubitemid 127406521)
-
(1997)
Pattern Recognition
, vol.30
, Issue.7
, pp. 1145-1159
-
-
Bradley, A.P.1
-
8
-
-
79955470920
-
-
Breach Security Inc
-
Breach Security Inc WebDefend November 2009 http://www.breach.com/ products/webdefend.html
-
(2009)
WebDefend
-
-
-
9
-
-
21144432658
-
Two sophisticated techniques to improve HMM-based intrusion detection systems
-
RAID
-
S.-B. Cho, and S.-J. Han Two sophisticated techniques to improve HMM-based intrusion detection systems G. Vigna, E. Jonsson, C. Krügel, RAID Lecture notes in computer science vol. 2820 2003 Springer 207 219
-
(2003)
Lecture Notes in Computer Science
, vol.2820
, pp. 207-219
-
-
Cho, S.-B.1
Han, S.-J.2
-
10
-
-
79955463417
-
-
Citrix Systems Inc
-
Citrix Systems Inc Netscaler application firewall November 2009 http://www.citrix.com/English/PS2/products/product.asp?contentID=25636
-
(2009)
Netscaler Application Firewall
-
-
-
12
-
-
67349154442
-
Information fusion for computer security: State of the art and open issues
-
I. Corona, G. Giacinto, C. Mazzariello, F. Roli, and C. Sansone Information fusion for computer security: state of the art and open issues Information Fusion 10 2009 274 284
-
(2009)
Information Fusion
, vol.10
, pp. 274-284
-
-
Corona, I.1
Giacinto, G.2
Mazzariello, C.3
Roli, F.4
Sansone, C.5
-
14
-
-
0028911698
-
Gauging similarity with n-grams: Language-independent categorization of text
-
M. Damashek Gauging similarity with n-grams: language-independent categorization of text Science 267 5199 1995 843 848
-
(1995)
Science
, vol.267
, Issue.5199
, pp. 843-848
-
-
Damashek, M.1
-
16
-
-
80053403826
-
Ensemble methods in machine learning
-
Multiple classifier systems
-
T.G. Dietterich Ensemble methods in machine learning J. Kittler, F. Roli, Multiple classifier systems Lecture notes in computer science vol. 1857 2000 Springer 1 15
-
(2000)
Lecture Notes in Computer Science
, vol.1857
, pp. 1-15
-
-
Dietterich, T.G.1
-
19
-
-
79955470570
-
-
F5 Networks Inc
-
F5 Networks Inc BIG-IP application security manager November 2009 http://www.f5.com/products/big-ip/product-modules/application-security-manager. html
-
(2009)
BIG-IP Application Security Manager
-
-
-
20
-
-
77954790951
-
Using artificial anomalies to detect unknown and known network intrusions
-
W. Fan, M. Miller, S. Stolfo, W. Lee, and P. Chan Using artificial anomalies to detect unknown and known network intrusions Knowledge and Information Systems 6 5 2004 507 527
-
(2004)
Knowledge and Information Systems
, vol.6
, Issue.5
, pp. 507-527
-
-
Fan, W.1
Miller, M.2
Stolfo, S.3
Lee, W.4
Chan, P.5
-
22
-
-
67649202948
-
Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance
-
D. Gao, M. Reiter, and D. Song Beyond output voting: detecting compromised replicas using HMM-based behavioral distance IEEE Transactions on Dependable and Secure Computing 6 2 2009 96 110
-
(2009)
IEEE Transactions on Dependable and Secure Computing
, vol.6
, Issue.2
, pp. 96-110
-
-
Gao, D.1
Reiter, M.2
Song, D.3
-
23
-
-
79955465912
-
-
Ghmm: General Hidden Markov Model library
-
Ghmm: General Hidden Markov Model library, http://ghmm.org/.
-
-
-
-
25
-
-
38149142569
-
Comparing anomaly detection techniques for HTTP
-
RAID
-
K.L. Ingham, and H. Inoue Comparing anomaly detection techniques for HTTP C. Krügel, R. Lippmann, A. Clark, RAID Lecture notes in computer science vol. 4637 2007 Springer 42 62
-
(2007)
Lecture Notes in Computer Science
, vol.4637
, pp. 42-62
-
-
Ingham, K.L.1
Inoue, H.2
-
26
-
-
79955485242
-
-
Internet Security Systems IBM Global Technology Services
-
Internet Security Systems IBM-ISS, X-force 2009 trend and risk report Tech. rep. 2010 IBM Global Technology Services
-
(2010)
IBM-ISS, X-force 2009 Trend and Risk Report
-
-
-
32
-
-
79955464790
-
-
Libpcap: Network programming library
-
Libpcap: Network programming library, http://www.tcpdump.org.
-
-
-
-
33
-
-
0034301517
-
The 1999 darpa off-line intrusion detection evaluation
-
R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, and K. Das The 1999 darpa off-line intrusion detection evaluation Computer Networks 34 4 2000 579 595 [recent Advances in Intrusion Detection Systems]
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
34
-
-
76649142367
-
Protecting a moving target: Addressing web application concept drift
-
RAID
-
F. Maggi, W.K. Robertson, C. Krügel, and G. Vigna Protecting a moving target: addressing web application concept drift E. Kirda, S. Jha, D. Balzarotti, RAID Lecture notes in computer Science vol. 5758 2009 Springer 21 40
-
(2009)
Lecture Notes in Computer Science
, vol.5758
, pp. 21-40
-
-
Maggi, F.1
Robertson, W.K.2
Krügel, C.3
Vigna, G.4
-
36
-
-
79955483154
-
Programming with libpcap - Sniffing the network from our own application
-
L. MartinGarcia Programming with libpcap - sniffing the network from our own application Hakin9 Magazine February 2008 http://recursos.aldabaknocking. com/libpcapHakin9LuisMartinGarcia.pdf
-
(2008)
Hakin9 Magazine
-
-
Martingarcia, L.1
-
37
-
-
74049102282
-
English shellcode
-
ACM New York, NY, USA
-
J. Mason, S. Small, F. Monrose, and G. MacManus English shellcode CCS'09: proceedings of the 16th ACM conference on computer and communications security 2009 ACM New York, NY, USA 524-533
-
(2009)
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Mason, J.1
Small, S.2
Monrose, F.3
MacManus, G.4
-
38
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory
-
J. McHugh Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln laboratory ACM Transactions on Information and System Security 3 4 2000 262 294
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
39
-
-
60349101742
-
Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
-
DOI 10.1109/ICDM.2006.165, 4053075, Proceedings - Sixth International Conference on Data Mining, ICDM 2006
-
R. Perdisci, G. Gu, and W. Lee Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems Data Mining ICDM'06. Sixth international conference on, 2006 2006 488 498 (Pubitemid 47485828)
-
(2007)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 488-498
-
-
Perdisci, R.1
Gu, O.2
Lee, W.3
-
40
-
-
61749083929
-
Mcpad: A multiple classifier system for accurate payload-based anomaly detection
-
R. Perdisci, D. Ariu, P. Fogla, G. Giacinto, and W. Lee Mcpad: a multiple classifier system for accurate payload-based anomaly detection Computer Networks 53 6 2009 864 881 [Special Issue on Traffic Classification and Its Applications to Modern Networks]
-
(2009)
Computer Networks
, vol.53
, Issue.6
, pp. 864-881
-
-
Perdisci, R.1
Ariu, D.2
Fogla, P.3
Giacinto, G.4
Lee, W.5
-
41
-
-
0024610919
-
A tutorial on Hidden Markov Models and selected applications in speech recognition
-
L. Rabiner A tutorial on Hidden Markov Models and selected applications in speech recognition Proceedings of the IEEE 77 2 1989 257 286
-
(1989)
Proceedings of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
42
-
-
79955464675
-
-
RFC 2616-Hypertext Transfer Protocol - HTTP/1.1, 1999
-
RFC 2616-Hypertext Transfer Protocol - HTTP/1.1, 1999.
-
-
-
-
44
-
-
85084162112
-
Toward instrumenting network warfare competitions to generate labeled datasets
-
USENIX
-
B. Sangster, T. O'Connor, T. Cook, R. Fanelli, E. Dean, and J. Adams Toward instrumenting network warfare competitions to generate labeled datasets Security's workshop on cyber security experimentation and test (CSET) 2009 USENIX
-
(2009)
Security's Workshop on Cyber Security Experimentation and Test (CSET)
-
-
Sangster, B.1
O'Connor, T.2
Cook, T.3
Fanelli, R.4
Dean, E.5
Adams, J.6
-
45
-
-
85180633963
-
Spectrogram: A mixture-of-Markov-chains model for anomaly detection in web traffic
-
The Internet Society
-
Y. Song, A.D. Keromytis, and S.J. Stolfo Spectrogram: a mixture-of-Markov-chains model for anomaly detection in web traffic NDSS 2009 The Internet Society
-
(2009)
NDSS
-
-
Song, Y.1
Keromytis, A.D.2
Stolfo, S.J.3
-
47
-
-
48149094330
-
Dynamic score selection for fusion of multiple biometric matchers
-
R. Tronci, G. Giacinto, and F. Roli Dynamic score selection for fusion of multiple biometric matchers R. Cucchiara, ICIAP, IEEE computer Society 2007 15 22
-
(2007)
ICIAP, IEEE Computer Society
, pp. 15-22
-
-
Tronci, R.1
Giacinto, G.2
Roli, F.3
-
49
-
-
33745641552
-
Anomalous payload-based worm detection and signature generation
-
Recent Advances in Intrusion Detection - 8th International Symposium, RAID 2005, Revised Papers
-
K. Wang, G.F. Cretu, and S.J. Stolfo Anomalous payload-based worm detection and signature generation A. Valdes, D. Zamboni, RAID Lecture notes in computer science vol. 3858 2005 Springer 227 246 (Pubitemid 43973730)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3858 LNCS
, pp. 227-246
-
-
Wang, K.1
Cretu, G.2
Stolfo, S.J.3
-
50
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
K. Wang, J.J. Parekh, and S.J. Stolfo Anagram: a content anomaly detector resistant to mimicry attack D. Zamboni, C. Krügel, RAID Lecture notes in computer science vol. 4219 2006 Springer 226 248 (Pubitemid 44617855)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219 LNCS
, pp. 226-248
-
-
Wang, K.1
Parekh, J.J.2
Stolfo, S.J.3
|