-
2
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
C. Krügel, T. Toth, and E. Kirda, "Service specific anomaly detection for network intrusion detection," in Proc. of the ACM symposium on Applied computing (SAC), 2002, pp. 201-208.
-
(2002)
Proc. of the ACM Symposium on Applied Computing (SAC)
, pp. 201-208
-
-
Krügel, C.1
Toth, T.2
Kirda, E.3
-
3
-
-
84944222170
-
Analysis and results of the 1999 darpa off-line intrusion detection evaluation
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, "Analysis and results of the 1999 darpa off-line intrusion detection evaluation," in Recent Advances in Intrusion Detection, 2000, pp. 162-182.
-
(2000)
Recent Advances in Intrusion Detection
, pp. 162-182
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
4
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
J. McHugh, A. Christie, and J. Allen, "Defending yourself: The role of intrusion detection systems," IEEE Software, vol. 17, no. 5, pp. 42-51, 2000.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 42-51
-
-
McHugh, J.1
Christie, A.2
Allen, J.3
-
5
-
-
60349101742
-
Using an ensemble of oneclass svm classifiers to harden payload-based anomaly detection systems
-
R. Perdisci, G. Gu, and W. Lee, "Using an ensemble of oneclass svm classifiers to harden payload-based anomaly detection systems," in Proc. of the IEEE International Conference on Data Mining (ICDM), 2006, pp. 488-498.
-
(2006)
Proc. of the IEEE International Conference on Data Mining (ICDM)
, pp. 488-498
-
-
Perdisci, R.1
Gu, G.2
Lee, W.3
-
6
-
-
0023294428
-
An intrusion detection model
-
D. E. Denning, "An intrusion detection model," IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 222-232, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
8
-
-
0038663185
-
Intrusion detection with unlabeled data using clustering
-
L. Portnoy, E. Eskin, and S. Stolfo, "Intrusion detection with unlabeled data using clustering," in Proc. of ACM CSS Workshop on Data Mining Applied to Security (DMSA), 2001, pp. 5-8.
-
(2001)
Proc. of ACM CSS Workshop on Data Mining Applied to Security (DMSA)
, pp. 5-8
-
-
Portnoy, L.1
Eskin, E.2
Stolfo, S.3
-
9
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
D. Barbara and S. Jajodia, Eds. Kluwer
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data," in Applications of Data Mining in Computer Security, D. Barbara and S. Jajodia, Eds. Kluwer, 2002, pp. 77-99.
-
(2002)
Applications of Data Mining in Computer Security
, pp. 77-99
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
10
-
-
35048885009
-
Anomalous payload-based network intrusion detection
-
K. Wang and S. J. Stolfo, "Anomalous payload-based network intrusion detection," in RAID, 2004, pp. 203-222.
-
(2004)
RAID
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
12
-
-
0142095474
-
Using artificial anomalies to detect unknown and known network intrusions
-
W. Fan, M. Miller, S. J. Stolfo, W. Lee and P. K. Chan, "Using artificial anomalies to detect unknown and known network intrusions," in Proc. of the IEEE International Conference on Data Mining (ICDM), 2001, pp. 123-130.
-
(2001)
Proc. of the IEEE International Conference on Data Mining (ICDM)
, pp. 123-130
-
-
Fan, W.1
Miller, M.2
Stolfo, S.J.3
Lee, W.4
Chan, P.K.5
-
16
-
-
0035402112
-
Probabilistic techniques for intrusion detection based on computer audit data
-
N. Ye, X. Li, Q. Chen, S. M. Erman and M. Xu, "Probabilistic techniques for intrusion detection based on computer audit data," IEEE Transactions on Systems, Man, and Cybernetics- Part A, vol. 31, no. 4, pp. 266-274, 2001.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics- Part A
, vol.31
, Issue.4
, pp. 266-274
-
-
Ye, N.1
Li, X.2
Chen, Q.3
Erman, S.M.4
Xu, M.5
-
19
-
-
0038330235
-
Fusion of multiple classifiers for intrusion detection in computer networks
-
G. Gacinto, F. Roli and L. Didaci, "Fusion of multiple classifiers for intrusion detection in computer networks," Pattern Recognition Letters, vol. 24, pp. 1795-1803, 2003.
-
(2003)
Pattern Recognition Letters
, vol.24
, pp. 1795-1803
-
-
Gacinto, G.1
Roli, F.2
Didaci, L.3
-
20
-
-
56749164058
-
Tcm-knn scheme for network anomaly detection using feature-based optimizations
-
Y. Li and L. Guo, "Tcm-knn scheme for network anomaly detection using feature-based optimizations," in Proc. of the ACM symposium on Applied computing (SAC), 2008, pp. 2103-2109.
-
(2008)
Proc. of the ACM Symposium on Applied Computing (SAC)
, pp. 2103-2109
-
-
Li, Y.1
Guo, L.2
-
22
-
-
67650370037
-
A hybrid feature extraction selection approach for high-dimensional nongaussian data clustering
-
S. Boutemedjet, N. Bouguila, and D. Ziou, "A hybrid feature extraction selection approach for high-dimensional nongaussian data clustering," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 31, no. 9, pp. 1429-1443, 2009.
-
(2009)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.31
, Issue.9
, pp. 1429-1443
-
-
Boutemedjet, S.1
Bouguila, N.2
Ziou, D.3
-
23
-
-
0031192274
-
A statistically based system for prioritizing information exploration under uncertainity
-
P. Helman and J. Bhangoo, "A statistically based system for prioritizing information exploration under uncertainity," IEEE Transactions on Systems, Man, and Cybernetics - Part A, vol. 27, no. 4, pp. 449-466, 1997.
-
(1997)
IEEE Transactions on Systems, Man, and Cybernetics - Part A
, vol.27
, Issue.4
, pp. 449-466
-
-
Helman, P.1
Bhangoo, J.2
-
24
-
-
4344602134
-
Simultaneous feature selection and clustering using mixture models
-
M. H. C. Law, M. A. T. Figueiredo, and A. K. Jain, "Simultaneous feature selection and clustering using mixture models," IEEE Trans. Pattern Anal. Mach. Intell, pp. 1154-1166, 2004.
-
(2004)
IEEE Trans. Pattern Anal. Mach. Intell
, pp. 1154-1166
-
-
Law, M.H.C.1
Figueiredo, M.A.T.2
Jain, A.K.3
-
25
-
-
64849084369
-
Simultaneous localized feature selection and model detection for gaussian mixtures
-
May
-
Y. Li, M. dong, and J. Hua, "Simultaneous localized feature selection and model detection for gaussian mixtures," IEEE Trans. Pattern Anal. Mach. Intell., vol. 31, pp. 953-960, May 2009.
-
(2009)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.31
, pp. 953-960
-
-
Li, Y.1
Dong, M.2
Hua, J.3
-
27
-
-
0042685161
-
Bayesian parameter estimation via variational methods
-
January
-
T. S. Jaakkola and M. I. Jordan, "Bayesian parameter estimation via variational methods," Statistics and Computing, vol. 10, pp. 25-37, January 2000.
-
(2000)
Statistics and Computing
, vol.10
, pp. 25-37
-
-
Jaakkola, T.S.1
Jordan, M.I.2
-
28
-
-
33645957324
-
Bayesian feature and model selection for gaussian mixture models
-
June
-
C. Constantinopoulos, M. K. Titsias, and A. Likas, "Bayesian feature and model selection for gaussian mixture models," IEEE Trans. Pattern Anal. Mach. Intell., vol. 28, pp. 1013-1018, June 2006.
-
(2006)
IEEE Trans. Pattern Anal. Mach. Intell.
, vol.28
, pp. 1013-1018
-
-
Constantinopoulos, C.1
Titsias, M.K.2
Likas, A.3
|