-
1
-
-
15744370034
-
A taxonomy of network and computer attacks
-
DOI 10.1016/j.cose.2004.06.011, PII S0167404804001804
-
S. Hansman, R. Hunt, A taxonomy of network and computer attacks, in: Computers and Security, vol. 24, no. 1, pp. 31-43, 2005. (Pubitemid 40415398)
-
(2005)
Computers and Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
4
-
-
29844455221
-
What's new: Finding significant differences in network data streams
-
DOI 10.1109/TNET.2005.860096
-
G. Cormode, S. Muthukrishnan, What is new: finding significant differences in network data streams, in: IEEE Transactions on Networking, vol. 13 no. 6, 2005, pp. 1219-1232. (Pubitemid 43034131)
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.6
, pp. 1219-1232
-
-
Cormode, G.1
Muthukrishnan, S.2
-
5
-
-
84858709024
-
UNADA: Unsupervised network anomaly detection using sub-space outliers ranking
-
P. Casas, J. Mazel, P. Owezarski, UNADA: Unsupervised network anomaly detection using sub-space outliers ranking, in: IFIP Networking, 2011.
-
(2011)
IFIP Networking
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
8
-
-
77955469676
-
An Overview of IP Flow-Based Intrusion Detection
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller An Overview of IP Flow-Based Intrusion Detection IEEE Communications Surveys & Tutorials 12 3 2010
-
(2010)
IEEE Communications Surveys & Tutorials
, vol.12
, Issue.3
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
9
-
-
3042667688
-
Using decision trees to improve signature-based intrusion detection
-
C. Kruegel, T. Toth, Using decision trees to improve signature-based intrusion detection, in: Proceedings RAID, 2003.
-
(2003)
Proceedings RAID
-
-
Kruegel, C.1
Toth, T.2
-
10
-
-
84858700252
-
Effective value of decision tree with KDD99 intrusion detection datasets for IDS
-
J. Lee, H. Lee, S. Sohn, J. Ryu, T. Chung, Effective value of decision tree with KDD99 intrusion detection datasets for IDS, in: Proceedings ICACT, 2008.
-
(2008)
Proceedings ICACT
-
-
Lee, J.1
Lee, H.2
Sohn, S.3
Ryu, J.4
Chung, T.5
-
15
-
-
70349242099
-
Sensitivity of PCA for traffic anomaly detection
-
H. Ringberg, A. Soule, J. Rexford, C. Diot, Sensitivity of PCA for traffic anomaly detection, in: Proceedings ACM SIGMETRICS, 2007.
-
(2007)
Proceedings ACM SIGMETRICS
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
16
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multi-resolution statistical detection procedures
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, K. Cho, Extracting hidden anomalies using sketch and non gaussian multi-resolution statistical detection procedures, in: Proceedings ACM LSAD Workshop, 2007.
-
(2007)
Proceedings ACM LSAD Workshop
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
17
-
-
77950369345
-
Data clustering: 50 years beyond K-means
-
A.K. Jain Data clustering: 50 years beyond K-means Pattern Recognition Letters 31 8 2010 651 666
-
(2010)
Pattern Recognition Letters
, vol.31
, Issue.8
, pp. 651-666
-
-
Jain, A.K.1
-
18
-
-
17044376078
-
Subspace clustering for high dimensional data: A review
-
L. Parsons, E. Haque, and H. Liu Subspace clustering for high dimensional data: a review ACM SIGKDD Expl. Newsletter 6 1 2004 90 105
-
(2004)
ACM SIGKDD Expl. Newsletter
, vol.6
, Issue.1
, pp. 90-105
-
-
Parsons, L.1
Haque, E.2
Liu, H.3
-
21
-
-
33746860935
-
Unsupervised Anomaly detection in network intrusion detection using clustering
-
K. Leung, C. Leckie, Unsupervised Anomaly detection in network intrusion detection using clustering, in: Proceedings ACSC, 2005.
-
(2005)
Proceedings ACSC
-
-
Leung, K.1
Leckie, C.2
-
23
-
-
0000550189
-
A density-based algorithm for discovering clusters in large spatial databases with noise
-
M. Ester, P. Kriegel, J. Sander, X. Xu, A density-based algorithm for discovering clusters in large spatial databases with noise, in: Proceedings ACM SIGKDD, 1996.
-
(1996)
Proceedings ACM SIGKDD
-
-
Ester, M.1
Kriegel, P.2
Sander, J.3
Xu, X.4
|