-
1
-
-
84859017418
-
-
Technical Report, Department of Computer Engineering, Bilkent University February
-
Aksoy, S., "K-Nearest Neighbor Classifier and Distance Functions," Technical Report, Department of Computer Engineering, Bilkent University (February 2008)
-
(2008)
K-Nearest Neighbor Classifier and Distance Functions
-
-
Aksoy, S.1
-
2
-
-
0033344304
-
Neural data mining for credit card fraud detection
-
Brause, R., Langsdorf, T., and Hepp, M., "Neural data mining for credit card fraud detection," In Proceedings of IEEE International Conference on Tools with Artificial Intelligence, 1999, pp. 103-106
-
Proceedings of IEEE International Conference on Tools with Artificial Intelligence, 1999
, pp. 103-106
-
-
Brause, R.1
Langsdorf, T.2
Hepp, M.3
-
4
-
-
0036080023
-
Real-time object classication and novelty detection for collaborative video surveillance
-
IEEE, Honolulu, HI
-
Diehl, C. and Hampshire, J., "Real-time object classication and novelty detection for collaborative video surveillance", In Proceedings of IEEE International Joint Conference on Neural Networks, 2002 IEEE, Honolulu, HI
-
Proceedings of IEEE International Joint Conference on Neural Networks, 2002
-
-
Diehl, C.1
Hampshire, J.2
-
5
-
-
0003922190
-
-
Wiley-Interscience
-
Duda, R. O., Hart, P. E., and Stork, D. G., Pattern Classification (2nd Edition). Wiley-Interscience, 2000
-
(2000)
Pattern Classification (2nd Edition)
-
-
Duda, R.O.1
Hart, P.E.2
Stork, D.G.3
-
6
-
-
0142095474
-
Using artificial anomalies to detect unknown and known network intrusions
-
IEEE Computer Society
-
Fan, W., Miller, M., Stolfo, S. J., Lee, W., and Chan, P. K., "Using artificial anomalies to detect unknown and known network intrusions", In Proceedings of the 2001 IEEE International Conference on Data Mining. IEEE Computer Society, pp. 123-130
-
Proceedings of the 2001 IEEE International Conference on Data Mining
, pp. 123-130
-
-
Fan, W.1
Miller, M.2
Stolfo, S.J.3
Lee, W.4
Chan, P.K.5
-
7
-
-
24944557601
-
-
He, Z., Xu, X., Huang, J. Z., and Deng, S., "A frequent pattern discovery method for outlier detection", 2004, pp. 726-732
-
(2004)
A Frequent Pattern Discovery Method for Outlier Detection
, pp. 726-732
-
-
He, Z.1
Xu, X.2
Huang, J.Z.3
Deng, S.4
-
8
-
-
85015336184
-
Intelligent agents for intrusion detection
-
Helmer, G., Wong, J., Honavar, V., and Miller, L., "Intelligent agents for intrusion detection", In Proceedings of IEEE Information Technology Conference, 1998. pp. 121-124
-
Proceedings of IEEE Information Technology Conference, 1998
, pp. 121-124
-
-
Helmer, G.1
Wong, J.2
Honavar, V.3
Miller, L.4
-
9
-
-
70349681015
-
Robust anomaly detection using support vector machines
-
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
-
Hu, W., Liao, Y., and Vemuri, V. R., "Robust anomaly detection using support vector machines", In Proceedings of the International Conference on Machine Learning, 2003 Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, pp. 282-289
-
(2003)
Proceedings of the International Conference on Machine Learning
, pp. 282-289
-
-
Hu, W.1
Liao, Y.2
Vemuri, V.R.3
-
10
-
-
34247492538
-
Outlier detection in wireless sensor networks using bayesian belief networks
-
Janakiram, D., Reddy, V., and Kumar, A., "Outlier detection in wireless sensor networks using bayesian belief networks", In First International Conference on Communication System Software and Middleware, 2006, pp.1-6
-
First International Conference on Communication System Software and Middleware, 2006
, pp. 1-6
-
-
Janakiram, D.1
Reddy, V.2
Kumar, A.3
-
11
-
-
0002774999
-
Learning patterns from Unix process execution traces for intrusion detection
-
Lee, W., Stolfo, S., and Chan, P., "Learning patterns from Unix process execution traces for intrusion detection", In Proceedings of the AAAI 97 workshop on AI methods in Fraud and risk management,1997.
-
Proceedings of the AAAI 97 Workshop on AI Methods in Fraud and Risk Management,1997
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
-
12
-
-
85084163349
-
Data mining approaches for intrusion detection
-
Lee, W. and Stolfo, S., "Data mining approaches for intrusion detection", In Proceedings of the 7th USENIX Security Symposium, 1998, San Antonio, TX.
-
Proceedings of the 7th USENIX Security Symposium, 1998, San Antonio, TX
-
-
Lee, W.1
Stolfo, S.2
-
13
-
-
0034455983
-
Adaptive intrusion detection: A data mining approach
-
Lee, W., Stolfo, S. J., and Mok, K. W., "Adaptive intrusion detection: A data mining approach," Artificial Intelligence Review, 2000 14, 6, pp. 533-567
-
(2000)
Artificial Intelligence Review
, vol.14
, Issue.6
, pp. 533-567
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
14
-
-
0242456801
-
Learning nonstationary models of normal network traffic for detecting novel attacks
-
ACM Press
-
Mahoney, M. V. and Chan, P. K., "Learning nonstationary models of normal network traffic for detecting novel attacks," In Proceedings of the 8th ACM SIGKDD international conference on Knowledge discovery and data mining, 2002, ACM Press, pp. 376-385.
-
Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002
, pp. 376-385
-
-
Mahoney, M.V.1
Chan, P.K.2
-
15
-
-
78149297786
-
Learning rules for anomaly detection of hostile network traffic
-
IEEE Computer Society
-
Mahoney, M. V. and Chan, P. K., "Learning rules for anomaly detection of hostile network traffic"' In Proceedings of the 3rd IEEE International Conference on Data Mining, 2003, IEEE Computer Society, pp. 601.
-
Proceedings of the 3rd IEEE International Conference on Data Mining, 2003
, pp. 601
-
-
Mahoney, M.V.1
Chan, P.K.2
-
16
-
-
11844281602
-
-
Tech. Rep. CS-2003-06, Department of Computer Science, Florida Institute of Technology Melbourne FL 32901. March
-
Mahoney, M. V., Chan, P. K., and Arshad, M. H., "A machine learning approach to anomaly detection", Tech. Rep. CS-2003-06, Department of Computer Science, Florida Institute of Technology Melbourne FL 32901. March 2003
-
(2003)
A Machine Learning Approach to Anomaly Detection
-
-
Mahoney, M.V.1
Chan, P.K.2
Arshad, M.H.3
-
17
-
-
9444275837
-
Probabilistic networks with undirected links for anomaly detection
-
Mingming, N. Y., "Probabilistic networks with undirected links for anomaly detection", In Proceedings of IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop 2000, pp. 175-179.
-
Proceedings of IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop 2000
, pp. 175-179
-
-
Mingming, N.Y.1
-
19
-
-
0036085392
-
Intrusion detection: Support vector machines and neural networks
-
Mukkamala S, Janoski GH, "Intrusion detection: support vector machines and neural networks", In Proceedings of the IEEE international joint conference on neural networks, Honolulu, USA; 2002, pp. 1702-07
-
Proceedings of the IEEE International Joint Conference on Neural Networks, Honolulu, USA; 2002
, pp. 1702-1707
-
-
Mukkamala, S.1
Janoski, G.H.2
-
20
-
-
77952369044
-
Towards nic-based intrusion detection
-
ACM Press, New York, NY, USA
-
Otey, M., Parthasarathy, S., Ghoting, A., Li, G., Narravula, S., and Panda, D., "Towards nic-based intrusion detection," In Proceedings of the 9th ACM SIGKDD international conference on Knowledge discovery and data mining, 2003, ACM Press, New York, NY, USA, pp. 723-728
-
Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003
, pp. 723-728
-
-
Otey, M.1
Parthasarathy, S.2
Ghoting, A.3
Li, G.4
Narravula, S.5
Panda, D.6
-
22
-
-
0036709275
-
Constructing boosting algorithms from svms: An application to oneclass classification
-
Ratsch, G., Mika, S., Scholkopf, B., and Muller, K.R., "Constructing boosting algorithms from svms: An application to oneclass classification", IEEE Transactions on Pattern Analysis and Machine Intelligence 24, 9, 2002, pp. 1184-1199.
-
(2002)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.24
, Issue.9
, pp. 1184-1199
-
-
Ratsch, G.1
Mika, S.2
Scholkopf, B.3
Muller, K.R.4
-
23
-
-
33646353334
-
Outlier detection with one-class kernel fisher discriminants
-
Roth, V., "Outlier detection with one-class kernel fisher discriminants", In NIPS 2004.
-
(2004)
NIPS
-
-
Roth, V.1
-
24
-
-
33645717587
-
Kernel fisher discriminants for outlier detection
-
Roth, V., "Kernel fisher discriminants for outlier detection", Neural Computation 18, 4, 2006, pp. 942-960.
-
(2006)
Neural Computation
, vol.18
, Issue.4
, pp. 942-960
-
-
Roth, V.1
-
25
-
-
0036881508
-
Robust support vector machine with bullet hole image classification
-
Song, Q., Hu, W., and Xie, W., "Robust support vector machine with bullet hole image classification", IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews,2002, 32, 4.
-
(2002)
IEEE Transactions on Systems, Man, and Cybernetics-Part C: Applications and Reviews
, vol.32
, pp. 4
-
-
Song, Q.1
Hu, W.2
Xie, W.3
-
26
-
-
0033734375
-
To reject or not to reject: That is the question-an answer in case of neural classifiers
-
Stefano, C., Sansone, C., and Vento, M., "To reject or not to reject: that is the question-an answer in case of neural classifiers", IEEE Transactions on Systems, Management and Cybernetics 30, 2000, 1, pp. 84-94.
-
(2000)
IEEE Transactions on Systems, Management and Cybernetics
, vol.30
, Issue.1
, pp. 84-94
-
-
Stefano, C.1
Sansone, C.2
Vento, M.3
-
27
-
-
25144439604
-
-
Addison-Wesley
-
Tan, P.N., Steinbach, M., and Kumar, V., "Introduction to Data Mining", Addison-Wesley, 2005.
-
(2005)
Introduction to Data Mining
-
-
Tan, P.N.1
Steinbach, M.2
Kumar, V.3
-
28
-
-
0003450542
-
-
Springer-Verlag New York, Inc., New York, NY, USA
-
Vapnik, V. N., "The nature of statistical learning theory", Springer-Verlag New York, Inc., 1995, New York, NY, USA
-
(1995)
The Nature of Statistical Learning Theory
-
-
Vapnik, V.N.1
-
30
-
-
0141723181
-
-
KDD Cup 1999 Data, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html.
-
KDD Cup 1999 Data
-
-
|