-
1
-
-
0001882616
-
Fast algorithms for mining association rules in large databases
-
In: Bocca, J. B., Jarke, M., Zaniolo, C. (eds.), Morgan Kaufmann
-
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: Bocca, J. B., Jarke, M., Zaniolo, C. (eds.) In: Proceedings of the 20th International Conference on VLDB, pp. 487-499. Morgan Kaufmann (1994).
-
(1994)
Proceedings of the 20th International Conference on VLDB
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
2
-
-
33947501709
-
Novelty detection and management to safeguard information-intensive critical infrastructures
-
Balducelli C., Lavalle L., Vicoli G.: Novelty detection and management to safeguard information-intensive critical infrastructures. Int. J. Emerg. Manag. 4(1), 88-103 (2007).
-
(2007)
Int. J. Emerg. Manag.
, vol.4
, Issue.1
, pp. 88-103
-
-
Balducelli, C.1
Lavalle, L.2
Vicoli, G.3
-
3
-
-
15544363043
-
Principle components and importance ranking of distributed anomalies
-
Begnum K., Burgess M.: Principle components and importance ranking of distributed anomalies. Mach. Learn. 58, 217-230 (2005).
-
(2005)
Mach. Learn.
, vol.58
, pp. 217-230
-
-
Begnum, K.1
Burgess, M.2
-
4
-
-
48249129248
-
Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness
-
John Hill, L. T. C. (ed.), IEEE Press
-
Bellettini, C., Rrushi, J.: Vulnerability analysis of SCADA protocol binaries through detection of memory access taintedness. In: John Hill, L. T. C. (ed.) Proceedings of 8th IEEE SMC Information Assurance Workshop, pp. 341-348. IEEE Press (2007).
-
(2007)
Proceedings of 8th IEEE SMC Information Assurance Workshop
, pp. 341-348
-
-
Bellettini, C.1
Rrushi, J.2
-
5
-
-
33847767196
-
Safeguarding SCADA systems with anomaly detection
-
LNCS 2776, Springer
-
Bigham J., Gamez D., Lu, N.: Safeguarding SCADA systems with anomaly detection. In: Proceedings of 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security, LNCS 2776, pp. 171-182. Springer (2003).
-
(2003)
Proceedings of 2nd International Workshop on Mathematical Methods, Models and Architectures for Computer Network Security
, pp. 171-182
-
-
Bigham, J.1
Gamez, D.2
Lu, N.3
-
6
-
-
84864401107
-
Profiling high frequency accident locations using association rules
-
Washington DC (USA), Transportation Research Board
-
Brijs, T., Geurts, K., Wets, G., Vanhoof, K.: Profiling high frequency accident locations using association rules. In: Proceedings of 82nd Annual Transportation Research Board, Washington DC (USA), pp. 123-130. Transportation Research Board (2003).
-
(2003)
Proceedings of 82nd Annual Transportation Research Board
, pp. 123-130
-
-
Brijs, T.1
Geurts, K.2
Wets, G.3
Vanhoof, K.4
-
7
-
-
28244494064
-
MAFIA: A maximal frequent itemset algorithm
-
Burdick D., Calimlim M., Flannick J., Gehrke J., Yiu T.: MAFIA: A maximal frequent itemset algorithm. IEEE Trans. Knowl. Data Eng. 17, 1490-1504 (2005).
-
(2005)
IEEE Trans. Knowl. Data Eng.
, vol.17
, pp. 1490-1504
-
-
Burdick, D.1
Calimlim, M.2
Flannick, J.3
Gehrke, J.4
Yiu, T.5
-
8
-
-
27944494969
-
Towards discovery of event correlation rules
-
Burns, L., Hellerstein, J. L., Ma, S., Perng, C. S., Rabenhorst, D. A., Taylor, D. J.: Towards discovery of event correlation rules. In: Proceedings of IEEE/IFIP International Symposium on Integrated Network Management, pp. 345-359 (2001).
-
(2001)
Proceedings of IEEE/IFIP International Symposium on Integrated Network Management
, pp. 345-359
-
-
Burns, L.1
Hellerstein, J.L.2
Ma, S.3
Perng, C.S.4
Rabenhorst, D.A.5
Taylor, D.J.6
-
10
-
-
84864418137
-
-
(eds.), Florida, USA, of CEUR Workshop Proceedings
-
Goethals, B., Zaki, M. (eds.): FIMI '03, Frequent itemset mining implementations, Florida, USA, vol. 90 of CEUR Workshop Proceedings (2003).
-
(2003)
FIMI '03, Frequent itemset mining implementations
, pp. 90
-
-
Goethals, B.1
Zaki, M.2
-
11
-
-
27644510774
-
Fast algorithms for frequent itemset mining using FP-Trees
-
Grahne G., Zhu J.: Fast algorithms for frequent itemset mining using FP-Trees. IEEE Trans. Knowl. Data Eng. 17, 1347-1362 (2005).
-
(2005)
IEEE Trans. Knowl. Data Eng.
, vol.17
, pp. 1347-1362
-
-
Grahne, G.1
Zhu, J.2
-
13
-
-
0036997440
-
Discovering actionable patterns in event data
-
Hellerstein J. L., Ma S., Perng C.-S.: Discovering actionable patterns in event data. IBM Syst. J. 41, 475-493 (2002).
-
(2002)
IBM Syst. J.
, vol.41
, pp. 475-493
-
-
Hellerstein, J.L.1
Ma, S.2
Perng, C.-S.3
-
14
-
-
84864405337
-
An ontology for identifying cyber intrusion induced faults in process control systems
-
C. Palmer and S. Shenoi (Eds.), Boston: Springer
-
Hieb J., Graham J., Guan J.: An ontology for identifying cyber intrusion induced faults in process control systems. In: Palmer, C., Shenoi, S. (eds.) Critical Infrastructure Protection III, vol. 311 of IFIP Advances in Information and Communication Technolog, pp. 125-138. Springer, Boston (2009).
-
(2009)
Critical Infrastructure Protection III, Vol. 311 of IFIP Advances in Information and Communication Technolog
, pp. 125-138
-
-
Hieb, J.1
Graham, J.2
Guan, J.3
-
15
-
-
0242540448
-
Mining intrusion detection alarms for actionable knowledge
-
KDD '02,ACM, New York, NY, USA
-
Julisch, K., Dacier, M.: Mining intrusion detection alarms for actionable knowledge. In: Proceedings of 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '02, pp. 366-375. ACM, New York, NY, USA (2002).
-
(2002)
Proceedings of 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 366-375
-
-
Julisch, K.1
Dacier, M.2
-
16
-
-
85084163349
-
Data mining approaches for intrusion detection
-
Berkeley, CA, USA, USENIX Association
-
Lee, W., Stolfo, S.: Data mining approaches for intrusion detection. In: Proceedings of 7th Conference on USENIX Security Symposium-vol. 7, pp. 6-6. Berkeley, CA, USA, USENIX Association (1998).
-
(1998)
Proceedings of 7th Conference on USENIX Security Symposium
, vol.7
, pp. 6
-
-
Lee, W.1
Stolfo, S.2
-
17
-
-
53349174366
-
A log mining approach to failure analysis of enterprise telephony systems
-
Lim, N., Singh, N., Yajnik, S.: A log mining approach to failure analysis of enterprise telephony systems. In: Proceedings of the IEEE International Conference on Dependable Systems and Networks with FTCS and DCC, pp. 398-403. (2008).
-
(2008)
Proceedings of the IEEE International Conference on Dependable Systems and Networks with FTCS and DCC
, pp. 398-403
-
-
Lim, N.1
Singh, N.2
Yajnik, S.3
-
19
-
-
74049113264
-
False data injection attacks against state estimation in electric power grids
-
ACM, New York, NY, USA
-
Liu, Y., Ning, P., Reiter, M.: False data injection attacks against state estimation in electric power grids. In: Proceedings of 16th ACM Conference on Computer and Communications Security, CCS '09, pp. 21-32. ACM, New York, NY, USA (2009).
-
(2009)
Proceedings of 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 21-32
-
-
Liu, Y.1
Ning, P.2
Reiter, M.3
-
20
-
-
0034301662
-
A data mining analysis of RTID alarms
-
Manganaris S., Christensen M., Zerkle D., Hermiz K.: A data mining analysis of RTID alarms. Comput. Netw. 34, 571-577 (2000).
-
(2000)
Comput. Netw.
, vol.34
, pp. 571-577
-
-
Manganaris, S.1
Christensen, M.2
Zerkle, D.3
Hermiz, K.4
-
22
-
-
0023313036
-
A methodology for knowledge acquisition and reasoning in failure analysis of systems
-
Narayanan N. H., Viswanadham N.: A methodology for knowledge acquisition and reasoning in failure analysis of systems. IEEE Trans. Syst. Man Cybern. 17(2), 274-288 (1987).
-
(1987)
IEEE Trans. Syst. Man Cybern.
, vol.17
, Issue.2
, pp. 274-288
-
-
Narayanan, N.H.1
Viswanadham, N.2
-
24
-
-
0033295259
-
Bro: a system for detecting network intruders in real-time
-
Paxson V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31, 2435-2463 (1999).
-
(1999)
Comput. Netw.
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
26
-
-
75149197559
-
-
Technical report, U. S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, Washington, DC
-
Rantala, R.: Cybercrime against businesses. Technical report, U. S. Dept. of Justice, Office of Justice Programs, Bureau of Justice Statistics, Washington, DC (2004).
-
(2004)
Cybercrime against businesses
-
-
Rantala, R.1
-
27
-
-
75249091463
-
Cybercrimes against critical infrastructures: a study of online criminal organization and techniques
-
Rege-Patwardhan A.: Cybercrimes against critical infrastructures: a study of online criminal organization and techniques. Crim. Justice Stud. 22(3), 261-271 (2009).
-
(2009)
Crim. Justice Stud.
, vol.22
, Issue.3
, pp. 261-271
-
-
Rege-Patwardhan, A.1
-
28
-
-
51849126454
-
Real-time log file analysis using the simple event correlator (sec)
-
USENIX Association, Berkeley, CA, USA
-
Rouillard, J.: Real-time log file analysis using the simple event correlator (sec). In: Proceedings of 18th USENIX conference on System administration, pp. 133-150. USENIX Association, Berkeley, CA, USA (2004).
-
(2004)
Proceedings of 18th USENIX conference on System administration
, pp. 133-150
-
-
Rouillard, J.1
-
29
-
-
84864227894
-
Error log processing for accurate failure prediction
-
WASL'08, USENIX Association, Berkeley, CA, USA
-
Salfner, F., Tschirpke, S.: Error log processing for accurate failure prediction. In: Proceedings of 1st USENIX conference on Analysis of system logs, WASL'08, pp. 4-4. USENIX Association, Berkeley, CA, USA (2008).
-
(2008)
Proceedings of 1st USENIX conference on Analysis of system logs
, pp. 4
-
-
Salfner, F.1
Tschirpke, S.2
-
30
-
-
77954442129
-
Comprehensive logfiles for autonomic systems
-
Salfner, F., Tschirpke, S., Malek, M.: Comprehensive logfiles for autonomic systems. In: Proceedings of 18th International Symposium on Parallel and Distributed Processing, p. 211 (2004).
-
(2004)
Proceedings of 18th International Symposium on Parallel and Distributed Processing
, pp. 211
-
-
Salfner, F.1
Tschirpke, S.2
Malek, M.3
-
31
-
-
70349806627
-
Cybersecurity for SCADA Systems
-
Tulsa
-
Shaw, W. T.: Cybersecurity for SCADA Systems. PennWell Corp. Tulsa (2006).
-
(2006)
PennWell Corp
-
-
Shaw, W.T.1
-
32
-
-
36249010910
-
Lessons learned from the maroochy water breach
-
E. Goetz and S. Shenoi (Eds.), Boston: Springer
-
Slay J., Miller M.: Lessons learned from the maroochy water breach. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection, vol. 253 of IFIP International Federation for Information Processing, pp. 73-82. Springer, Boston (2007).
-
(2007)
Critical Infrastructure Protection, Vol. 253 of IFIP International Federation for Information Processing
, pp. 73-82
-
-
Slay, J.1
Miller, M.2
-
33
-
-
35048899397
-
Effective security requirements analysis: Hazop and use cases
-
LNCS 3225, Springer
-
Srivatanakul, T., Clark, J., Polack, F.: Effective security requirements analysis: Hazop and use cases. In: Information Security: 7th International Conference, LNCS 3225, pp. 416-427. Springer (2004).
-
(2004)
Information Security: 7th International Conference
, pp. 416-427
-
-
Srivatanakul, T.1
Clark, J.2
Polack, F.3
-
36
-
-
84957036337
-
Security assessments of safety critical systems using hazops
-
LNCS 2187, Springer, London, UK
-
Winther, R., Johnsen, O., Gran, B.: Security assessments of safety critical systems using hazops. In: SAFECOMP '01: Proceedings of 20th International Conference on Computer Safety, Reliability and Security, LNCS 2187, pp. 14-24. Springer, London, UK (2001).
-
(2001)
SAFECOMP '01: Proceedings of 20th International Conference on Computer Safety, Reliability and Security
, pp. 14-24
-
-
Winther, R.1
Johnsen, O.2
Gran, B.3
-
37
-
-
77951439561
-
Mining console logs for large-scale system problem detection
-
SysML'08, USENIX Association, Berkeley, CA, USA
-
Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.: Mining console logs for large-scale system problem detection. In: Proceedings of 3rd Conference on Tackling Computer Systems Problems with Machine Learning Techniques, SysML'08, pp. 4-4. USENIX Association, Berkeley, CA, USA (2008).
-
(2008)
Proceedings of 3rd Conference on Tackling Computer Systems Problems with Machine Learning Techniques
, pp. 4
-
-
Xu, W.1
Huang, L.2
Fox, A.3
Patterson, D.4
Jordan, M.5
|