-
1
-
-
80052033497
-
-
doi:10.1016/j.eswa.2011.05.076
-
Wang, S.-S., Yan, K.-Q., Wang, S.-C., Liu, C.-W.: An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks (2011), doi:10.1016/j.eswa.2011.05.076
-
(2011)
An Integrated Intrusion Detection System for Cluster-based Wireless Sensor Networks
-
-
Wang, S.-S.1
Yan, K.-Q.2
Wang, S.-C.3
Liu, C.-W.4
-
2
-
-
39049142137
-
Credit Card Fraud Detection Using Hidden Markov Model
-
January-March doi:10.1109/TDSC.2007.70228
-
Srivastava, A., Kundu, A., Sural, S., Majumdar, A.K.: Credit Card Fraud Detection Using Hidden Markov Model. IEEE Transactions on Dependable and Secure Computing 5(1) (January-March 2008), doi:10.1109/TDSC.2007.70228
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.1
-
-
Srivastava, A.1
Kundu, A.2
Sural, S.3
Majumdar, A.K.4
-
3
-
-
68049121093
-
Anomaly detection: A survey
-
July doi:10.1145/1541880.1541882
-
Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3) (July 2009), doi:10.1145/1541880.1541882
-
(2009)
ACM Comput. Surv.
, vol.41
, Issue.3
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
4
-
-
0024610919
-
A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
-
Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proc. IEEE 77(2), 257-286 (1989)
-
(1989)
Proc. IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
-
5
-
-
84947198351
-
-
Institute of Control Sciences Moscow, Russia
-
Filippov, V., Mukhanov, L., Shchukin, B.: Credit Card Fraud Detection System. Institute of Control Sciences Moscow, Russia
-
Credit Card Fraud Detection System
-
-
Filippov, V.1
Mukhanov, L.2
Shchukin, B.3
-
7
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
ACM, New York
-
Krug̈el, C., Toth, T., Kirda, E.: Service specific anomaly detection for network intrusion detection. In: SAC 2002: Proceedings of the 2002 ACM Symposium on APPLIED Computing. ACM, New York (2002)
-
(2002)
SAC 2002: Proceedings of the 2002 ACM Symposium on APPLIED Computing
-
-
Krug̈el, C.1
Toth, T.2
Kirda, E.3
-
9
-
-
35048885009
-
Anomalous Payload-Based Network Intrusion Detection
-
Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. Springer, Heidelberg
-
Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3224
, pp. 203-222
-
-
Wang, K.1
Stolfo, S.J.2
-
11
-
-
0042961664
-
Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results
-
Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A.L., Chan, P.K.: Credit Card Fraud Detection Using Meta-Learning: Issues and Initial Results. In: Proc. AAAI Workshop AI Methods in Fraud and Risk Management, pp. 83-90 (1997)
-
(1997)
Proc. AAAI Workshop AI Methods in Fraud and Risk Management
, pp. 83-90
-
-
Stolfo, S.J.1
Fan, D.W.2
Lee, W.3
Prodromidis, A.L.4
Chan, P.K.5
-
12
-
-
84962238645
-
Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project
-
Stolfo, S.J., Fan, D.W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-Based Modeling for Fraud and Intrusion Detection: Results from the JAM Project. In: Proc. DARPA Information Survivability Conf. and Exposition, vol. 2, pp. 130-144 (2000)
-
(2000)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.2
, pp. 130-144
-
-
Stolfo, S.J.1
Fan, D.W.2
Lee, W.3
Prodromidis, A.4
Chan, P.K.5
-
13
-
-
84969506768
-
Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks
-
Ourston, D., Matzner, S., Stump, W., Hopkins, B.: Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks. In: Proc. 36th Ann. Hawaii Int'l Conf. System Sciences, vol. 9, pp. 334-344 (2003)
-
(2003)
Proc. 36th Ann. Hawaii Int'l Conf. System Sciences
, vol.9
, pp. 334-344
-
-
Ourston, D.1
Matzner, S.2
Stump, W.3
Hopkins, B.4
-
14
-
-
84890861404
-
A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls
-
Hoang, X.D., Hu, J., Bertok, P.: A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls. In: Proc. 11th IEEE Int'l Conf. Networks, pp. 531-536 (2003)
-
(2003)
Proc. 11th IEEE Int'l Conf. Networks
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
|