-
2
-
-
0002355265
-
Finding the outliers that matter
-
Andrews, D. F., & Pregibon, D. (1978). Finding the outliers that matter. Journal of the Royal Statistical Society. Series B (Methodological), 40(1), 85-93. /
-
(1978)
Journal of the Royal Statistical Society. Series B (Methodological)
, vol.40
, Issue.1
, pp. 85-93
-
-
Andrews, D.F.1
Pregibon, D.2
-
3
-
-
79551494881
-
Semi-supervised novelty detection
-
Blanchard, G., Lee, G., & Scott, C. (2010). Semi-Supervised Novelty Detection. Journal of Machine Learning Research," 2973-2973-3009-3009.
-
(2010)
Journal of Machine Learning Research
, pp. 29732973-30093009
-
-
Blanchard, G.1
Lee, G.2
Scott, C.3
-
4
-
-
0031620208
-
Combining labeled and unlabeled data with co-training
-
New York, NY, USA. ACM
-
Blum, A., & Mitchell, T. (1998). Combining labeled and unlabeled data with co-training. In COLT' 98: Proc. of the eleventh annual conference on Computational learning theory, pp. 92-100, New York, NY, USA. ACM.
-
(1998)
COLT' 98: Proc. of the Eleventh Annual Conference on Computational Learning Theory
, pp. 92-100
-
-
Blum, A.1
Mitchell, T.2
-
5
-
-
0026966646
-
A training algorithm for optimal margin classifiers
-
Haussler, D. (Ed.)
-
Boser, B., Guyon, I., & Vapnik, V. (1992). A training algorithm for optimal margin classifiers. In Haussler, D. (Ed.), Proceedings of the 5th Annual ACM Workshop on Computational Learning Theory, pp. 144-152.
-
(1992)
Proceedings of the 5th Annual ACM Workshop on Computational Learning Theory
, pp. 144-152
-
-
Boser, B.1
Guyon, I.2
Vapnik, V.3
-
6
-
-
84898950762
-
A linear programming approach to novelty detection
-
Leen, T., Dietterich, T., & Tresp, V. (Eds.) MIT Press
-
Campbell, C, & Bennett, K. (2001). A linear programming approach to novelty detection. In Leen, T., Dietterich, T., & Tresp, V. (Eds.), Advances in Neural Information Processing Systems, Vol. 13, pp. 395-401. MIT Press.
-
(2001)
Advances in Neural Information Processing Systems
, vol.13
, pp. 395-401
-
-
Campbell, C.1
Bennett, K.2
-
7
-
-
68049121093
-
Anomaly detection: A survey
-
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM Computing Surveys, 41(3), 1-58.
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
8
-
-
33749257143
-
A continuation method for semi-supervised SVMs
-
New York, New York, USA. ACM
-
Chapelle, O., Chi, M., & Zien, A. (2006). A continuation method for semi-supervised SVMs. In ICML, pp. 185-192, New York, New York, USA. ACM.
-
(2006)
ICML
, pp. 185-192
-
-
Chapelle, O.1
Chi, M.2
Zien, A.3
-
11
-
-
34249753618
-
Support vector networks
-
Cortes, C, & Vapnik, V. (1995). Support vector networks. Machine Learning, 20, 273-297.
-
(1995)
Machine Learning
, vol.20
, pp. 273-297
-
-
Cortes, C.1
Vapnik, V.2
-
13
-
-
0038324535
-
-
chap. A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. Kluwer
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., & Stolfo, S. (2002). Applications of Data Mining in Computer Security, chap. A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. Kluwer.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
14
-
-
85077703150
-
Polymorphic blending attacks
-
Fogla, P., Sharif, M., Perdisci, R., Kolesnikov, O., & Lee, W. (2006). Polymorphic blending attacks. In Proc. of USENIX Security Symposium.
-
(2006)
Proc. of USENIX Security Symposium.
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
15
-
-
27644532699
-
Using one-class and two-class svms for multiclass image annotation
-
Goh, K.-S., Chang, E. Y, & Li, B. (2005). Using one-class and two-class svms for multiclass image annotation. IEEE Transactions on Knowledge and Data Engineering, 17, 1333-1346.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, pp. 1333-1346
-
-
Goh, K.-S.1
Chang, E.Y.2
Li, B.3
-
16
-
-
70350627210
-
Active and semi-supervised data domain description
-
Görnitz, N., Kloft, M., & Brefeld, U. (2009). Active and semi-supervised data domain description. In ECML/PKDD (1), pp. 407-422.
-
(2009)
ECML/PKDD (1)
, pp. 407-422
-
-
Görnitz, N.1
Kloft, M.2
Brefeld, U.3
-
17
-
-
33646512999
-
One class support vector machines for detecting anomalous windows registry accesses
-
Heller, K., Svore, K., Keromytis, A., & Stolfo, S. (2003). One class support vector machines for detecting anomalous windows registry accesses. In Proc. of the workshop on Data Mining for Computer Security.
-
(2003)
Proc. of the Workshop on Data Mining for Computer Security
-
-
Heller, K.1
Svore, K.2
Keromytis, A.3
Stolfo, S.4
-
18
-
-
0141571530
-
Support vector machines for class representation and discrimination
-
Hoi, C.-H., Chan, C.-H., Huang, K., Lyu, M., & King, I. (2003). Support vector machines for class representation and discrimination. In Proc. of the International Joint Conference on Neural Networks.
-
(2003)
Proc. of the International Joint Conference on Neural Networks.
-
-
Hoi, C.-H.1
Chan, C.-H.2
Huang, K.3
Lyu, M.4
King, I.5
-
19
-
-
0000171374
-
Robust statistics: A review
-
Huber, P. (1972). Robust statistics: a review. Ann. Statist., 43, 1041.
-
(1972)
Ann. Statist.
, vol.43
, pp. 1041
-
-
Huber, P.1
-
20
-
-
0001938951
-
Transductive inference for text classification using support vector machines
-
Bled, Slowenien
-
Joachims, T. (1999). Transductive inference for text classification using support vector machines. In International Conference on Machine Learning (ICML), pp. 200-209, Bled, Slowenien.
-
(1999)
International Conference on Machine Learning (ICML)
, pp. 200-209
-
-
Joachims, T.1
-
22
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
Kruegel, C, Vigna, G., & Robertson, W. (2005). A multi-model approach to the detection of web-based attacks. Computer Networks, 48(5).
-
(2005)
Computer Networks
, vol.48
, Issue.5
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
23
-
-
77954738007
-
TokDoc: A self-healing web application firewall
-
Krueger, T., Gehl, C, Rieck, K., & Laskov, P. (2010). TokDoc: A self-healing web application firewall. In Proc. of 25th ACM Symposium on Applied Computing (SAC), pp. 1846-1853.
-
(2010)
Proc. of 25th ACM Symposium on Applied Computing (SAC)
, pp. 1846-1853
-
-
Krueger, T.1
Gehl, C.2
Rieck, K.3
Laskov, P.4
-
24
-
-
8644232594
-
A study on combining image representations for image classification and retrieval
-
Lai, C., Tax, D. M. J., Duin, R. P. W., Zbieta, E., Ekalska, P., & Ik, P. P. (2004). A study on combining image representations for image classification and retrieval. International Journal of Pattern Recognition and Artificial Intelligence, 18, 867-890.
-
(2004)
International Journal of Pattern Recognition and Artificial Intelligence
, vol.18
, pp. 867-890
-
-
Lai, C.1
Tax, D.M.J.2
Duin, R.P.W.3
Zbieta, E.4
Ekalska, P.5
Ik, P.P.6
-
25
-
-
84875531578
-
Learning from positive and unlabeled examples with different data distributions
-
Li, X.-l., & Liu, B. (2005). Learning from Positive and Unlabeled Examples with Different Data Distributions. In ECML.
-
(2005)
ECML
-
-
Li, X.-L.1
Liu, B.2
-
26
-
-
78149306870
-
Building text classifiers using positive and unlabeled examples
-
IEEE Comput. Soc.
-
Liu, B., Dai, Y., Li, X., Lee, W. S., & Yu, P. S. (2003). Building Text Classifiers Using Positive and Unlabeled Examples. In IEEE International Conference on Data Mining, pp. 179-186. IEEE Comput. Soc.
-
(2003)
IEEE International Conference on Data Mining
, pp. 179-186
-
-
Liu, B.1
Dai, Y.2
Li, X.3
Lee, W.S.4
Yu, P.S.5
-
27
-
-
34147123690
-
Minimum enclosing and maximum excluding machine for pattern description and discrimination
-
Washington, DC, USA. IEEE Computer Society
-
Liu, Y., & Zheng, Y. F. (2006). Minimum enclosing and maximum excluding machine for pattern description and discrimination. In ICPR '06: Proc. of the 18th International Conference on Pattern Recognition, pp. 129-132, Washington, DC, USA. IEEE Computer Society.
-
(2006)
ICPR '06: Proc. of the 18th International Conference on Pattern Recognition
, pp. 129-132
-
-
Liu, Y.1
Zheng, Y.F.2
-
28
-
-
77954757586
-
Semi-supervised one-class support vector machines for classification of remote sensing data
-
Muñoz Marí, J., Bovolo, F., Gómez-Chova, L., Bruzzone, L., & Camp-Valls, G. (2010). Semi-Supervised One-Class Support Vector Machines for Classification of Remote Sensing Data. IEEE Transactions on Geoscience and Remote Sensing, 48(8), 3188-3197.
-
(2010)
IEEE Transactions on Geoscience and Remote Sensing
, vol.48
, Issue.8
, pp. 3188-3197
-
-
Muñoz Marí, J.1
Bovolo, F.2
Gómez-Chova, L.3
Bruzzone, L.4
Camp-Valls, G.5
-
29
-
-
85096855936
-
One-class svms for document classification
-
Manevitz, L. M., & Yousef, M. (2002). One-class svms for document classification. J. Mach. Learn. Res., 2, 139-154.
-
(2002)
J. Mach. Learn. Res.
, vol.2
, pp. 139-154
-
-
Manevitz, L.M.1
Yousef, M.2
-
30
-
-
72949104669
-
Semi-supervised co-training and active learning based approach for multi-view intrusion detection
-
New York, NY, USA. ACM
-
Mao, C.-H., Lee, H.-M., Parikh, D., Chen, T., & Huang, S.-Y. (2009). Semi-supervised co-training and active learning based approach for multi-view intrusion detection. In SAC '09: Proc. of the 2009 ACM symposium on Applied Computing, pp. 2042-2048, New York, NY, USA. ACM.
-
(2009)
SAC '09: Proc. of the 2009 ACM Symposium on Applied Computing
, pp. 2042-2048
-
-
Mao, C.-H.1
Lee, H.-M.2
Parikh, D.3
Chen, T.4
Huang, S.-Y.5
-
31
-
-
0142063407
-
Novelty detection: A review - Part 1: Statistical approaches
-
Markou, M., & Singh, S. (2003a). Novelty detection: a review - part 1: statistical approaches. Signal Processing, 83, 2481-2497.
-
(2003)
Signal Processing
, vol.83
, pp. 2481-2497
-
-
Markou, M.1
Singh, S.2
-
32
-
-
0142126712
-
Novelty detection: A review - Part 2: Neural network based approaches
-
Markou, M., & Singh, S. (2003b). Novelty detection: a review - part 2: neural network based approaches. Signal Processing, 83, 2499-2521.
-
(2003)
Signal Processing
, vol.83
, pp. 2499-2521
-
-
Markou, M.1
Singh, S.2
-
33
-
-
74049099934
-
Metasploit toolkit
-
Maynor, K., Mookhey, K., Cervini, J. F. R., & Beaver, K. (2007). Metasploit Toolkit. Syngress.
-
(2007)
Syngress
-
-
Maynor, K.1
Mookhey, K.2
Cervini, J.F.R.3
Beaver, K.4
-
34
-
-
0035272287
-
An introduction to kernelbased learning algorithms
-
Müller, K.-R., Mika, S., Rätsch, G., Tsuda, K., & Schölkopf, B. (2001). An introduction to kernelbased learning algorithms. IEEE Neural Networks, 12(2), 181-201.
-
(2001)
IEEE Neural Networks
, vol.12
, Issue.2
, pp. 181-201
-
-
Müller, K.-R.1
Mika, S.2
Rätsch, G.3
Tsuda, K.4
Schölkopf, B.5
-
35
-
-
34250705251
-
One class classification methods based non-relevance feedback document retrieval
-
Washington, DC, USA. IEEE Computer Society
-
Onoda, T., Murata, H., & Yamada, S. (2006). One class classification methods based non-relevance feedback document retrieval. In WI-IATW '06: Proc. of the 2006 IEEE/WIC/ACM international conference on Web Intelligence and Intelligent Agent Technology, pp. 393-396, Washington, DC, USA. IEEE Computer Society.
-
(2006)
WI-IATW '06: Proc. of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
, pp. 393-396
-
-
Onoda, T.1
Murata, H.2
Yamada, S.3
-
36
-
-
34447263807
-
SVDD-based pattern denoising
-
Park, J., Kang, D., Kim, J., Kwok, J. T., & Tsang, I. W. (2007). SVDD-based pattern denoising. Neural Computation, 19, 1919-1938.
-
(2007)
Neural Computation
, vol.19
, pp. 1919-1938
-
-
Park, J.1
Kang, D.2
Kim, J.3
Kwok, J.T.4
Tsang, I.W.5
-
37
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V. (1999). Bro: A System for Detecting Network Intruders in Real-Time. Elsevier Computer Networks, 31(23-24), 2435-2463.
-
(1999)
Elsevier Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
39
-
-
61749083929
-
McPAD: A multiple classifier system for accurate payload-based anomaly detection
-
Perdisci, R., Ariu, D., Fogla, P., Giacinto, G., & Lee, W. (2009). McPAD: A multiple classifier system for accurate payload-based anomaly detection. Computer Networks, 5(6), 864-881.
-
(2009)
Computer Networks
, vol.5
, Issue.6
, pp. 864-881
-
-
Perdisci, R.1
Ariu, D.2
Fogla, P.3
Giacinto, G.4
Lee, W.5
-
41
-
-
33746430492
-
Detecting unknown network attacks using language models
-
LNCS
-
Rieck, K., & Laskov, P. (2006). Detecting unknown network attacks using language models. In Detection of Intrusions and Malware, and Vulnerability Assessment, Proc. of 3rd DIMVA Conference, LNCS, pp. 74-90.
-
(2006)
Detection of Intrusions and Malware, and Vulnerability Assessment, Proc. of 3rd DIMVA Conference
, pp. 74-90
-
-
Rieck, K.1
Laskov, P.2
-
42
-
-
33846910249
-
Language models for detection of unknown attacks in network traffic
-
Rieck, K., & Laskov, P. (2007). Language models for detection of unknown attacks in network traffic. Journal in Computer Virology, 2(4), 243-256.
-
(2007)
Journal in Computer Virology
, vol.2
, Issue.4
, pp. 243-256
-
-
Rieck, K.1
Laskov, P.2
-
43
-
-
38949156579
-
Linear-time computation of similarity measures for sequential data
-
(Jan)
-
Rieck, K., & Laskov, P. (2008). Linear-time computation of similarity measures for sequential data. Journal of Machine Learning Research, 9(Jan), 23-48.
-
(2008)
Journal of Machine Learning Research
, vol.9
, pp. 23-48
-
-
Rieck, K.1
Laskov, P.2
-
46
-
-
0016572913
-
A vector space model for automatic indexing
-
Salton, G., Wong, A., & Yang, C. (1975). A vector space model for automatic indexing. Communications of the ACM, 18(11), 613-620.
-
(1975)
Communications of the ACM
, vol.18
, Issue.11
, pp. 613-620
-
-
Salton, G.1
Wong, A.2
Yang, C.3
-
48
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
Schölkopf, B., Platt, J. C., Shawe-Taylor, J., Smola, A. J., & Williamson, R. C. (2001). Estimating the support of a high-dimensional distribution. Neural Computation, 13(7), 1443-1471.
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.C.2
Shawe-Taylor, J.3
Smola, A.J.4
Williamson, R.C.5
-
50
-
-
31844440904
-
Beyond the point cloud: From transductive to semi-supervised learning
-
ACM
-
Sindhwani, V., Niyogi, P., & Belkin, M. (2005). Beyond the point cloud: from transductive to semi-supervised learning. In ICML, Vol. 1, pp. 824-831. ACM.
-
(2005)
ICML
, vol.1
, pp. 824-831
-
-
Sindhwani, V.1
Niyogi, P.2
Belkin, M.3
-
51
-
-
70450241048
-
-
Ph.D. thesis, Fraunhofer Institute FIRST. supervised by K.-R. Müller and G. Rätsch
-
Sonnenburg, S. (2008). Machine Learning for Genomic Sequence Analysis. Ph.D. thesis, Fraunhofer Institute FIRST. supervised by K.-R. Müller and G. Rätsch.
-
(2008)
Machine Learning for Genomic Sequence Analysis
-
-
Sonnenburg, S.1
-
53
-
-
27144475340
-
A comparative evaluation of two algorithms for windows registry anomaly detection
-
Stolfo, S. J., Apap, F., Eskin, E., Heller, K., Hershkop, S., Honig, A., & Svore, K. (2005). A comparative evaluation of two algorithms for windows registry anomaly detection. In Journal of Computer Security, pp. 659-693.
-
(2005)
Journal of Computer Security
, pp. 659-693
-
-
Stolfo, S.J.1
Apap, F.2
Eskin, E.3
Heller, K.4
Hershkop, S.5
Honig, A.6
Svore, K.7
-
54
-
-
0037753593
-
-
Ph.D. thesis, Technical University Delft
-
Tax, D. M. J. (2001). One-class classification. Ph.D. thesis, Technical University Delft.
-
(2001)
One-class Classification
-
-
Tax, D.M.J.1
-
55
-
-
0942266514
-
Support vector data description
-
Tax, D. M. J., & Duin, R. P. W. (2004). Support vector data description. Machine Learning, 54, 45-66.
-
(2004)
Machine Learning
, vol.54
, pp. 45-66
-
-
Tax, D.M.J.1
Duin, R.P.W.2
-
56
-
-
0003007938
-
Support vector machine active learning with applications to text classification
-
San Francisco, CA. Morgan Kaufmann
-
Tong, S., & Koller, D. (2000). Support vector machine active learning with applications to text classification. In Proc. of the Seventeenth International Conference on Machine Learning, San Francisco, CA. Morgan Kaufmann.
-
(2000)
Proc. of the Seventeenth International Conference on Machine Learning
-
-
Tong, S.1
Koller, D.2
-
58
-
-
33745328317
-
Pattern classification via single spheres
-
Wang, J., Neskovic, P., & Cooper, L. N. (2005). Pattern classification via single spheres. In Computer Science: Discovery Science (DS), Vol. 3735, pp. 241-252.
-
(2005)
Computer Science: Discovery Science (DS)
, vol.3735
, pp. 241-252
-
-
Wang, J.1
Neskovic, P.2
Cooper, L.N.3
-
59
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
Wang, K., Parekh, J., & Stolfo, S. (2006). Anagram: A content anomaly detector resistant to mimicry attack. In Recent Adances in Intrusion Detection (RAID), pp. 226-248.
-
(2006)
Recent Adances in Intrusion Detection (RAID)
, pp. 226-248
-
-
Wang, K.1
Parekh, J.2
Stolfo, S.3
-
60
-
-
0037365194
-
Active learning with support vector machines in the drug discovery process
-
Warmuth, M. K., Liao, J., Rätsch, G., Mathieson, M., Putta, S., & Lemmen, C. (2003). Active learning with support vector machines in the drug discovery process. Journal of Chemical Information and Computer Sciences, 43(2), 667-673.
-
(2003)
Journal of Chemical Information and Computer Sciences
, vol.43
, Issue.2
, pp. 667-673
-
-
Warmuth, M.K.1
Liao, J.2
Rätsch, G.3
Mathieson, M.4
Putta, S.5
Lemmen, C.6
-
62
-
-
77955014859
-
A simple probabilistic approach to learning from positive and unlabeled examples
-
Zhang, D., & Lee, W. S. (2005). A simple probabilistic approach to learning from positive and unlabeled examples. In Proceedings of the 5th Annual UK Workshop on⋯.
-
(2005)
Proceedings of the 5th Annual UK Workshop On⋯
-
-
Zhang, D.1
Lee, W.S.2
|