-
1
-
-
84880899638
-
Adaptive web navigation for wireless devices
-
Morgan Kaufmann Publishers Inc., San Francisco
-
Anderson, C.R., Domingos, P., Weld, D.S.: Adaptive web navigation for wireless devices. In: Proceedings of the 17th International Joint Conference on Artificial Intelligence, vol. 2, pp. 879-884. Morgan Kaufmann Publishers Inc., San Francisco (2001)
-
(2001)
Proceedings of the 17th International Joint Conference on Artificial Intelligence
, vol.2
, pp. 879-884
-
-
Anderson, C.R.1
Domingos, P.2
Weld, D.S.3
-
2
-
-
79955482186
-
Hmmpayl: An intrusion detection system based on hidden markov models
-
Ariu, D., Tronci, R., Giacinto, G.: Hmmpayl: An intrusion detection system based on hidden markov models. Computers and Security 30(4), 221-241 (2011)
-
(2011)
Computers and Security
, vol.30
, Issue.4
, pp. 221-241
-
-
Ariu, D.1
Tronci, R.2
Giacinto, G.3
-
3
-
-
0038494682
-
Coolcat: An entropy-based algorithm for categorical clustering
-
ACM, New York
-
Barbará, D., Li, Y., Couto, J.: Coolcat: an entropy-based algorithm for categorical clustering. In: Proceedings of the Eleventh International Conference on Information and knowledge Management, CIKM 2002, pp. 582-589. ACM, New York (2002)
-
(2002)
Proceedings of the Eleventh International Conference on Information and Knowledge Management, CIKM 2002
, pp. 582-589
-
-
Barbará, D.1
Li, Y.2
Couto, J.3
-
4
-
-
17444409624
-
A tutorial on the cross-entropy method
-
doi:10.1007/s10479-005-5724-z
-
de Boer, P.-T., Kroese, D., Mannor, S., Rubinstein, R.: A tutorial on the cross-entropy method. Annals of Operations Research 134, 19-67 (2005), doi:10.1007/s10479-005-5724-z
-
(2005)
Annals of Operations Research
, vol.134
, pp. 19-67
-
-
De Boer, P.-T.1
Kroese, D.2
Mannor, S.3
Rubinstein, R.4
-
5
-
-
0023294428
-
An intrusion-detection model
-
Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. 13(2), 222-232 (1987)
-
(1987)
IEEE Trans. Softw. Eng.
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
6
-
-
33846369107
-
Learning dfa representations of http for protecting web applications
-
From Intrusion Detection to Self-Protection
-
Ingham, K.L., Somayaji, A., Burge, J., Forrest, S.: Learning dfa representations of http for protecting web applications. Computer Networks 51(5), 1239-1255 (2007); From Intrusion Detection to Self-Protection
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1239-1255
-
-
Ingham, K.L.1
Somayaji, A.2
Burge, J.3
Forrest, S.4
-
7
-
-
79951781475
-
Webpum: A web-based recommendation system to predict user future movements
-
Jalali, M., Mustapha, N., Nasir Sulaiman, M., Mamat, A.: Webpum: A web-based recommendation system to predict user future movements. Expert Systems with Applications 37(9), 6201-6212 (2010)
-
(2010)
Expert Systems with Applications
, vol.37
, Issue.9
, pp. 6201-6212
-
-
Jalali, M.1
Mustapha, N.2
Nasir Sulaiman, M.3
Mamat, A.4
-
8
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
ACM, New York
-
Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites. In: Proceedings of the 11th International Conference on World Wide Web, WWW 2002, pp. 293-304. ACM, New York (2002)
-
(2002)
Proceedings of the 11th International Conference on World Wide Web, WWW 2002
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
9
-
-
18844395404
-
A multi-model approach to the detection of web-based attacks
-
Kruegel, C., Vigna, G., Robertson, W.: A multi-model approach to the detection of web-based attacks. Comput. Netw. 48(5), 717-738 (2005)
-
(2005)
Comput. Netw.
, vol.48
, Issue.5
, pp. 717-738
-
-
Kruegel, C.1
Vigna, G.2
Robertson, W.3
-
11
-
-
34447299135
-
Rough clustering of sequential data
-
Kumar, P., Radha Krishna, P., Bapi, R.S., Kumar De, S.: Rough clustering of sequential data. Data and Knowledge Engineering 63(2), 183-199 (2007)
-
(2007)
Data and Knowledge Engineering
, vol.63
, Issue.2
, pp. 183-199
-
-
Kumar, P.1
Radha Krishna, P.2
Bapi, R.S.3
Kumar De, S.4
-
12
-
-
78650681741
-
A novel prediction model based on hierarchical characteristic of web site
-
Lee, C.-H., Lo, Y.L., Fu, Y.-H.: A novel prediction model based on hierarchical characteristic of web site. Expert Systems with Applications 38(4), 3422-3430 (2011)
-
(2011)
Expert Systems with Applications
, vol.38
, Issue.4
, pp. 3422-3430
-
-
Lee, C.-H.1
Lo, Y.L.2
Fu, Y.-H.3
-
13
-
-
84964247755
-
Sequence-order-independent network profiling for detecting application layer ddos attacks
-
Lee, S., Kim, G., Kim, S.: Sequence-order-independent network profiling for detecting application layer ddos attacks. EURASIP Journal on Wireless Communications and Networking 2011(1), 50 (2011)
-
(2011)
EURASIP Journal on Wireless Communications and Networking
, vol.2011
, Issue.1
, pp. 50
-
-
Lee, S.1
Kim, G.2
Kim, S.3
-
14
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
Lee, W., Stolfo, S.J.: A framework for constructing features and models for intrusion detection systems. ACM Trans. Inf. Syst. Secur. 3, 227-261 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.J.2
-
15
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: IEEE Symposium on Security and Privacy, pp. 130-143 (2001)
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
16
-
-
14344259208
-
Entropy-based criterion in categorical clustering
-
ACM, New York
-
Li, T., Ma, S., Ogihara, M.: Entropy-based criterion in categorical clustering. In: Proceedings of the Twenty-First International Conference on Machine Learning, ICML 2004, pp. 68-75. ACM, New York (2004)
-
(2004)
Proceedings of the Twenty-First International Conference on Machine Learning, ICML 2004
, pp. 68-75
-
-
Li, T.1
Ma, S.2
Ogihara, M.3
-
17
-
-
79955639952
-
Sbad: Sequence based attack detection via sequence comparison
-
Mao, C.-H., Pao, H.-K., Faloutsos, C., Lee, H.-M.: Sbad: Sequence based attack detection via sequence comparison. In: PSDML, pp. 78-91 (2010)
-
(2010)
PSDML
, pp. 78-91
-
-
Mao, C.-H.1
Pao, H.-K.2
Faloutsos, C.3
Lee, H.-M.4
-
19
-
-
84866010150
-
On nested palindromes in clickstream data
-
ACM, New York
-
Speiser, M., Antonini, G., Labbi, A., Sutanto, J.: On nested palindromes in clickstream data. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012, pp. 1460-1468. ACM, New York (2012)
-
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2012
, vol.2012
, pp. 1460-1468
-
-
Speiser, M.1
Antonini, G.2
Labbi, A.3
Sutanto, J.4
-
20
-
-
47249148481
-
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach
-
Srivatsa, M., Iyengar, A., Yin, J., Liu, L.: Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. ACM Trans. Web 2, 15:1-15:49 (2008)
-
(2008)
ACM Trans. Web
, vol.2
-
-
Srivatsa, M.1
Iyengar, A.2
Yin, J.3
Liu, L.4
-
21
-
-
84856441401
-
Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users
-
Stevanovic, D., Vlajic, N., An, A.: Unsupervised Clustering of Web Sessions to Detect Malicious and Non-malicious Website Users. Procedia CS 5, 123-131 (2011)
-
(2011)
Procedia CS
, vol.5
, pp. 123-131
-
-
Stevanovic, D.1
Vlajic, N.2
An, A.3
-
22
-
-
84875926244
-
Detection of malicious and non-malicious website visitors using unsupervised neural network learning
-
Stevanovic, D., Vlajic, N., An, A.: Detection of malicious and non-malicious website visitors using unsupervised neural network learning. Applied Soft Computing (2012)
-
(2012)
Applied Soft Computing
-
-
Stevanovic, D.1
Vlajic, N.2
An, A.3
-
23
-
-
0002788820
-
Impact of Similarity Measures on Web-page Clustering
-
AAAI July
-
Strehl, A., Ghosh, J., Mooney, R.: Impact of Similarity Measures on Web-page Clustering. In: Proceedings of the 17th National Conference on Artificial Intelligence: Workshop of Artificial Intelligence for Web Search (AAAI 2000), Austin, Texas, USA, July 30-31, pp. 58-64. AAAI (July 2000)
-
(2000)
Proceedings of the 17th National Conference on Artificial Intelligence: Workshop of Artificial Intelligence for Web Search (AAAI 2000), Austin, Texas, USA, July 30-31
, pp. 58-64
-
-
Strehl, A.1
Ghosh, J.2
Mooney, R.3
-
24
-
-
78650910973
-
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method
-
Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. Springer, Heidelberg
-
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R.P., Jia, W., Yeh, W.-C.: A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 459-471. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6476
, pp. 459-471
-
-
Tan, Z.1
Jamdagni, A.2
He, X.3
Nanda, P.4
Liu, R.P.5
Jia, W.6
Yeh, W.-C.7
-
25
-
-
78650414316
-
Massively parallel acceleration of a document-similarity classifier to detect web attacks
-
Data Intensive Computing
-
Ulmer, C., Gokhale, M., Gallagher, B., Top, P., Eliassi-Rad, T.: Massively parallel acceleration of a document-similarity classifier to detect web attacks. Journal of Parallel and Distributed Computing 71(2), 225-235 (2011); Data Intensive Computing
-
(2011)
Journal of Parallel and Distributed Computing
, vol.71
, Issue.2
, pp. 225-235
-
-
Ulmer, C.1
Gokhale, M.2
Gallagher, B.3
Top, P.4
Eliassi-Rad, T.5
-
26
-
-
33845567346
-
A Novel Model for Detecting Application Layer DDoS Attacks
-
IEEE Computer Society, Washington, DC
-
Xie, Y., Yu, S.-Z.: A Novel Model for Detecting Application Layer DDoS Attacks. In: Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS 2006), vol. 2, pp. 56-63. IEEE Computer Society, Washington, DC (2006)
-
(2006)
Proceedings of the First International Multi-Symposiums on Computer and Computational Sciences (IMSCCS 2006)
, vol.2
, pp. 56-63
-
-
Xie, Y.1
Yu, S.-Z.2
-
27
-
-
61449135082
-
Monitoring the application-layer DDoS attacks for popular websites
-
Xie, Y., Yu, S.-Z.: Monitoring the application-layer DDoS attacks for popular websites. IEEE/ACM Trans. Netw. 17, 15-25 (2009)
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
|