-
1
-
-
0034455983
-
Adaptive intrusion detection: A data mining approach
-
Kluwer Academic Publishers, :, December
-
Wenke Lee, Sal Stolfo, and Kui Mok, "Adaptive Intrusion Detection: A Data Mining Approach", Artificial Intelligence Review, Kluwer Academic Publishers, 14(6):533-567, December 2000.
-
(2000)
Artificial Intelligence Review
, vol.14
, Issue.6
, pp. 533-567
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
2
-
-
84885774862
-
A framework for constructing features and models for intrusion detection systems
-
November
-
Wenke Lee and Salvatore J. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems", ACM Transactions on Information and System Security (TISSEC), Volume 3, Issue 4, November 2000.
-
(2000)
ACM Transactions on Information and System Security (TISSEC)
, vol.3
, Issue.4
-
-
Lee, W.1
Stolfo, S.J.2
-
3
-
-
84964411176
-
Real time data mining-based intrusion detection
-
Anaheim, CA, June
-
Wenke Lee, Sal Stolfo, Phil Chan, Eleazar Eskin, Wei Fan, Matt Miller, Shlomo Hershkop, and Junxin Zhang, "Real Time Data Mining-based Intrusion Detection", The 2001 DARPA Information Survivability Conference and Exposition (DISCEX II), Anaheim, CA, June 2001.
-
(2001)
The 2001 DARPA Information Survivability Conference and Exposition (DISCEX II)
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
4
-
-
85084163349
-
Data mining approaches for intrusion detection
-
San Antonio, TX, January
-
W. Lee and S. J. Stolfo, "Data Mining Approaches for Intrusion Detection", the 7th USENIX Security Symposium, San Antonio, TX, January 1998.
-
(1998)
The 7th USENIX Security Symposium
-
-
Lee, W.1
Stolfo, S.J.2
-
5
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
September
-
Yongguang Zhang, Wenke Lee, and Yi-An Huang, "Intrusion Detection Techniques for Mobile Wireless Networks", Wireless Networks, Volume 9, Issue 5, September 2003.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
6
-
-
0038428854
-
Results of the kdd'99 classifier learning
-
Charles Elkan, "Results of the KDD'99 Classifier Learning", SIGKDD Explorations 1(2): 63-64, 2000.
-
(2000)
SIGKDD Explorations
, vol.1
, Issue.2
, pp. 63-64
-
-
Elkan, C.1
-
7
-
-
0035478854
-
Random forests
-
L. Breiman, "Random Forests", Machine Learning 45(1):5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
8
-
-
4544229404
-
Adam: Detecting intrusions by data mining
-
T1A3 1100 United States Military Academy, West Point, NY, June
-
Daniel Barbarra, Julia Couto, Sushil Jajodia, Leonard Popyack, and Ningning Wu, "ADAM: Detecting Intrusions by Data Mining", Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security T1A3 1100 United States Military Academy, West Point, NY, June 2001.
-
(2001)
Proceedings of the 2001 IEEE, Workshop on Information Assurance and Security
-
-
Barbarra, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
10
-
-
10844237614
-
An analysis of the 1999 DARPA/lincoln laboratory evaluation data for network anomaly detection
-
Pittsburgh, USA, September
-
M. Mahoney and P. Chan, "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection", Proceeding of Recent Advances in Intrusion Detection (RAID)-2003, Pittsburgh, USA, September 2003.
-
(2003)
Proceeding of Recent Advances in Intrusion Detection (RAID)-2003
-
-
Mahoney, M.1
Chan, P.2
-
11
-
-
80052008269
-
-
Irvine, CA, USA
-
KDD'99 datasets, The UCI KDD Archive, http://kdd.ics.uci.edu/databases/ kddcup99/kddcup99.html, Irvine, CA, USA, 1999.
-
(1999)
KDD'99 Datasets, the UCI KDD Archive
-
-
-
13
-
-
85047322127
-
An application of machine learning to network intrusion detection
-
Phoenix, AZ, USA
-
Sara Matzner Chris Sinclair, and Lyn Pierce, "An Application of Machine Learning to Network Intrusion Detection", Proceedings of the 15th Annual Computer Security Applications Conference, pp. 371-377, Phoenix, AZ, USA, 1999.
-
(1999)
Proceedings of the 15th Annual Computer Security Applications Conference
, pp. 371-377
-
-
Sinclair, S.M.C.1
Pierce, L.2
-
14
-
-
0034300835
-
Improving intrusion detection performance using keyword selection and neural networks
-
Richard P. Lippmann and Robert K. Cunningham, "Improving Intrusion Detection Performance Using Keyword Selection and Neural Networks", Computer Networks, 34:597-603, 2000.
-
(2000)
Computer Networks
, vol.34
, pp. 597-603
-
-
Lippmann, R.P.1
Cunningham, R.K.2
-
15
-
-
0034247240
-
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
-
Jianxiong Luo and Susan M. Bridges, "Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection", International Journal of Intelligent Systems, Vol. 15, No. 8, pp.687-704, 2000.
-
(2000)
International Journal of Intelligent Systems
, vol.15
, Issue.8
, pp. 687-704
-
-
Luo, J.1
Bridges, S.M.2
-
16
-
-
16244370106
-
Robust prediction of fault-proneness by random forests
-
Brittany, France, November
-
Lan Guo, Yan Ma, Bojan Cukic, and Harshinder Singh, "Robust Prediction of Fault-Proneness by Random Forests", Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE'04), pp. 417-428, Brittany, France, November 2004.
-
(2004)
Proceedings of the 15th International Symposium on Software Reliability Engineering (ISSRE'04)
, pp. 417-428
-
-
Guo, L.1
Ma, Y.2
Cukic, B.3
Singh, H.4
-
17
-
-
51349159085
-
Probability estimates for multi-class classification by pairwise coupling
-
December
-
Ting-Fan Wu, Chih-Jen Lin, and Ruby C. Weng, "Probability Estimates for Multi-class Classification by Pairwise Coupling", The Journal of Machine Learning Research, Volume 5, December 2004.
-
(2004)
The Journal of Machine Learning Research
, vol.5
-
-
Wu, T.-F.1
Lin, C.-J.2
Weng, R.C.3
-
20
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Eleazar Eskin, Andrew Arnold, Michael Prerau, Leonid Portnoy, and Salvatore Stolfo. "A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data." Applications of Data Mining in Computer Security, 2002.
-
(2002)
Applications of Data Mining in Computer Security
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
21
-
-
84861210802
-
-
The University of Waikato, Hamilton, New Zealand
-
WEKA software, Machine Learning, http://www.cs.waikato.ac.nz/ml/weka/The University of Waikato, Hamilton, New Zealand.
-
WEKA Software, Machine Learning
-
-
-
22
-
-
0041382385
-
-
University of California, Berkeley, CA, USA
-
Leo Breiman and Adele Cutler, Random forests, http://statwww.berkeley. edu/users/breiman/RandomForests/cc-home.htm, University of California, Berkeley, CA, USA.
-
Random forests
-
-
Breiman, L.1
Cutler, A.2
-
23
-
-
0003987805
-
-
The MIT Press, August
-
David J. Hand, Heikki Mannila, and Padhraic Smyth, Principles of Data Mining, The MIT Press, August, 2001.
-
(2001)
Principles of Data Mining
-
-
Hand, D.J.1
Mannila, H.2
Smyth, P.3
|