-
1
-
-
4544229404
-
Adam: Detecting intrusions by data mining
-
IEEE Press, New York
-
Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting intrusions by data mining. In: IEEE Workshop on Information Assurance and Security, pp. 11-16. IEEE Press, New York (2001)
-
(2001)
IEEE Workshop on Information Assurance and Security
, pp. 11-16
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
2
-
-
85167528504
-
-
Syngress, Rockland
-
Beale, J., Foster, J.C., Posluns, J., Russell, R., Caswell, B.: Snort 2.0 Intrusion Detection. Syngress, Rockland (2003)
-
(2003)
Snort 2.0 Intrusion Detection
-
-
Beale, J.1
Foster, J.C.2
Posluns, J.3
Russell, R.4
Caswell, B.5
-
3
-
-
85025630499
-
-
Brandenburg University of Technology: Intrusion detection systems list and bibliography. http://www-rnks.informatik.tu-cottbus.de/en/node/209 (2004)
-
(2004)
-
-
-
4
-
-
77953651084
-
In-depth behavior understanding and use: The behavior informatics approach
-
Cao, L.: In-depth behavior understanding and use: The behavior informatics approach. Inf. Sci. 180,3067-3085 (2010). doi:10.1016/j.ins.2010.03.025
-
(2010)
Inf. Sci
, vol.180
, pp. 3067-3085
-
-
Cao, L.1
-
5
-
-
46649101343
-
Mining impact-targeted activity patterns in imbalanced data
-
Cao, L., Zhao, Y., Zhang, C.: Mining impact-targeted activity patterns in imbalanced data. IEEE Trans. Knowl. Data Eng. 20, 1053-1066 (2008). doi:10.1109/TKDE.2007.190635
-
(2008)
IEEE Trans. Knowl. Data Eng
, vol.20
, pp. 1053-1066
-
-
Cao, L.1
Zhao, Y.2
Zhang, C.3
-
6
-
-
38549100388
-
Activity mining: From activities to actions
-
Cao, L., Zhao, Y., Zhang, C., Zhang, H.: Activity mining: From activities to actions. Int. J. Inform. Technol. Decis. Mak. 7(02), 259-273 (2008). doi:10.1142/S0219622008002934
-
(2008)
Int. J. Inform. Technol. Decis. Mak
, vol.7
, Issue.2
, pp. 259-273
-
-
Cao, L.1
Zhao, Y.2
Zhang, C.3
Zhang, H.4
-
7
-
-
0033899045
-
Graph-based data mining
-
Cook, D.J., Holder, L.B.: Graph-based data mining. IEEE Intell. Syst. 15(2), 32-41 (2000)
-
(2000)
IEEE Intell. Syst
, vol.15
, Issue.2
, pp. 32-41
-
-
Cook, D.J.1
Holder, L.B.2
-
8
-
-
85025674948
-
-
Intellitactics, Inc.: Intellitactics security manager. http://www.intellitactics.com/int/products/securitymanager.asp (2009)
-
(2009)
-
-
-
9
-
-
3042631500
-
Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states
-
IEEE Press, New York
-
Isoda, Y., Kurakake, S., Nakano, H.: Ubiquitous sensors based human behavior modeling and recognition using a spatio-temporal representation of user states. In: 18th International Conference on Advanced Information Networking and Applications, pp. 512-517. IEEE Press, New York (2004)
-
(2004)
18Th International Conference on Advanced Information Networking and Applications
, pp. 512-517
-
-
Isoda, Y.1
Kurakake, S.2
Nakano, H.3
-
11
-
-
84940104123
-
A data mining framework for building intrusion detection models
-
IEEE Press, New York
-
Lee, W., Stolfo, S.J., Mok, K.W.: A data mining framework for building intrusion detection models. In: IEEE Symposium on Security and Privacy, pp. 120-132. IEEE Press, New York (1999)
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 120-132
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
12
-
-
4544296606
-
Smart card-based irregular access patterns detection system
-
IEEE Press, New York
-
Leong, A., Fong, S., Siu, S.: Smart card-based irregular access patterns detection system. In: IEEE International Conference on e-Technology, e-Commerce and e-Service, pp. 546-553. IEEE Press, New York (2004)
-
(2004)
IEEE International Conference on E-Technology, E-Commerce and E-Service
, pp. 546-553
-
-
Leong, A.1
Fong, S.2
Siu, S.3
-
13
-
-
1542299066
-
An efficient mining algorithm for frequent pattern in intrusion detection
-
IEEE Press, New York
-
Li, Q.H., Xiong, J.J., Yang, H.B.: An efficient mining algorithm for frequent pattern in intrusion detection. In: International Conference on Machine Learning and Cybernetic, pp. 138-142. IEEE Press, New York (2003)
-
(2003)
International Conference on Machine Learning and Cybernetic
, pp. 138-142
-
-
Li, Q.H.1
Xiong, J.J.2
Yang, H.B.3
-
14
-
-
78649697822
-
Landmarc: Indoor location sensing using active rfid
-
IEEE Comput. Soc., Los Alamitos
-
Ni, L.M., Liu, Y., Lau, Y.C., Patil, A.P.: LANDMARC: Indoor location sensing using active RFID. In: IEEE International Conference on Pervasive Computing and Communications, p. 407. IEEE Comput. Soc., Los Alamitos (2003)
-
(2003)
IEEE International Conference on Pervasive Computing and Communications
, pp. 407
-
-
Ni, L.M.1
Liu, Y.2
Lau, Y.C.3
Patil, A.P.4
-
15
-
-
0141499742
-
-
Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University
-
Portnoy, L.: Intrusion detection with unlabeled data using clustering. Undergraduate thesis, Data Mining Lab, Department of Computer Science, Columbia University (2000)
-
(2000)
Intrusion Detection with Unlabeled Data Using Clustering
-
-
Portnoy, L.1
-
16
-
-
0037142572
-
-
Qiao, Y., Xin, X.W., Bin, Y., Ge, S.: Anomaly intrusion detection method based on HMM. IET Electron. Lett. 38(13), 663-664 (2002)
-
(2002)
Anomaly Intrusion Detection Method Based on HMM
, vol.38
, Issue.13
, pp. 663-664
-
-
Qiao, Y.1
Xin, X.W.2
Bin, Y.3
Ge, S.4
-
17
-
-
34547921719
-
-
Syngress, Rockland
-
Thornton, F., Haines, B., Das, A., Campbell, A.: RFID Security. Syngress, Rockland (2006)
-
(2006)
RFID Security
-
-
Thornton, F.1
Haines, B.2
Das, A.3
Campbell, A.4
-
18
-
-
85025589084
-
-
Trend Micro, Inc.: OSSEC manual. http://www.ossec.net/main/manual (2009)
-
(2009)
-
-
-
19
-
-
36448973171
-
Cctv: Constant cameras track violators
-
US Department of Justice
-
US Department of Justice: CCTV: Constant cameras track violators. Natl. Inst. Justice J. 249, 16-23 (2003)
-
(2003)
Natl. Inst. Justice J
, vol.249
, pp. 16-23
-
-
-
20
-
-
85025637560
-
-
Wikipedia contributors: Protocol-based intrusion detection system. http://en.wikipedia.org/wiki/Protocol-based_intrusion_detection_system (2009)
-
(2009)
-
-
|