-
1
-
-
0031362016
-
Fraud detection and management in mobile telecommunications networks
-
London, April. ESAT-SISTA TR97-41
-
P. Burge, J. Shawe-Taylor, Y. Moreau, B. Preneel, C. Stoermann, and C. Cooke. Fraud detection and management in mobile telecommunications networks. In Proceedings of the European Conference on Security and Detection ECOS 97, London, April 1997. ESAT-SISTA TR97-41.
-
(1997)
Proceedings of the European Conference on Security and Detection ECOS 97
-
-
Burge, P.1
Shawe-Taylor, J.2
Moreau, Y.3
Preneel, B.4
Stoermann, C.5
Cooke, C.6
-
2
-
-
0033336136
-
Distributed data mining in credit card fraud detection
-
Nov/Dec.
-
P. K. Chan, W. Fan, A. L. Prodromidis, and S. J. Stolfo. Distributed data mining in credit card fraud detection. IEEE Intelligent Systems, 14(6), Nov/Dec 1999.
-
(1999)
IEEE Intelligent Systems
, vol.14
, Issue.6
-
-
Chan, P.K.1
Fan, W.2
Prodromidis, A.L.3
Stolfo, S.J.4
-
3
-
-
2542563730
-
-
Technical Report, IBM Research Division, Zurich Research Laboratory, Zurich, Switzerland, Mar.
-
H. Debar, M. Dacier, A. Wespi, and S. Lampart. An experimentation workbench for intrusion detection systems. Technical Report RZ2998, IBM Research Division, Zurich Research Laboratory, Zurich, Switzerland, Mar. 1998.
-
(1998)
An Experimentation Workbench for Intrusion Detection Systems
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
Lampart, S.4
-
4
-
-
33644961664
-
-
Technical Report Technical Report, MIT Lincoln Laboratory, Feb.
-
J. W. Haines, R. P. Lippmann, D. J. Fried, E. Tran, S. Boswell, and M. A. Zissman. 1999 darpa intrusion detection system evaluation: Design and procedures. Technical Report Technical Report 1062, MIT Lincoln Laboratory, Feb. 2001.
-
(2001)
1999 DARPA Intrusion Detection System Evaluation: Design and Procedures
-
-
Haines, J.W.1
Lippmann, R.P.2
Fried, D.J.3
Tran, E.4
Boswell, S.5
Zissman, M.A.6
-
5
-
-
24544465378
-
Combining fraud and intrusion detection - Meeting new requirements
-
Reykjavik, Iceland, Oct.
-
H. Kvarnström, E. Lundin, and E. Jonsson. Combining fraud and intrusion detection - meeting new requirements. In Proceedings of the fifth Nordic Workshop on Secure IT systems (Nord Sec2000), Reykjavik, Iceland, Oct. 2000.
-
(2000)
Proceedings of the Fifth Nordic Workshop on Secure IT Systems (Nord Sec2000)
-
-
Kvarnström, H.1
Lundin, E.2
Jonsson, E.3
-
7
-
-
84872315768
-
A synthetic fraud data generation methodology
-
Laboratories for Information Technology, Singapore, Dec. Springer Verlag
-
E. Lundin, H. Kvarnström, and E. Jonsson. A synthetic fraud data generation methodology. In Lecture Notes in Computer Science, ICICS 2002, Laboratories for Information Technology, Singapore, Dec. 2002. Springer Verlag.
-
(2002)
Lecture Notes in Computer Science, ICICS 2002
-
-
Lundin, E.1
Kvarnström, H.2
Jonsson, E.3
-
10
-
-
0001214789
-
A methodology for testing intrusion detection systems
-
N. J. Puketza, K. Zhang, M. Chung, B. Mukherjee, and R. A. Olsson. A methodology for testing intrusion detection systems. Software Engineering, 22(10), 1996.
-
Software Engineering
, vol.22
, Issue.10
, pp. 1996
-
-
Puketza, N.J.1
Zhang, K.2
Chung, M.3
Mukherjee, B.4
Olsson, R.A.5
-
11
-
-
0037252253
-
Determining the operational limits of an anomaly-based intrusion detector
-
Jan.
-
K. M. C. Tan and R. A. Maxion. Determining the operational limits of an anomaly-based intrusion detector. IEEE Journal on Selected Areas in Communication, 21(1), Jan. 2003.
-
(2003)
IEEE Journal on Selected Areas in Communication
, vol.21
, Issue.1
-
-
Tan, K.M.C.1
Maxion, R.A.2
|