-
1
-
-
42049084142
-
Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace
-
Abbasi, A., Chen, H., Writeprints: a stylometric approach to identity-level identification and similarity detection in cyberspace. ACM Trans. Inf. Syst. 26:2 (2008), 1–29.
-
(2008)
ACM Trans. Inf. Syst.
, vol.26
, Issue.2
, pp. 1-29
-
-
Abbasi, A.1
Chen, H.2
-
2
-
-
84909959436
-
A survey of user modelling in social media websites
-
Abdel-Hafez, A., Xu, Y., A survey of user modelling in social media websites. Comput. Inf. Sci., 6(4), 2013.
-
(2013)
Comput. Inf. Sci.
, vol.6
, Issue.4
-
-
Abdel-Hafez, A.1
Xu, Y.2
-
3
-
-
84978974017
-
-
Detection of new malicious code using N-grams signatures. In: Proceeding of Second Annual Conference on Privacy, Security and Trust, October:
-
Abou-Assaleh, T., et al., 2004. Detection of new malicious code using N-grams signatures. In: Proceeding of Second Annual Conference on Privacy, Security and Trust, October: pp. 13–15.
-
(2004)
, pp. 13-15
-
-
Abou-Assaleh, T.1
-
4
-
-
84872013214
-
Detecting hoaxes, frauds, and deception in writing style online
-
In: Proceedings of the IEEE Symposium on Security and Privicy (Sp) pp. 461–475
-
Afroz, S., Brennan, M., Greenstadt, R., 2012. Detecting hoaxes, frauds, and deception in writing style online. In: Proceedings of the IEEE Symposium on Security and Privicy (Sp) pp. 461–475.
-
(2012)
-
-
Afroz, S.1
Brennan, M.2
Greenstadt, R.3
-
5
-
-
0031176923
-
Biometrics on smart cards: an approach to keyboard behavioral signature
-
Alexandre, T.J., Biometrics on smart cards: an approach to keyboard behavioral signature. Future Gener. Comput. Syst. 13 (1997), 19–26.
-
(1997)
Future Gener. Comput. Syst.
, vol.13
, pp. 19-26
-
-
Alexandre, T.J.1
-
6
-
-
0004048154
-
Computer Security Threat Monitoring and Surveillance
-
James P. Anderson Company Fort Washington, PA
-
Anderson, J.P., Computer Security Threat Monitoring and Surveillance. 1980, James P. Anderson Company, Fort Washington, PA.
-
(1980)
-
-
Anderson, J.P.1
-
7
-
-
84978953158
-
-
Astroturfing, 〈〉
-
Astroturfing, 〈 https://en.wikipedia.org/wiki/Astroturfing〉.
-
-
-
-
8
-
-
84898070087
-
User identification and authentication using multi-modal behavioral biometrics
-
Bailey, K.O., Okolica, J.S., Peterson, G.L., User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43 (2014), 77–89.
-
(2014)
Comput. Secur.
, vol.43
, pp. 77-89
-
-
Bailey, K.O.1
Okolica, J.S.2
Peterson, G.L.3
-
9
-
-
78650465720
-
Word length n-grams for text re-use detection
-
2010: p. 687-699
-
Barron-Cedeno, A., et al. Word length n-grams for text re-use detection. Comput. Linguist. Intell. Text Process., 2010, 687–699 2010: p. 687-699.
-
(2010)
Comput. Linguist. Intell. Text Process.
, pp. 687-699
-
-
Barron-Cedeno, A.1
-
10
-
-
10644257876
-
Modelling and solving the intrusion detection problem in computer networks
-
Beghdad, R., Modelling and solving the intrusion detection problem in computer networks. Comput. Secur. 23:8 (2004), 687–696.
-
(2004)
Comput. Secur.
, vol.23
, Issue.8
, pp. 687-696
-
-
Beghdad, R.1
-
11
-
-
12744252161
-
Identity verification through dynamic keystroke analysis
-
7(5): p. 469-496
-
Bergadano, F., Gunetti, D., Picardi, C., Identity verification through dynamic keystroke analysis. Intell. Data Anal 7:5 (2003), 469–496 7(5): p. 469-496.
-
(2003)
Intell. Data Anal
, vol.7
, Issue.5
, pp. 469-496
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
12
-
-
84979081141
-
-
Astroturfing: what is it and why does it matter? 〈〉,
-
Bienkov, A., Astroturfing: what is it and why does it matter? 〈 http://www.theguardian.com/commentisfree/2012/feb/08/what-is-astroturfing〉, 2012.
-
(2012)
-
-
Bienkov, A.1
-
13
-
-
0035665469
-
A comparison of Intrusion Detection systems
-
Biermann, E., A comparison of Intrusion Detection systems. Comput. Secur. 20 (2001), 676–683.
-
(2001)
Comput. Secur.
, vol.20
, pp. 676-683
-
-
Biermann, E.1
-
14
-
-
78651410113
-
-
An android application sandbox system for suspicious software detection. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software (Malware 2010) (MALWARE'2010), Nancy, France, France.
-
Blasing, T., et al., 2010. An android application sandbox system for suspicious software detection. In: Proceedings of the 5th International Conference on Malicious and Unwanted Software (Malware 2010) (MALWARE'2010), Nancy, France, France.
-
(2010)
-
-
Blasing, T.1
-
15
-
-
0035037553
-
Adaptive Hypermedia
-
User Modeling and User-Adapted Interaction, Vol. 11, no. 1, pp. 87–110.
-
Brusilovsky, P., 2001. Adaptive Hypermedia. User Modeling and User-Adapted Interaction, Vol. 11, no. 1, pp. 87–110.
-
(2001)
-
-
Brusilovsky, P.1
-
16
-
-
0142222738
-
Detection and classification of intrusions and faults using sequences of system calls
-
Cabrera, J.B.D., Lewis, L., Mehra, R.K., Detection and classification of intrusions and faults using sequences of system calls. SIGMOD Rec. 30:4 (2001), 25–34.
-
(2001)
SIGMOD Rec.
, vol.30
, Issue.4
, pp. 25-34
-
-
Cabrera, J.B.D.1
Lewis, L.2
Mehra, R.K.3
-
17
-
-
84858698273
-
Unsupervised network intrusion detection systems: detecting the unknown without knowledge
-
Casas, P., Mazel, J., Owezarski, P., Unsupervised network intrusion detection systems: detecting the unknown without knowledge. Comput. Commun. 35:7 (2012), 772–783.
-
(2012)
Comput. Commun.
, vol.35
, Issue.7
, pp. 772-783
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
18
-
-
0002636321
-
N-gram-based text categorization
-
In Proceedings of 3rd Annual Symposium on Document Analysis and Information Retrieval, SDAIR-94
-
Cavnar, W.B., J.M. Trenkle, 1994. N-gram-based text categorization. In Proceedings of 3rd Annual Symposium on Document Analysis and Information Retrieval, SDAIR-94, pp. 161–175.
-
(1994)
, pp. 161-175
-
-
Cavnar, W.B.1
Trenkle, J.M.2
-
19
-
-
68049121093
-
Anomaly detection
-
Chandola, V.A., Banerjee, Kumar, V., Anomaly detection. ACM Comput. Surv. 41:3 (2009), 1–58.
-
(2009)
ACM Comput. Surv.
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.A.1
Banerjee2
Kumar, V.3
-
20
-
-
84859722266
-
Anomaly detection for discrete sequences: a survey
-
Chandola, V.,B.A., Kumar, V., Anomaly detection for discrete sequences: a survey. IEEE Trans. Knowl. Data Eng. 24:5 (2012), 823–839.
-
(2012)
IEEE Trans. Knowl. Data Eng.
, vol.24
, Issue.5
, pp. 823-839
-
-
Chandola, V.B.A.1
Kumar, V.2
-
21
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
Chebrolua, S., Abrahama, A., Thomas, J.P., Feature deduction and ensemble design of intrusion detection systems. Comput Secur 24 (2005), 295–307.
-
(2005)
Comput Secur
, vol.24
, pp. 295-307
-
-
Chebrolua, S.1
Abrahama, A.2
Thomas, J.P.3
-
22
-
-
84893309191
-
-
Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13,
-
Chen, C.M., et al., 2013. Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13, pp. 116–120.
-
(2013)
, pp. 116-120
-
-
Chen, C.M.1
-
23
-
-
84893309191
-
-
Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13,
-
Chen, C.M., et al., 2013. Battling the internet water army: detection of hidden paid posters. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, ASONAM'13, pp. 116–120.
-
(2013)
, pp. 116-120
-
-
Chen, C.M.1
-
24
-
-
23044525410
-
Signature-based methods for data streams
-
Cortes, C., Pregibon, D., Signature-based methods for data streams. Data Min. Knowl. Discov. 5 (2001), 167–182.
-
(2001)
Data Min. Knowl. Discov.
, vol.5
, pp. 167-182
-
-
Cortes, C.1
Pregibon, D.2
-
25
-
-
80051793908
-
Data preprocessing for anomaly based network intrusion detection
-
Davis, J., Clark, A., Data preprocessing for anomaly based network intrusion detection. A Rev. Comput. Secur. 30 (2011), 353–375.
-
(2011)
A Rev. Comput. Secur.
, vol.30
, pp. 353-375
-
-
Davis, J.1
Clark, A.2
-
26
-
-
0023294428
-
An intrusion detection model
-
Denning, D.E., An intrusion detection model. IEEE Trans. Softw. Eng. SE-13:2 (1987), 222–233.
-
(1987)
IEEE Trans. Softw. Eng.
, vol.SE-13
, Issue.2
, pp. 222-233
-
-
Denning, D.E.1
-
27
-
-
85008024136
-
An information security pioneer
-
Eugene, S., An information security pioneer. IEEE Secur. Priv., 6(1), 2008, 9.
-
(2008)
IEEE Secur. Priv.
, vol.6
, Issue.1
, pp. 9
-
-
Eugene, S.1
-
28
-
-
34250689178
-
-
F., Q. and C. J., 2006. Automatic identification of user interest for personalized search. In: Proceedings of the 15th Intnational World Wide Web Conference,
-
F., Q. and C. J., 2006. Automatic identification of user interest for personalized search. In: Proceedings of the 15th Intnational World Wide Web Conference, 2006: pp. 727–736.
-
(2006)
, pp. 727-736
-
-
-
29
-
-
0029716418
-
-
1996. A sense of self for Unix processes. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press,
-
Forrest, S., et al., 1996. A sense of self for Unix processes. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1996: pp. 120–128.
-
(1996)
, pp. 120-128
-
-
Forrest, S.1
-
30
-
-
84973877588
-
Statistical Stylometrics and the Marlowe-Shakespeare Authorship Debate
-
Fox, N., Ehmoda, O., Charniak, E., 2012. Statistical Stylometrics and the Marlowe-Shakespeare Authorship Debate.
-
(2012)
-
-
Fox, N.1
Ehmoda, O.2
Charniak, E.3
-
31
-
-
34247150712
-
-
2006. Effective identification of source code authors using byte-level information. In: Proceedings of the 28th International Conference on Software engineering, ICSE'06
-
Frantzeskou, G., et al., 2006. Effective identification of source code authors using byte-level information. In: Proceedings of the 28th International Conference on Software engineering, ICSE'06, pp. 893–896.
-
-
-
Frantzeskou, G.1
-
32
-
-
36949007362
-
Challenging the anomaly detection paradigm: a provocative discussion
-
In: Proceedings of the 2006 Workshop on New Security Paradigms, ACM, Germany,
-
Gates, C. and C. Taylor, 2006. Challenging the anomaly detection paradigm: a provocative discussion. In: Proceedings of the 2006 Workshop on New Security Paradigms, ACM, Germany, pp. 21–29.
-
(2006)
, pp. 21-29
-
-
Gates, C.1
Taylor, C.2
-
33
-
-
0036930259
-
-
2002. Using data mining to discover singatures in network-based intrusiton detection. Proceedmgs of the First International Conference on Machme Learmng and Cybemeucs, Beqmg, 4–5 November
-
Han, H., X.-l. Lu, and L.-y. Ren, 2002. Using data mining to discover singatures in network-based intrusiton detection. Proceedmgs of the First International Conference on Machme Learmng and Cybemeucs, Beqmg, 4–5 November 2002.
-
(2002)
-
-
Han, H.1
Lu, X.-l.2
Ren, L.-y.3
-
34
-
-
35648941630
-
Bigrams of syntactic labels for authorship discrimination of short texts
-
Hirst, G., Feiguina, O., Bigrams of syntactic labels for authorship discrimination of short texts. Lit. Linguist. Comput. 22:4 (2007), 405–417.
-
(2007)
Lit. Linguist. Comput.
, vol.22
, Issue.4
, pp. 405-417
-
-
Hirst, G.1
Feiguina, O.2
-
35
-
-
33750271571
-
N-gram feature selection for authorship identification AIMSA 2006, LNCS(LNAI)
-
Houvardas, J., Stamatatos, E., N-gram feature selection for authorship identification AIMSA 2006, LNCS(LNAI)., 4183, 2006, 77–86.
-
(2006)
, vol.4183
, pp. 77-86
-
-
Houvardas, J.1
Stamatatos, E.2
-
36
-
-
84888986410
-
Naive Bayes spam filtering using word-position-based attributes
-
In: Proceedings of the Second Conference on Email and Anti-spam, CEAS, Stanford University.
-
Hovold, J., 2005. Naive Bayes spam filtering using word-position-based attributes. In: Proceedings of the Second Conference on Email and Anti-spam, CEAS, Stanford University.
-
(2005)
-
-
Hovold, J.1
-
37
-
-
84979005330
-
-
http://www.myersbriggs.org/my-mbti-personality-type/mbti-basics/.
-
-
-
-
38
-
-
80955142792
-
Masquerade detection using profile hidden Markov models
-
Huang, L., Stamp, M., Masquerade detection using profile hidden Markov models. Comput. Secur. 30:8 (2011), 732–747.
-
(2011)
Comput. Secur.
, vol.30
, Issue.8
, pp. 732-747
-
-
Huang, L.1
Stamp, M.2
-
39
-
-
78449239926
-
Mining writeprints from anonymous e-mails for forensic investigation
-
Iqbal, F., et al. Mining writeprints from anonymous e-mails for forensic investigation. Digit Investig. 7:1–2 (2010), 56–64.
-
(2010)
Digit Investig.
, vol.7
, Issue.1-2
, pp. 56-64
-
-
Iqbal, F.1
-
40
-
-
48749129671
-
A novel approach of mining write-prints for authorship attribution in e-mail forensics
-
Iqbal, F., et al. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit Investig. 5 (2008), S42–S51.
-
(2008)
Digit Investig.
, vol.5
, pp. S42-S51
-
-
Iqbal, F.1
-
41
-
-
48349134267
-
Behavioral detection of malware: from a survey towards an established taxonomy
-
Jacob, G., Debar, H., Filiol, E., Behavioral detection of malware: from a survey towards an established taxonomy. J. Comput. Virol. 4:3 (2008), 251–266.
-
(2008)
J. Comput. Virol.
, vol.4
, Issue.3
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
42
-
-
71749115294
-
A Novel Approach to Design of User Re-Authentication Systems
-
Jagadeesan, H. and M.S. Hsiao, 2009. A Novel Approach to Design of User Re-Authentication Systems.
-
(2009)
-
-
Jagadeesan, H.1
Hsiao, M.S.2
-
43
-
-
84883794568
-
Understanding user behavior in online social networks: a survey
-
Jin, L., et al. Understanding user behavior in online social networks: a survey. IEEE Commun. Mag., 2013, 143–150.
-
(2013)
IEEE Commun. Mag.
, pp. 143-150
-
-
Jin, L.1
-
44
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Jøsang, A., Ismail, R., Boyd, C., A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43:2 (2007), 618–644.
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
45
-
-
78049354490
-
An insider threat prediction model
-
Kandias, M., et al. An insider threat prediction model. Trust, Priv. Secur. Digit Bus. 6264 (2010), 26–37.
-
(2010)
Trust, Priv. Secur. Digit Bus.
, vol.6264
, pp. 26-37
-
-
Kandias, M.1
-
46
-
-
84978991472
-
-
2003. N-gram-based author profiles for authorship attribution. In: Proceedings of the Pacific Association for Computational Linguistics.
-
Keselj, V., et al., 2003. N-gram-based author profiles for authorship attribution. In: Proceedings of the Pacific Association for Computational Linguistics, pp. 255–264.
-
-
-
Keselj, V.1
-
47
-
-
84971268778
-
Cloud log forensics: foundations, state of the art, and future directions
-
Article 7
-
Khan, S., Gani, A., Abdul Wahab, A., Bagiwa, M., Shiraz, M., Khan, S., Buyya, R., Zomaya, A., Cloud log forensics: foundations, state of the art, and future directions. ACM Comput. Surv., 49(1), 2016 Article 7.
-
(2016)
ACM Comput. Surv.
, vol.49
, Issue.1
-
-
Khan, S.1
Gani, A.2
Abdul Wahab, A.3
Bagiwa, M.4
Shiraz, M.5
Khan, S.6
Buyya, R.7
Zomaya, A.8
-
48
-
-
84880119198
-
A comprehensive survey on anomaly-based intrusion detection in MANET
-
Kheyri, D., Karami, M., A comprehensive survey on anomaly-based intrusion detection in MANET. Comput. Inf. Sci., 5, 2012, 4.
-
(2012)
Comput. Inf. Sci.
, vol.5
, pp. 4
-
-
Kheyri, D.1
Karami, M.2
-
49
-
-
84935000760
-
A user authentication scheme using physiological and behavioral biometrics for multitouch devices
-
Koong, C.S., Yang, T.I., Tseng, C.C., A user authentication scheme using physiological and behavioral biometrics for multitouch devices. Sci. World J., 2014, 2014, 781234.
-
(2014)
Sci. World J.
, vol.2014
, pp. 781234
-
-
Koong, C.S.1
Yang, T.I.2
Tseng, C.C.3
-
50
-
-
58449112832
-
Computational methods in authorship attribution
-
Koppel, M., Schler, J., Argamon, S., Computational methods in authorship attribution. J. Am. Soc. Inf. Sci. Technol. 60:1 (2009), 9–26.
-
(2009)
J. Am. Soc. Inf. Sci. Technol.
, vol.60
, Issue.1
, pp. 9-26
-
-
Koppel, M.1
Schler, J.2
Argamon, S.3
-
51
-
-
0003027845
-
An application of machine learning to anomaly detection
-
In: Proceedings of the 20th National Information Systems Security Conference,
-
Lane, T. and C.E. Brodley, 1997. An application of machine learning to anomaly detection. In: Proceedings of the 20th National Information Systems Security Conference, pp. 366–380.
-
(1997)
, pp. 366-380
-
-
Lane, T.1
Brodley, C.E.2
-
52
-
-
34250174828
-
Windows NT User profiling for masquerader detection
-
In: Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06. pp. 386–391.
-
Li, L., S. Sui, and C.N. Manikopoulos, 2006. Windows NT User profiling for masquerader detection. In: Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC'06. pp. 386–391.
-
(2006)
-
-
Li, L.1
Sui, S.2
Manikopoulos, C.N.3
-
53
-
-
84874336594
-
Detecting anomalous user behaviors in workflow-driven web applications
-
In: Proceedings of the 31st International Symposium on Reliable Distributed Systems (SRDS 2012)
-
Li, X., Y. Xue, and B. Malin, 2012. Detecting anomalous user behaviors in workflow-driven web applications. In: Proceedings of the 31st International Symposium on Reliable Distributed Systems (SRDS 2012), pp. 1–10.
-
(2012)
, pp. 1-10
-
-
Li, X.1
Xue, Y.2
Malin, B.3
-
54
-
-
33745456200
-
-
2005. Fileprints: identifying file types by N-gram analysis. In: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
-
Li, W.-J., et al., 2005. Fileprints: identifying file types by N-gram analysis. In: Proceedings of the 2005 IEEE Workshop on Information Assurance and Security, pp. 64–71.
-
-
-
Li, W.-J.1
-
55
-
-
84871186619
-
Detection of anomalies from user profiles generated from system
-
In: Proceeding AISC'11 Proceedings of the Ninth Australasian Information Security Conference, 116: pp. 23–32.
-
Corney, M., Mohay, G., 2011. Detection of anomalies from user profiles generated from system. In: Proceeding AISC'11 Proceedings of the Ninth Australasian Information Security Conference, 116: pp. 23–32.
-
(2011)
, pp. 23-32
-
-
Corney, M.1
Mohay, G.2
-
56
-
-
84978958809
-
-
〈〉, April 17,
-
Maor, E., 〈 https://securityintelligence.com/behavioral-profiling-finding-man-wasnt/〉, April 17, 2013.
-
(2013)
-
-
Maor, E.1
-
57
-
-
0034593307
-
Characterizing the behaviour of a program using multiple-length N-grams
-
In: Proceedings of the 2000 Workshop on New Security Paradigms, ACM, Ballycotton, County Cork, Ireland, pp. 101–110.
-
Marceau, C., 2000. Characterizing the behaviour of a program using multiple-length N-grams. In: Proceedings of the 2000 Workshop on New Security Paradigms, ACM, Ballycotton, County Cork, Ireland, pp. 101–110.
-
(2000)
-
-
Marceau, C.1
-
58
-
-
84920152770
-
Distributed filesystem forensics: XtreemFS as a case study
-
Martini, B., Choo, K.-K.R., Distributed filesystem forensics: XtreemFS as a case study. Digit Investig. 11:4 (2014), 295–313.
-
(2014)
Digit Investig.
, vol.11
, Issue.4
, pp. 295-313
-
-
Martini, B.1
Choo, K.-K.R.2
-
59
-
-
84979072645
-
-
Analyzing behaviorial features for email classification. In: Prodeedings of the IEEE Second Conference on Email and Anti-Spam (CEAS 2005).
-
Martin, S., et al., 2005. Analyzing behaviorial features for email classification. In: Prodeedings of the IEEE Second Conference on Email and Anti-Spam (CEAS 2005).
-
(2005)
-
-
Martin, S.1
-
60
-
-
84889882586
-
Generating profile-based signatures for online intrusion and failure detection
-
Masri, W., Assi, R.A., El-Ghali, M., Generating profile-based signatures for online intrusion and failure detection. Inf. Softw. Technol. 56:2 (2014), 238–251.
-
(2014)
Inf. Softw. Technol.
, vol.56
, Issue.2
, pp. 238-251
-
-
Masri, W.1
Assi, R.A.2
El-Ghali, M.3
-
61
-
-
38549122470
-
A hybrid model to detect malicious executables
-
In: Proceedings of the IEEE International Conference on Communication (ICC'07), pp. 1443–1448.
-
Masud, M.M., L. Khan, and B. Thuraisingham, 2007. A hybrid model to detect malicious executables. In: Proceedings of the IEEE International Conference on Communication (ICC'07), pp. 1443–1448.
-
(2007)
-
-
Masud, M.M.1
Khan, L.2
Thuraisingham, B.3
-
62
-
-
1542378274
-
Masquerade detection using enriched command lines
-
In: Proceedings of International Conference on Dependable Systems and Networks, pp. 5–14.
-
Maxion, R.A., 2003. Masquerade detection using enriched command lines. In: Proceedings of International Conference on Dependable Systems and Networks, pp. 5–14.
-
(2003)
-
-
Maxion, R.A.1
-
63
-
-
39049118332
-
An autonomic intrusion detection system based on behavioural network engineering
-
In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006. pp. 1–2.
-
Mazzariello, C. and F. Oliviero, 2006. An autonomic intrusion detection system based on behavioural network engineering. In: Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006. pp. 1–2.
-
(2006)
-
-
Mazzariello, C.1
Oliviero, F.2
-
64
-
-
84864573221
-
User identification via process profiling: extended abstract
-
In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies,
-
McKinney, S. and D.S. Reeves, 2009. User identification via process profiling: extended abstract. In: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies, pp. 1–4.
-
(2009)
, pp. 1-4
-
-
McKinney, S.1
Reeves, D.S.2
-
65
-
-
84861083700
-
-
A user profile modeling using social annotations: a survey. In: Proceedings of the 21st International Conference Companion on World Wide Web, 12 Companion
-
Mezghani, M., et al., 2012. A user profile modeling using social annotations: a survey. In: Proceedings of the 21st International Conference Companion on World Wide Web, WWW'12 Companion, pp. 969–976.
-
(2012)
, pp. 969-976
-
-
Mezghani, M.1
-
66
-
-
84901192690
-
A survey of intrusion detection techniques for cyber-physical systems
-
Mitchell, R., Chen, I.-R., A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. 46:4 (2014), 1–29.
-
(2014)
ACM Comput. Surv.
, vol.46
, Issue.4
, pp. 1-29
-
-
Mitchell, R.1
Chen, I.-R.2
-
67
-
-
84900637145
-
A survey of intrusion detection in wireless network applications
-
Mitchell, R., Chen, I.-R., A survey of intrusion detection in wireless network applications. Comput. Commun. 42 (2014), 1–23.
-
(2014)
Comput. Commun.
, vol.42
, pp. 1-23
-
-
Mitchell, R.1
Chen, I.-R.2
-
68
-
-
80455177941
-
Towards cyber defense: research in intrusion detection and intrusion prevention systems
-
Mohammad Faysel, S.H., Towards cyber defense: research in intrusion detection and intrusion prevention systems. Int. J. Comput. Sci. Netw. Secur. 10:7 (2010), 316–325.
-
(2010)
Int. J. Comput. Sci. Netw. Secur.
, vol.10
, Issue.7
, pp. 316-325
-
-
Mohammad Faysel, S.H.1
-
69
-
-
84894646147
-
Network anomaly detection: methods, systems and tools
-
Monowar, H., Bhuyan, D.K.B., Kalita, J.K., Network anomaly detection: methods, systems and tools. IEEE Commun. Surv. Tutorials 16:1 (2013), 303–336.
-
(2013)
IEEE Commun. Surv. Tutorials
, vol.16
, Issue.1
, pp. 303-336
-
-
Monowar, H.1
Bhuyan, D.K.B.2
Kalita, J.K.3
-
70
-
-
79958717547
-
Lie to me: Deceit detection via online behavioral learning
-
In: Proceedings of the IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011), pp. 24.
-
Bhaskaran, N., Frank, M., 2011. Lie to me: Deceit detection via online behavioral learning. In: Proceedings of the IEEE International Conference on Automatic Face & Gesture Recognition and Workshops (FG 2011), pp. 24.
-
(2011)
-
-
Bhaskaran, N.1
Frank, M.2
-
71
-
-
84956680241
-
Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
-
Osanaiye, O., Choo, K.-K.R., Dlodloa, M., Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework. J. Netw. Comput. Appl. 67 (2016), 147–165.
-
(2016)
J. Netw. Comput. Appl.
, vol.67
, pp. 147-165
-
-
Osanaiye, O.1
Choo, K.-K.R.2
Dlodloa, M.3
-
72
-
-
84969794985
-
-
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, b, Paper no. 130
-
Osanaiye O., Cai H., Choo K.-K. R., Dehghantanha A., Xu Z., Dlodlo M. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking, 2016b, Paper no. 130.
-
(2016)
-
-
Osanaiye, O.1
Cai, H.2
Choo, K.-K.R.3
Dehghantanha, A.4
Xu, Z.5
Dlodlo, M.6
-
73
-
-
77954581921
-
User modelling for exclusion and anomaly detection: a behavioural intrusion detection system
-
In: Proceedings of User Modeling, Adaptation, and Personalization, 6075: pp. 207–218.
-
Pannell, G. and H. Ashman, 2010. User modelling for exclusion and anomaly detection: a behavioural intrusion detection system. In: Proceedings of User Modeling, Adaptation, and Personalization, 6075: pp. 207–218.
-
(2010)
-
-
Pannell, G.1
Ashman, H.2
-
74
-
-
84864544159
-
Anomaly detection over user profiles for intrusion detection
-
In: Proceedings of the 8th Australian Information Security Mangement Conference.
-
Pannell, G. and H. Ashman, 2010. Anomaly detection over user profiles for intrusion detection. In: Proceedings of the 8th Australian Information Security Mangement Conference.
-
(2010)
-
-
Pannell, G.1
Ashman, H.2
-
75
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Patcha, A., Park, J.-M., An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Netw. 51:12 (2007), 3448–3470.
-
(2007)
Comput. Netw.
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
76
-
-
84964331105
-
Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles
-
Peng, J., Choo, K.-K.R., Ashman, H., Bit-level n-gram based forensic authorship analysis on social media: Identifying individuals from linguistic profiles. J. Netw. Comput. Appl. 70 (2016), 171–182.
-
(2016)
J. Netw. Comput. Appl.
, vol.70
, pp. 171-182
-
-
Peng, J.1
Choo, K.-K.R.2
Ashman, H.3
-
77
-
-
78651392217
-
Storage-based intrusion detection
-
Pennington, A., et al. Storage-based intrusion detection. ACM Trans. Inf. Syst. Secur., 13, 2010, 4.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, pp. 4
-
-
Pennington, A.1
-
78
-
-
84978953555
-
-
Plagiarism detection, 〈
-
Plagiarism detection, 〈 https://en.wikipedia.org/wiki/Plagiarism_detection.
-
-
-
-
79
-
-
84902429611
-
-
Quick, D., Martini, B., Choo, K.-K.R., Cloud storage forensics, 2013, 23–61.
-
(2013)
Cloud storage forensics
, pp. 23-61
-
-
Quick, D.1
Martini, B.2
Choo, K.-K.R.3
-
80
-
-
84916918767
-
A survey of information security incident handling in the cloud
-
Rahman, N.H.A., Choo, K.-K.R., A survey of information security incident handling in the cloud. Comput. Secur. 49 (2015), 45–69.
-
(2015)
Comput. Secur.
, vol.49
, pp. 45-69
-
-
Rahman, N.H.A.1
Choo, K.-K.R.2
-
81
-
-
79955135282
-
-
a. Detecting and tracking the spread of astroturf memes in microblog streams. Proceedings of the 20th International Conference Companion on World Wide Web
-
Ratkiewicz, J., M. Conover, and M. Meiss, 2011a. Detecting and tracking the spread of astroturf memes in microblog streams. Proceedings of the 20th International Conference Companion on World Wide Web, WWW'11; pp. 249–252.
-
(2011)
, pp. 249-252
-
-
Ratkiewicz, J.1
Conover, M.2
Meiss, M.3
-
82
-
-
84978992891
-
-
b. Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media.
-
Ratkiewicz, J., et al., 2001b. Detecting and tracking political abuse in social media. In: Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media.
-
(2001)
-
-
Ratkiewicz, J.1
-
83
-
-
60349131555
-
A bioinformatics based approach to user authentication via keystroke dynamics
-
Revett, K., A bioinformatics based approach to user authentication via keystroke dynamics. Int J Control, Autom Syst 7:1 (2009), 7–15.
-
(2009)
Int J Control, Autom Syst
, vol.7
, Issue.1
, pp. 7-15
-
-
Revett, K.1
-
84
-
-
79956028075
-
Characterizing kernel malware behavior with kernel data access patterns
-
In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, pp. 207–216.
-
Rhee, J., Z. Lin, and D. Xu, 2011. Characterizing kernel malware behavior with kernel data access patterns. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, pp. 207–216.
-
(2011)
-
-
Rhee, J.1
Lin, Z.2
Xu, D.3
-
85
-
-
4544353927
-
Multiple self-organizing maps for intrusion detection
-
In: Proceedings of the 23rd National Information Systems Security Conference. Baltimore, MD.
-
Rhodes, B., J. Mahaffey, and J. Cannady, 2000. Multiple self-organizing maps for intrusion detection. In: Proceedings of the 23rd National Information Systems Security Conference. Baltimore, MD.
-
(2000)
-
-
Rhodes, B.1
Mahaffey, J.2
Cannady, J.3
-
86
-
-
84901236733
-
A survey on ontologies for human behavior recognition
-
Rodríguez, N.D., et al. A survey on ontologies for human behavior recognition. ACM Comput. Surv. 46:4 (2014), 1–33.
-
(2014)
ACM Comput. Surv.
, vol.46
, Issue.4
, pp. 1-33
-
-
Rodríguez, N.D.1
-
87
-
-
84922160391
-
Using a Variety of n-Grams for the Detection of Different Kinds of Plagiarism
-
Valencia España
-
Shrestha, P., Solorio, T., Using a Variety of n-Grams for the Detection of Different Kinds of Plagiarism. Notebook for PAN at CLEF 2013, 2013, Valencia, España.
-
(2013)
Notebook for PAN at CLEF 2013
-
-
Shrestha, P.1
Solorio, T.2
-
88
-
-
62549150881
-
A survey of modern authorship attribution methods
-
Stamatatos, E., A survey of modern authorship attribution methods. J. Am. Soc. Inf. Sci. Technol. 60:3 (2009), 538–556.
-
(2009)
J. Am. Soc. Inf. Sci. Technol.
, vol.60
, Issue.3
, pp. 538-556
-
-
Stamatatos, E.1
-
89
-
-
84887467907
-
Intrinsic plagiarism detection using character n-gram profiles
-
In: Proceedings of the SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (PAN 2009), pp. 38–46.
-
Stamatatos, E., 2009. Intrinsic plagiarism detection using character n-gram profiles. In: Proceedings of the SEPLN 2009 Workshop on Uncovering Plagiarism, Authorship, and Social Software Misuse (PAN 2009), pp. 38–46.
-
(2009)
-
-
Stamatatos, E.1
-
90
-
-
77953759247
-
-
Decision tree classifier for network intrusiondetection with GA-based feature selection. In: Proceedings of the 43rd Annual Southeast Regional Conference, 2,
-
Stein, G., et al., 2005. Decision tree classifier for network intrusiondetection with GA-based feature selection. In: Proceedings of the 43rd Annual Southeast Regional Conference, 2, pp. 136–141.
-
(2005)
, pp. 136-141
-
-
Stein, G.1
-
91
-
-
79952311058
-
Intrinsic plagiarism analysis
-
Stein, B., Lipka, N., Prettenhofer, P., Intrinsic plagiarism analysis. Lang Resour Eval 45:1 (2010), 63–82.
-
(2010)
Lang Resour Eval
, vol.45
, Issue.1
, pp. 63-82
-
-
Stein, B.1
Lipka, N.2
Prettenhofer, P.3
-
92
-
-
60649109609
-
On the use of decision trees as behavioral approaches in intrusion detection
-
In: Proceedings of the Seventh International Conference on Machine Learning and Applications, pp. 665–670.
-
Tabia, K. and S. Benferhat, 2008. On the use of decision trees as behavioral approaches in intrusion detection. In: Proceedings of the Seventh International Conference on Machine Learning and Applications, pp. 665–670.
-
(2008)
-
-
Tabia, K.1
Benferhat, S.2
-
93
-
-
0022129862
-
Identity verification through keyboard characteristics
-
Umphress, D., Williams, G., Identity verification through keyboard characteristics. Int. J. Man-Mach. Stud. 23:3 (1985), 263–273.
-
(1985)
Int. J. Man-Mach. Stud.
, vol.23
, Issue.3
, pp. 263-273
-
-
Umphress, D.1
Williams, G.2
-
94
-
-
77952924818
-
Efficient signature based malware detection on mobile devices
-
Venugopala, D., Hu, G., Efficient signature based malware detection on mobile devices. Mob. Inf. Syst. 4 (2008), 33–49.
-
(2008)
Mob. Inf. Syst.
, vol.4
, pp. 33-49
-
-
Venugopala, D.1
Hu, G.2
-
95
-
-
69949085708
-
Automated stress detection using keystroke and linguistic features: an exploratory study
-
Vizer, L.M., Zhou, L., Sears, A., Automated stress detection using keystroke and linguistic features: an exploratory study. Int. J. Human-Comput. Stud. 67:10 (2009), 870–886.
-
(2009)
Int. J. Human-Comput. Stud.
, vol.67
, Issue.10
, pp. 870-886
-
-
Vizer, L.M.1
Zhou, L.2
Sears, A.3
-
96
-
-
84928939574
-
A survey on trust and reputation models for web services: single, composite, and communities
-
Wahab, O.A., et al. A survey on trust and reputation models for web services: single, composite, and communities. Decis. Support. Syst. 74 (2015), 121–134.
-
(2015)
Decis. Support. Syst.
, vol.74
, pp. 121-134
-
-
Wahab, O.A.1
-
97
-
-
33847219025
-
-
Woodhams, Jessica; Toye, Kirsty. 2007. An empirical test of the assumptions of case linkage and offender profiling with serial commercial robberies Psychology, Public Policy, and Law, 13, (1): pp. 59–85. 〈
-
Woodhams, Jessica; Toye, Kirsty. 2007. An empirical test of the assumptions of case linkage and offender profiling with serial commercial robberies Psychology, Public Policy, and Law, 13, (1): pp. 59–85. 〈 http://dx.doi.org/10.1037/1076-8971.13.1.59.
-
(2007)
-
-
-
98
-
-
84889045953
-
-
A close look on n-grams in intrusion detection: anomaly detection vs. classificatio. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security,
-
Wressnegger, C., et al., 2013. A close look on n-grams in intrusion detection: anomaly detection vs. classificatio. In: Proceedings of the 2013 ACM Workshop on Artificial Intelligence and Security, pp. 67–76.
-
(2013)
, pp. 67-76
-
-
Wressnegger, C.1
-
99
-
-
70350134739
-
The use of computational intelligence in intrusion detection systems: a review
-
Wu, S.X., Banzhaf, W., The use of computational intelligence in intrusion detection systems: a review. Appl. Soft Comput. 10:1 (2010), 1–35.
-
(2010)
Appl. Soft Comput.
, vol.10
, Issue.1
, pp. 1-35
-
-
Wu, S.X.1
Banzhaf, W.2
-
100
-
-
84978971298
-
-
https://www.private-eye.co.uk.
-
-
-
-
101
-
-
77952331717
-
-
pBMDS: A Behavior-based Malware Detection System for Cellphone Devices. In: Proceedings of The ACM Conference on Wireless Network Security (WiSec),
-
Xie, L., et al., 2010. pBMDS: A Behavior-based Malware Detection System for Cellphone Devices. In: Proceedings of The ACM Conference on Wireless Network Security (WiSec), pp. 37–48.
-
(2010)
, pp. 37-48
-
-
Xie, L.1
-
102
-
-
70350234989
-
Behavioural biometrics: a survey and classification
-
Yampolskiy, R.V., Govindaraju, V., Behavioural biometrics: a survey and classification. Int. J. Biom. 1:1 (2008), 81–113.
-
(2008)
Int. J. Biom.
, vol.1
, Issue.1
, pp. 81-113
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
103
-
-
77955712298
-
Web user behavioral profiling for user identification
-
Yang, Y., Web user behavioral profiling for user identification. Decis. Support. Syst. 49:3 (2010), 261–271.
-
(2010)
Decis. Support. Syst.
, vol.49
, Issue.3
, pp. 261-271
-
-
Yang, Y.1
-
105
-
-
75549084907
-
Toward user patterns for online security: Observation time and online user identification
-
Yang, Y., Padmanabhan, B., Toward user patterns for online security: Observation time and online user identification. Decis. Support. Syst. 48:4 (2010), 548–558.
-
(2010)
Decis. Support. Syst.
, vol.48
, Issue.4
, pp. 548-558
-
-
Yang, Y.1
Padmanabhan, B.2
-
106
-
-
78651413507
-
User profiling for intrusion detection using dynamic and static behavioural models
-
In: Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Springer-Verlag, pp. 494–505.
-
Yeung, D.-Y. and Y. Ding, 2002.User profiling for intrusion detection using dynamic and static behavioural models. In: Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Springer-Verlag, pp. 494–505.
-
(2002)
-
-
Yeung, D.-Y.1
Ding, Y.2
|