-
1
-
-
0004077217
-
-
United States
-
J. D. Case, M. Fedor, M. L. Schoffstall, and J. Davin, “RFC: Simple Network Management Protocol (SNMP),” United States, 1990.
-
(1990)
RFC: Simple Network Management Protocol (SNMP)
-
-
Case, J.D.1
Fedor, M.2
Schoffstall, M.L.3
Davin, J.4
-
2
-
-
0037984544
-
-
United States
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, “RFC: SIP: Session Initiation Protocol,” United States, 2002.
-
(2002)
RFC: SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
3
-
-
55349096825
-
Abusing SIP authentication
-
H. Abdelnur, T. Avanesov, M. Rusinowitch, and R. State, “Abusing SIP authentication,” in Proc. IEEE Inf. Assurance Security (ISIAS), 2008, pp. 237–242.
-
(2008)
Proc. IEEE Inf. Assurance Security (ISIAS)
, pp. 237-242
-
-
Abdelnur, H.1
Avanesov, T.2
Rusinowitch, M.3
State, R.4
-
5
-
-
36049030250
-
A new intrusion detection system using support vector machines and hierarchical clustering
-
L. Khan, M. Awad, and B. Thuraisingham “A new intrusion detection system using support vector machines and hierarchical clustering,” VLDB J., vol. 16, no. 4, pp. 507–521, 2007.
-
(2007)
VLDB J.
, vol.16
, Issue.4
, pp. 507-521
-
-
Khan, L.1
Awad, M.2
Thuraisingham, B.3
-
6
-
-
56549083190
-
Monitoring SIP traffic using support vector machines
-
Springer
-
M. Nassar, R. State, and O. Festor, “Monitoring SIP traffic using support vector machines,” in Proc. 11th International Symp. Recent Advances Intrusion Detection, Lecture Notes Computer Science, vol. 5230. Springer, 2008, pp. 311–330.
-
(2008)
Proc. 11th International Symp. Recent Advances Intrusion Detection, Lecture Notes Computer Science
, vol.5230
, pp. 311-330
-
-
Nassar, M.1
State, R.2
Festor, O.3
-
7
-
-
4043078519
-
A decision based one-against-one method for multi-class support vector machine
-
R. Debnath, N. Takahide, and H. Takahashi “A decision based one-against-one method for multi-class support vector machine,” Pattern Anal. Appl., vol. 7, no. 2, pp. 164–175, 2004.
-
(2004)
Pattern Anal. Appl.
, vol.7
, Issue.2
, pp. 164-175
-
-
Debnath, R.1
Takahide, N.2
Takahashi, H.3
-
8
-
-
0036505670
-
A comparison of methods for multiclass support vector machines
-
Mar.
-
C.-W. Hsu and C.-J. Lin “A comparison of methods for multiclass support vector machines,” IEEE Trans. Neural Networks, vol. 13, no. 2, pp. 415–425, Mar. 2002.
-
(2002)
IEEE Trans. Neural Networks
, vol.13
, Issue.2
, pp. 415-425
-
-
Hsu, C.-W.1
Lin, C.-J.2
-
10
-
-
84892062680
-
A survey of clustering data mining techniques
-
P. Berkhin, “A survey of clustering data mining techniques,” in Grouping Multidimensional Data, 2006, pp. 25–71.
-
(2006)
Grouping Multidimensional Data
, pp. 25-71
-
-
Berkhin, P.1
-
11
-
-
0032652570
-
Rock: a robust clustering algorithm for categorical attributes
-
Washington, DC
-
“Rock: a robust clustering algorithm for categorical attributes,” in Proc. 15th International Conf. Data Engineering, Washington, DC, 1999, p. 512.
-
(1999)
Proc. 15th International Conf. Data Engineering
, pp. 512
-
-
-
12
-
-
25844444240
-
Qrock: a quick version of the rock algorithm for clustering of categorical data
-
M. Dutta, A. K. Mahanta, and A. K. Pujari “Qrock: a quick version of the rock algorithm for clustering of categorical data,” Pattern Recogn. Lett., vol. 26, no. 15, pp. 2364–2373, 2005.
-
(2005)
Pattern Recogn. Lett.
, vol.26
, Issue.15
, pp. 2364-2373
-
-
Dutta, M.1
Mahanta, A.K.2
Pujari, A.K.3
-
13
-
-
22944433817
-
Polynomial-time metrics for attributed trees
-
A. Torsello, D. Hidovic-Rowe, and M. Pelillo “Polynomial-time metrics for attributed trees,” IEEE Trans. Pattern Analysis Machine Intelligence, vol. 27, no. 7, pp. 1087–1099, 2005.
-
(2005)
IEEE Trans. Pattern Analysis Machine Intelligence
, vol.27
, Issue.7
, pp. 1087-1099
-
-
Torsello, A.1
Hidovic-Rowe, D.2
Pelillo, M.3
-
14
-
-
85008036657
-
Augmented BNF for Syntax Specifications: ABNF
-
D. H. Crocker and P. Overell, “Augmented BNF for Syntax Specifications: ABNF,” United States, 1997.
-
(1997)
United States
-
-
Crocker, D.H.1
Overell, P.2
-
15
-
-
79952523119
-
SIP stack fingerprinting and stack difference attacks
-
H. Scholz, “SIP stack fingerprinting and stack difference attacks,” Black Hat Briefings, 2006.
-
(2006)
Black Hat Briefings
-
-
Scholz, H.1
-
16
-
-
0033931867
-
Assessing the accuracy of prediction algorithms for classification: an overview
-
P. Baldi, S. Brunak, Y. Chauvin, C. A. Andersen, and H. Nielsen, “Assessing the accuracy of prediction algorithms for classification: an overview,” Bioinformatics, vol. 16, no. 5, pp. 412–24, 2000.
-
(2000)
Bioinformatics
, vol.16
, Issue.5
, pp. 412-424
-
-
Baldi, P.1
Brunak, S.2
Chauvin, Y.3
Andersen, C.A.4
Nielsen, H.5
-
18
-
-
0001116877
-
Binary codes capable of correcting deletions, insertions and reversals
-
V. Levenshtein, “Binary codes capable of correcting deletions, insertions and reversals,” Soviet Physics Doklady, vol. 10, 1966.
-
(1966)
Soviet Physics Doklady
, vol.10
-
-
Levenshtein, V.1
-
19
-
-
85084161026
-
Probing TCP implementations
-
[Online]. Available: cite-seer.ist.psu.edu/article/comer94probing.html.
-
Douglas Comer and John C. Lin, “Probing TCP implementations,” in USENIX Summer, 1994, pp. 245–255. [Online]. Available: cite-seer.ist.psu.edu/article/comer94probing.html.
-
(1994)
USENIX Summer
, pp. 245-255
-
-
Comer, D.1
Lin, J.C.2
-
21
-
-
85038902950
-
FiG: automatic fingerprint generation
-
Feb.
-
J. Caballero, S. Venkataraman, P. Poosankam, M. G. Kang, D. Song, and A. Blum, “FiG: automatic fingerprint generation,” in 14th Annual Netw. Distributed Syst. Security Conf. (NDSS 2007), Feb. 2007.
-
(2007)
14th Annual Netw. Distributed Syst. Security Conf. (NDSS 2007)
-
-
Caballero, J.1
Venkataraman, S.2
Poosankam, P.3
Kang, M.G.4
Song, D.5
Blum, A.6
-
22
-
-
70350771144
-
Internet traffic classification demystified: myths, caveats, and the best practices
-
H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee, “Internet traffic classification demystified: myths, caveats, and the best practices,” in Proc. 2008 ACM CoNEXT Conf, pp. 1–12.
-
Proc. 2008 ACM CoNEXT Conf
, pp. 1-12
-
-
Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
23
-
-
34249790654
-
Unexpected means of protocol inference
-
J. Ma, K. Levchenko, C. Kreibich, S. Savage, and G. M. Voelker, “Unexpected means of protocol inference,” in Proc. Internet Measurement Conf., 2006, pp. 313–326.
-
(2006)
Proc. Internet Measurement Conf.
, pp. 313-326
-
-
Ma, J.1
Levchenko, K.2
Kreibich, C.3
Savage, S.4
Voelker, G.M.5
-
24
-
-
29244451861
-
ACAS: automated construction of application signatures
-
S. Sen, C. Ji, D. Saha, and J. McCloskey, editors
-
P. Haffner, S. Sen, O. Spatscheck, and D. Wang, “ACAS: automated construction of application signatures,” in MineNet, S. Sen, C. Ji, D. Saha, and J. McCloskey, editors, 2005, pp. 197–202.
-
(2005)
MineNet
, pp. 197-202
-
-
Haffner, P.1
Sen, S.2
Spatscheck, O.3
Wang, D.4
-
25
-
-
0003415244
-
Hypertext Transfer Protocol - HTTP/1.1
-
RFC 2616 (Draft Standard), June, updated by RFC 2817. [Online]. Available: http://www.ietf.org/rfc/rfc2616.txt.
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, “Hypertext Transfer Protocol - HTTP/1.1,” RFC 2616 (Draft Standard), June 1999, updated by RFC 2817. [Online]. Available: http://www.ietf.org/rfc/rfc2616.txt.
-
(1999)
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
26
-
-
77952390792
-
Incorporating active fingerprinting into SPIT prevention systems
-
June
-
H. Yan, K. Sripanidkulchai, H. Zhang, Z. Y. Shae, and D. Saha, “Incorporating active fingerprinting into SPIT prevention systems,” Third Annual VoIP Security Workshop, June 2006.
-
(2006)
Third Annual VoIP Security Workshop
-
-
Yan, H.1
Sripanidkulchai, K.2
Zhang, H.3
Shae, Z.Y.4
Saha, D.5
-
27
-
-
76649121492
-
Automated behavioral fingerprinting
-
J. Francois, H. Abdelnur, R. State, and O. Festor, “Automated behavioral fingerprinting,” in 12th International Symp. Recent Advances Intrusion Detection — RAID 2009, Lecture Notes in Computer Science, to appear, 2009.
-
(2009)
12th International Symp. Recent Advances Intrusion Detection — RAID 2009, Lecture Notes in Computer Science, to appear
-
-
Francois, J.1
Abdelnur, H.2
State, R.3
Festor, O.4
-
28
-
-
56549104120
-
Advanced network fingerprinting
-
MIT. Springer
-
H. Abdelnur, R. State, and O. Festor, “Advanced network fingerprinting,” in Recent Advances Intrusion Detection Lecture Notes Computer Science, ser. Computer Science, vol. 5230/2008, MIT. Springer, 2008, pp. 372–389.
-
(2008)
Recent Advances Intrusion Detection Lecture Notes Computer Science
, vol.5230/2008
, pp. 372-389
-
-
Abdelnur, H.1
State, R.2
Festor, O.3
-
29
-
-
58449089032
-
Incorporation of application layer protocol syntax into anomaly detection
-
P. Düssel, C. Gehl, P. Laskov, and K. Rieck, “Incorporation of application layer protocol syntax into anomaly detection,” in Proc. 4th International Conf. Inf. Syst. Security, 2008, pp. 188–202.
-
(2008)
Proc. 4th International Conf. Inf. Syst. Security
, pp. 188-202
-
-
Düssel, P.1
Gehl, C.2
Laskov, P.3
Rieck, K.4
-
30
-
-
79951651722
-
Machine learning for application-layer intrusion detection
-
Ph.D. dissertation, Fraunhofer Institute FIRST & Berlin Institute of Technology
-
K. Rieck, “Machine learning for application-layer intrusion detection,” Ph.D. dissertation, Fraunhofer Institute FIRST & Berlin Institute of Technology, 2009.
-
(2009)
-
-
Rieck, K.1
|