-
1
-
-
4544229404
-
ADaM: Detecting intrusions by data mining
-
BCJ+01 und
-
Barbará, D., Couto, J., Jajodia, S., Popyack, L., und Wu, N.: ADAM: Detecting intrusions by data mining. In: Proc. IEEE Workshop on Information Assurance and Security. S. 11-16. 2001.
-
(2001)
Proc. IEEE Workshop on Information Assurance and Security. S.
, pp. 11-16
-
-
Barbará, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
4
-
-
0344439823
-
-
EAP+02 und Kluwer
-
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., und Stolfo, S.: Applications of Data Mining in Computer Security. chapter A geometric framework for unsupervised anomaly detection: detecting intrusions in unlabeled data. Kluwer. 2002.
-
(2002)
Applications of Data Mining in Computer Security. Chapter a Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
5
-
-
0003690982
-
-
JLA+93 und Technical report. Computer Science Laboratory, SRI International
-
Jagannathan, R., Lunt, T. F., Anderson, D., Dodd, C., Gilham, F., Jalali, C., Javitz, H. S., Neumann, P. G., Tamaru, A., und Valdes, A.: Next-generation intrusion detection expert system (NIDES). Technical report. Computer Science Laboratory, SRI International. 1993.
-
(1993)
Next-Generation Intrusion Detection Expert System (NIDES)
-
-
Jagannathan, R.1
Lunt, T.F.2
Anderson, D.3
Dodd, C.4
Gilham, F.5
Jalali, C.6
Javitz, H.S.7
Neumann, P.G.8
Tamaru, A.9
Valdes, A.10
-
6
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
LEK+03 und
-
Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., und Srivastava, J.: A comparative study of anomaly detection schemes in network intrusion detection,. In: Proc. SIAM Conf. Data Mining. 2003.
-
(2003)
Proc. SIAM Conf. Data Mining.
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
7
-
-
0000524153
-
Intrusion detection: Its role and validation
-
LV92 und
-
Liepins, G. und Vaccaro, H.: Intrusion detection: its role and validation. Computers and Security,. 11(4):347-355. 1992.
-
(1992)
Computers and Security
, vol.11
, Issue.4
, pp. 347-355
-
-
Liepins, G.1
Vaccaro, H.2
-
8
-
-
0038282217
-
-
NWY02 und Kluwer
-
Noel, S., Wijesekera, D., und Youman, C.: Applications of Data Mining in Computer Security. chapter Modern intrusion detection, data mining, and degrees of attack guilt. Kluwer. 2002.
-
(2002)
Applications of Data Mining in Computer Security. Chapter Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt
-
-
Noel, S.1
Wijesekera, D.2
Youman, C.3
-
11
-
-
0032594954
-
Input space vs. Feature space in kernel-based methods
-
SMB+99 und September
-
Schölkopf, B., Mika, S., Burges, C., Knirsch, P., Müller, K.-R., Rätsch, G., und Smola, A.: Input space vs. feature space in kernel-based methods. IEEE Transactions on Neural Networks. 10(5):1000-1017. September 1999.
-
(1999)
IEEE Transactions on Neural Networks
, vol.10
, Issue.5
, pp. 1000-1017
-
-
Schölkopf, B.1
Mika, S.2
Burges, C.3
Knirsch, P.4
Müller, K.-R.5
Rätsch, G.6
Smola, A.7
-
12
-
-
0000487102
-
Estimating the support of a high-dimensional distribution
-
SPST+01 und
-
Schölkopf, B., Platt, J., Shawe-Taylor, J., Smola, A., und Williamson, R.: Estimating the support of a high-dimensional distribution. Neural Computation. 13(7):1443-1471. 2001.
-
(2001)
Neural Computation
, vol.13
, Issue.7
, pp. 1443-1471
-
-
Schölkopf, B.1
Platt, J.2
Shawe-Taylor, J.3
Smola, A.4
Williamson, R.5
-
14
-
-
0347243182
-
Nonlinear component analysis as a kernel eigenvalue problem
-
SSM98 und
-
Schölkopf, B., Smola, A., und Müller, K.-R.: Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation. 10:1299-1319. 1998.
-
(1998)
Neural Computation
, vol.10
, pp. 1299-1319
-
-
Schölkopf, B.1
Smola, A.2
Müller, K.-R.3
-
15
-
-
0001986205
-
Data domain description by support vectors
-
TD99 und Verleysen, M. Hrsg, Brussels. D. Facto Press
-
Tax, D. und Duin, R.: Data domain description by support vectors. In: Verleysen, M. (Hrsg.), Proc. ESANN. S. 251-256. Brussels. 1999. D. Facto Press.
-
(1999)
Proc. ESANN. S.
, pp. 251-256
-
-
Tax, D.1
Duin, R.2
-
18
-
-
84944220475
-
Adaptive, model-based monitoring for cyber attack detection
-
VS00 und S
-
Valdes, A. und Skinner, K.: Adaptive, model-based monitoring for cyber attack detection. In: Proc. RAID 2000. S. 80-92. 2000.
-
(2000)
Proc. RAID 2000
, pp. 80-92
-
-
Valdes, A.1
Skinner, K.2
|