-
1
-
-
0004074760
-
-
Wiley, New York, 2nd ed
-
G. E. P. Box, J. S. Hunter, and W. G. Hunter, Statistics for Experimenters: Design, Innovation, and Discovery. Wiley, New York, 2nd ed., 2005.
-
(2005)
Statistics for Experimenters: Design, Innovation, and Discovery
-
-
Box, G.E.P.1
Hunter, J.S.2
Hunter, W.G.3
-
6
-
-
0005327658
-
Web-based keystroke dynamics identity verification using neural network
-
S. Cho, C. Han, D. H. Han, and H.-I. Kim, “Web-based keystroke dynamics identity verification using neural network,” Journal of Organizational Computing and Electronic Commerce, vol. 10, no. 4, pp. 295–307, 2000.
-
(2000)
Journal of Organizational Computing and Electronic Commerce
, vol.10
, Issue.4
, pp. 295-307
-
-
Cho, S.1
Han, C.2
Han, D.H.3
Kim, H.-I.4
-
7
-
-
70450014575
-
Comparing anomaly-detection algorithms for keystroke dynamics
-
June 29–July 2, 2009, Estoril, Lisbon, Portugal),. IEEE Computer Society, Los Alamitos, CA
-
K. S. Killourhy and R. A. Maxion, “Comparing anomaly-detection algorithms for keystroke dynamics,” in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), (June 29–July 2, 2009, Estoril, Lisbon, Portugal), pp. 125–134, IEEE Computer Society, Los Alamitos, CA, 2009.
-
(2009)
IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009)
, pp. 125-134
-
-
Killourhy, K.S.1
Maxion, R.A.2
-
8
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
January 25–27, Hilton Head, SC),. IEEE Computer Society, Los Alamitos, CA, 2000
-
R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Webber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman, “Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation,” in DARPA Information Survivability Conference and Exposition (DISCEX 2000), vol. 2, (January 25–27, 2000, Hilton Head, SC), pp. 12–26, IEEE Computer Society, Los Alamitos, CA, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition (DISCEX 2000)
, vol.2
, pp. 12-26
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Webber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
9
-
-
84944222170
-
Analysis and results of the 1999 DARPA offline intrusion detection evaluation
-
October 2–4, 2000, Toulouse, France),. Springer-Verlag, Berlin
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, “Analysis and results of the 1999 DARPA offline intrusion detection evaluation,” in Recent Advances in Intrusion Detection (RAID 2000), (October 2–4, 2000, Toulouse, France), pp. 162–182, Springer-Verlag, Berlin, 2000.
-
(2000)
Recent Advances in Intrusion Detection (RAID 2000)
, pp. 162-182
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
12
-
-
78249239478
-
Behavior-based worm detectors compared
-
September 15–17, 2010, Ottawa, Ontario, Canada),. Springer-Verlag, Berlin
-
S. Stafford and J. Li, “Behavior-based worm detectors compared,” in Recent Advances in Intrusion Detection (RAID 2010), (September 15–17, 2010, Ottawa, Ontario, Canada), pp. 38–57, Springer-Verlag, Berlin, 2010.
-
(2010)
Recent Advances in Intrusion Detection (RAID 2010)
, pp. 38-57
-
-
Stafford, S.1
Li, J.2
-
14
-
-
0041108232
-
-
Tech. Rep. RADC-TR-77-333, Rome Air Development Center, October
-
G. Forsen, M. Nelson, and J. Raymond Staron, “Personal attributes authentication techniques,” Tech. Rep. RADC-TR-77-333, Rome Air Development Center, October 1977.
-
(1977)
Personal Attributes Authentication Techniques
-
-
Forsen, G.1
Nelson, M.2
Raymond Staron, J.3
-
15
-
-
0343700185
-
-
Tech. Rep. R-2526-NSF, RAND Corporation, May
-
R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, “Authentication by keystroke timing: Some preliminary results,” Tech. Rep. R-2526-NSF, RAND Corporation, May 1980.
-
(1980)
Authentication by Keystroke Timing: Some Preliminary Results
-
-
Gaines, R.S.1
Lisowski, W.2
Press, S.J.3
Shapiro, N.4
-
17
-
-
0032070168
-
Should computer scientists experiment more?
-
May
-
W. F. Tichy, “Should computer scientists experiment more?,” Computer, vol. 31, pp. 32–40, May 1998.
-
(1998)
Computer
, vol.31
, pp. 32-40
-
-
Tichy, W.F.1
-
18
-
-
35649020213
-
How to design computer security experiments
-
June 19–21, 2007, West Point, NY),. Springer, New York
-
S. Peisert and M. Bishop, “How to design computer security experiments,” in 5th World Conference on Information Security Education (WISE 2007), (June 19–21, 2007, West Point, NY), pp. 141–148, Springer, New York, 2007.
-
(2007)
5th World Conference on Information Security Education (WISE 2007)
, pp. 141-148
-
-
Peisert, S.1
Bishop, M.2
-
19
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
May 16–19, 2010, Berkeley, CA),. IEEE Computer Society, Los Alamitos, CA
-
R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” in 2010 IEEE Symposium on Security and Privacy, (May 16–19, 2010, Berkeley, CA), pp. 305–316, IEEE Computer Society, Los Alamitos, CA, 2010.
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
20
-
-
33646862515
-
MANET simulation study: The incredibles
-
October
-
S. Kurkowski, T. Camp, and M. Colagrosso, “MANET simulation study: The incredibles,” Mobile Computing and Communications Review—Special Issue on Medium Access and Call Admission Control Algorithms for Next Generation Wireless Networks, vol. 9, pp. 50–61, October 2005.
-
(2005)
Mobile Computing and Communications Review—Special Issue on Medium Access and Call Admission Control Algorithms for Next Generation Wireless Networks
, vol.9
, pp. 50-61
-
-
Kurkowski, S.1
Camp, T.2
Colagrosso, M.3
|