Statistical profiling and visualization for detection of malicious insider attacks on computer networks
暂无分享,去创建一个
[1] Robert F. Erbacher,et al. Improving Intrusion Analysis Effectiveness , .
[2] Terran Lane,et al. Hidden Markov Models for Human/Computer Interface Modeling , 1999 .
[3] P. Fayers,et al. The Visual Display of Quantitative Information , 1990 .
[4] Edward R. Tufte,et al. The Visual Display of Quantitative Information , 1986 .
[5] Chris Clifton,et al. Developing custom intrusion detection filters using data mining , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[6] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[7] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[8] Deborah A. Frincke,et al. Visual behavior characterization for intrusion and misuse detection , 2001, IS&T/SPIE Electronic Imaging.
[9] Stefanos Manganaris,et al. A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.
[10] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[11] A. Akhmetova. Discovery of Frequent Episodes in Event Sequences , 2006 .
[12] Bartlett W. Mel,et al. Minimizing Binding Errors Using Learned Conjunctive Features , 2000, Neural Computation.
[13] B. Marx. The Visual Display of Quantitative Information , 1985 .
[14] Peng Ning,et al. Learning attack strategies from intrusion alerts , 2003, CCS '03.
[15] Klaus Julisch,et al. Clustering intrusion detection alarms to support root cause analysis , 2003, TSEC.
[16] Marc Dacier,et al. Mining intrusion detection alarms for actionable knowledge , 2002, KDD.
[17] Peng Ning,et al. Constructing attack scenarios through correlation of intrusion alerts , 2002, CCS '02.