Detecting denial-of-service attacks with incomplete audit data
暂无分享,去创建一个
[1] H. Javitz,et al. Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .
[2] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[3] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[4] H. Toutenburg. Little, R.J.A. and D.B. Rubin:Statistical analysis with missing data , 1991 .
[5] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[6] Eleazar Eskin,et al. Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.
[7] Carlos Ordonez,et al. FREM: fast and robust EM clustering for large data sets , 2002, CIKM '02.
[8] Philip K. Chan,et al. PHAD: packet header anomaly detection for identifying hostile network traffic , 2001 .
[9] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[10] Raymond T. Ng,et al. Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.
[11] Philip K. Chan,et al. Learning Models of Network Traffic for Detecting Novel Attacks , 2002 .
[12] Tian Zhang,et al. BIRCH: an efficient data clustering method for very large databases , 1996, SIGMOD '96.
[13] U. Fayyad,et al. Scaling EM (Expectation Maximization) Clustering to Large Databases , 1998 .
[14] Geoffrey E. Hinton,et al. A View of the Em Algorithm that Justifies Incremental, Sparse, and other Variants , 1998, Learning in Graphical Models.
[15] Roderick J. A. Little,et al. Statistical Analysis with Missing Data , 1988 .
[16] Sudipto Guha,et al. ROCK: a robust clustering algorithm for categorical attributes , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[17] D. Rubin,et al. Statistical Analysis with Missing Data , 1988 .
[18] D. Rubin,et al. Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .
[19] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[20] Sridhar Ramaswamy,et al. Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.