Protecting against cyber threats in networked information systems
暂无分享,去创建一个
Jaideep Srivastava | Vipin Kumar | Aleksandar Lazarevic | Levent Ertoz | Eric Eilertson | Pang-Ning Tan | Paul Dokas
[1] Philip S. Yu,et al. Outlier detection for high dimensional data , 2001, SIGMOD '01.
[2] Raymond T. Ng,et al. Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.
[3] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[4] Jianxiong Luo. INTEGRATING FUZZY LOGIC WITH DATA MINING METHODS FOR INTRUSION DETECTION , 1999 .
[5] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[6] Vipin Kumar,et al. CREDOS: Classification Using Ripple Down Structure (A Case for Rare Classes) , 2004, SDM.
[7] Vipin Kumar,et al. Evaluating boosting algorithms to classify rare classes: comparison and improvements , 2001, Proceedings 2001 IEEE International Conference on Data Mining.
[8] 송왕철,et al. IDS(Intrusion Detection System) , 2000 .
[9] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[10] E. Bloedorn,et al. Data mining for network intrusion detection : How to get started , 2001 .
[11] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[12] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[13] Vipin Kumar,et al. Predicting rare classes: can boosting make any weak learner strong? , 2002, KDD.
[14] Stefanos Manganaris,et al. A Data Mining Analysis of RTID Alarms , 2000, Recent Advances in Intrusion Detection.
[15] Vipin Kumar,et al. Mining needle in a haystack: classifying rare classes via two-phase rule induction , 2001, SIGMOD '01.