Data Mining for Intrusion Detection: From Outliers to True Intrusions
暂无分享,去创建一个
Céline Fiot | Florent Masseglia | Pascal Poncelet | Alice Marascu | Goverdhan Singh | Alice Marascu | F. Masseglia | P. Poncelet | Céline Fiot | G. Singh
[1] Bernd Freisleben,et al. CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).
[2] Osmar R. Zaïane,et al. A Nonparametric Outlier Detection for Effectively Discovering Top-N Outliers from Engineering Data , 2006, PAKDD.
[3] Sushil Jajodia,et al. Applications of Data Mining in Computer Security , 2002, Advances in Information Security.
[4] Randy K. Young. Wavelet theory and its applications , 1993, The Kluwer international series in engineering and computer science.
[5] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[6] Sameer Singh,et al. Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..
[7] Christopher Leckie,et al. Adaptive Clustering for Network Intrusion Detection , 2004, PAKDD.
[8] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[10] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[11] Ingrid Daubechies,et al. Ten Lectures on Wavelets , 1992 .
[12] Alfonso Valdes,et al. Probabilistic Alert Correlation , 2001, Recent Advances in Intrusion Detection.
[13] R. Kwitt,et al. Unsupervised Anomaly Detection in Network Traffic by Means of Robust PCA , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).
[14] Christos Faloutsos,et al. LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[15] E. Bloedorn,et al. Data mining for network intrusion detection : How to get started , 2001 .
[16] Florent Masseglia,et al. A Multi-resolution Approach for Atypical Behaviour Mining , 2009, PAKDD.
[17] A. Hadi,et al. BACON: blocked adaptive computationally efficient outlier nominators , 2000 .
[18] Somesh Jha,et al. Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.
[19] Jing Zhang,et al. Factor analysis based anomaly detection , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[20] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[21] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[22] Raymond T. Ng,et al. Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.
[23] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[24] Taghi M. Khoshgoftaar,et al. CLUSTERING-BASED NETWORK INTRUSION DETECTION , 2007 .
[25] Takehisa Yairi,et al. An approach to spacecraft anomaly detection problem using kernel feature space , 2005, KDD '05.
[26] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .