A Synthetic Fraud Data Generation Methodology
暂无分享,去创建一个
[1] Biswanath Mukherjee,et al. A Methodology for Testing Intrusion Detection Systems , 1996, IEEE Trans. Software Eng..
[2] E. Jonsson,et al. Combining fraud and intrusion detection-meeting new requirements - , 2000 .
[3] Kymie M. C. Tan,et al. Benchmarking anomaly-based detection systems , 2000, Proceeding International Conference on Dependable Systems and Networks. DSN 2000.
[4] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[5] John Shawe-Taylor,et al. Fraud detection and management in mobile telecommunications networks , 1997 .
[6] John Mhugh. The 1998 Lincoln Laboratory IDS evaluation : A critique , 2000 .
[7] Salvatore J. Stolfo,et al. Agent-based fraud and intrusion detection in finan-cial information systems , 1997 .
[8] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[9] Salvatore J. Stolfo,et al. Distributed data mining in credit card fraud detection , 1999, IEEE Intell. Syst..
[10] M. Chung,et al. Simulating Concurrent Intrusionsfor Testing Intrusion Detection Systems : Parallelizing Intrusions , 1995 .
[11] John W. Tukey,et al. Exploratory Data Analysis. , 1979 .
[12] John McHugh,et al. The 1998 Lincoln Laboratory IDS Evaluation , 2000, Recent Advances in Intrusion Detection.