EWMA forecast of normal system activity for computer intrusion detection
暂无分享,去创建一个
[1] Nong Ye,et al. Grid- and dummy-cluster-based learning of normal and intrusive clusters for computer intrusion detection , 2002 .
[2] Harold S. Javitz,et al. The NIDES Statistical Component Description and Justification , 1994 .
[3] Prem Uppuluri,et al. Building survivable systems: an integrated approach based on intrusion detection and damage containment , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[4] Qiang Chen,et al. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data , 2003, IEEE Trans. Reliab..
[5] Xiangyang Li,et al. Decision Tree Classifiers for Computer Intrusion Detection , 2001, Scalable Comput. Pract. Exp..
[6] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[7] Karl N. Levitt,et al. GrIDS A Graph-Based Intrusion Detection System for Large Networks , 1996 .
[8] Giovanni Vigna,et al. The STAT tool suite , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[9] Salvatore J. Stolfo,et al. Mining in a data-flow environment: experience in network intrusion detection , 1999, KDD '99.
[10] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[11] Nong Ye,et al. A process control approach to cyber attack detection , 2001, Commun. ACM.
[12] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[13] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[14] Minitab. Statistical Methods for Quality Improvement , 2001 .
[15] Rebecca Gurley Bace,et al. Intrusion Detection , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[16] Dominique Alessandri,et al. Towards a Taxonomy of Intrusion Detection Systems and Attacks , 2001 .
[17] Qiang Chen,et al. Probabilistic techniques for intrusion detection based on computer audit data , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[18] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[19] Carla Marceau,et al. Intrusion detection for distributed applications , 1999, CACM.
[20] Salvatore J. Stolfo,et al. Behavior Profiling of Email , 2003, ISI.
[21] Hervé Debar,et al. A neural network component for an intrusion detection system , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[22] Douglas C. Montgomery,et al. Some Statistical Process Control Methods for Autocorrelated Data , 1991 .
[23] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[24] David Wai-Lok Cheung,et al. Is Sampling Useful in Data Mining? A Case in the Maintenance of Discovered Association Rules , 1998, Data Mining and Knowledge Discovery.
[25] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[26] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[27] Juan E. Tapiador,et al. Stochastic protocol modeling for anomaly based network intrusion detection , 2003, First IEEE International Workshop on Information Assurance, 2003. IWIAS 2003. Proceedings..
[28] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[29] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[30] N. Ye,et al. Robustness of Chi‐square and Canberra distance metrics for computer intrusion detection , 2002 .
[31] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[32] George E. P. Box,et al. Statistical Control: By Monitoring and Feedback Adjustment , 1997 .
[33] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.
[34] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[35] Salvatore J. Stolfo,et al. Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses , 2002, RAID.
[36] Stephanie Forrest,et al. Infect Recognize Destroy , 1996 .
[37] Feiyi Wang,et al. Design and implementation of a scalable intrusion detection system for the protection of network infrastructure , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[38] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[39] Anupam Joshi,et al. Fuzzy clustering for intrusion detection , 2003, The 12th IEEE International Conference on Fuzzy Systems, 2003. FUZZ '03..
[40] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[41] Marc Dacier,et al. Fixed- vs. variable-length patterns for detecting suspicious process behavior , 2000 .
[42] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[43] Yuebin Bai,et al. Intrusion Detection Systems: technology and development , 2003, 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003..
[44] Dan Schnackenberg,et al. Infrastructure for intrusion detection and response , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[45] Salvatore J. Stolfo,et al. Modeling system calls for intrusion detection with dynamic window sizes , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[46] Nong Ye,et al. First‐order versus high‐order stochastic models for computer intrusion detection , 2002 .
[47] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[48] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[49] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).