Activity monitoring: noticing interesting changes in behavior
暂无分享,去创建一个
[1] Sholom M. Weiss,et al. Proactive network maintenance using machine learning , 1993, Proceedings of GLOBECOM '93. IEEE Global Telecommunications Conference.
[2] Tom Fawcett,et al. Analysis and Visualization of Classifier Performance: Comparison under Imprecise Class and Cost Distributions , 1997, KDD.
[3] Trevor J. Hastie,et al. Discriminative vs Informative Learning , 1997, KDD.
[4] Risto Miikkulainen,et al. Intrusion Detection with Neural Networks , 1997, NIPS.
[5] Carla E. Brodley,et al. Approaches to Online Learning and Concept Drift for User Identification in Computer Security , 1998, KDD.
[6] Salvatore J. Stolfo,et al. AI Approaches to Fraud Detection and Risk Management , 1998, AI Mag..
[7] Salvatore J. Stolfo,et al. Toward Scalable Learning with Non-Uniform Class and Cost Distributions: A Case Study in Credit Card Fraud Detection , 1998, KDD.
[8] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[9] Ron Kohavi,et al. The Case against Accuracy Estimation for Comparing Induction Algorithms , 1998, ICML.
[10] Haym Hirsh,et al. Learning to Predict Rare Events in Event Sequences , 1998, KDD.
[11] Brian D. Davison,et al. Predicting Sequences of User Actions , 1998 .
[12] William DuMouchel,et al. A Fast Computer Intrusion Detection Algorithm Based on Hypothesis Testing of Command Transition Probabilities , 1998, KDD.