A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems
暂无分享,去创建一个
[1] Paul A. Viola,et al. Robust Real-time Object Detection , 2001 .
[2] John E. Gaffney,et al. Evaluation of intrusion detectors: a decision theory approach , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[3] Jacob Benesty,et al. An objective technique for evaluating doubletalk detectors in acoustic echo cancelers , 1999, IEEE Trans. Speech Audio Process..
[4] Alvin F. Martin,et al. The NIST 1999 Speaker Recognition Evaluation - An Overview , 2000, Digit. Signal Process..
[5] Tom Fawcett,et al. Analysis and Visualization of Classifier Performance with Nonuniform Class and Cost Distributions , 1997 .
[6] Thomas L. Magnanti,et al. Applied Mathematical Programming , 1977 .
[7] R. Richards-Kortum,et al. A comparison of C/B ratios from studies using receiver operating characteristic curve analysis. , 1999, Journal of clinical epidemiology.
[8] Sean Dougherty,et al. Edge Detector Evaluation Using Empirical ROC Curves , 2001, Comput. Vis. Image Underst..
[9] Salvatore J. Stolfo,et al. Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[10] James O. Larimer,et al. Evaluation of human vision models for predicting human observer performance , 1997, Medical Imaging.
[11] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[12] H. Vincent Poor,et al. An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.
[13] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[14] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[15] Robert K. Cunningham,et al. Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.
[16] Tom Fawcett,et al. Robust Classification for Imprecise Environments , 2000, Machine Learning.
[17] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[18] Eric Miller,et al. Testing and evaluating computer intrusion detection systems , 1999, CACM.
[19] Elizabeth B. Lennon. Testing Intrusion Detection Systems , 2003 .
[20] Peter G. Neumann,et al. Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.
[21] Justin A. MacDonald,et al. Signal detection theory , 2006 .
[22] John McHugh,et al. Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.
[23] Ralph D. Hippenstiel,et al. Detection Theory: Applications and Digital Signal Processing , 2001 .
[24] Andrew P. Bradley,et al. The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..
[25] Fabien A. P. Petitcolas,et al. Fair benchmark for image watermarking systems , 1999, Electronic Imaging.
[26] S. Kent,et al. On the trail of intrusions into information systems , 2000 .