A Decision Analysis Method for Evaluating Computer Intrusion Detection Systems

[1]  Paul A. Viola,et al.  Robust Real-time Object Detection , 2001 .

[2]  John E. Gaffney,et al.  Evaluation of intrusion detectors: a decision theory approach , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.

[3]  Jacob Benesty,et al.  An objective technique for evaluating doubletalk detectors in acoustic echo cancelers , 1999, IEEE Trans. Speech Audio Process..

[4]  Alvin F. Martin,et al.  The NIST 1999 Speaker Recognition Evaluation - An Overview , 2000, Digit. Signal Process..

[5]  Tom Fawcett,et al.  Analysis and Visualization of Classifier Performance with Nonuniform Class and Cost Distributions , 1997 .

[6]  Thomas L. Magnanti,et al.  Applied Mathematical Programming , 1977 .

[7]  R. Richards-Kortum,et al.  A comparison of C/B ratios from studies using receiver operating characteristic curve analysis. , 1999, Journal of clinical epidemiology.

[8]  Sean Dougherty,et al.  Edge Detector Evaluation Using Empirical ROC Curves , 2001, Comput. Vis. Image Underst..

[9]  Salvatore J. Stolfo,et al.  Cost-based modeling for fraud and intrusion detection: results from the JAM project , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[10]  James O. Larimer,et al.  Evaluation of human vision models for predicting human observer performance , 1997, Medical Imaging.

[11]  Peter G. Neumann,et al.  EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.

[12]  H. Vincent Poor,et al.  An Introduction to Signal Detection and Estimation , 1994, Springer Texts in Electrical Engineering.

[13]  R.K. Cunningham,et al.  Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[14]  Salvatore J. Stolfo,et al.  A framework for constructing features and models for intrusion detection systems , 2000, TSEC.

[15]  Robert K. Cunningham,et al.  Results of the DARPA 1998 Offline Intrusion Detection Evaluation , 1999, Recent Advances in Intrusion Detection.

[16]  Tom Fawcett,et al.  Robust Classification for Imprecise Environments , 2000, Machine Learning.

[17]  Stefan Axelsson,et al.  The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.

[18]  Eric Miller,et al.  Testing and evaluating computer intrusion detection systems , 1999, CACM.

[19]  Elizabeth B. Lennon Testing Intrusion Detection Systems , 2003 .

[20]  Peter G. Neumann,et al.  Experience with EMERALD to Date , 1999, Workshop on Intrusion Detection and Network Monitoring.

[21]  Justin A. MacDonald,et al.  Signal detection theory , 2006 .

[22]  John McHugh,et al.  Defending Yourself: The Role of Intrusion Detection Systems , 2000, IEEE Software.

[23]  Ralph D. Hippenstiel,et al.  Detection Theory: Applications and Digital Signal Processing , 2001 .

[24]  Andrew P. Bradley,et al.  The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..

[25]  Fabien A. P. Petitcolas,et al.  Fair benchmark for image watermarking systems , 1999, Electronic Imaging.

[26]  S. Kent,et al.  On the trail of intrusions into information systems , 2000 .