Misuse Detection for Information Retrieval Systems: A Preliminary Approach
暂无分享,去创建一个
[1] Jianfeng Gao,et al. Improving Encarta Search Engine Performance by Mining User Logs , 2002, Int. J. Pattern Recognit. Artif. Intell..
[2] Ophir Frieder,et al. Parallelizing the buckshot algorithm for efficient document clustering , 2002, CIKM '02.
[3] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[4] Daniel J. Ragsdale,et al. A hybrid approach to the profile creation and intrusion detection , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[5] Michael Gertz,et al. DEMIDS: A Misuse Detection System for Database Systems , 2000, IICIS.
[6] Eugene H. Spafford,et al. A PATTERN MATCHING MODEL FOR MISUSE INTRUSION DETECTION , 1994 .
[7] George Karypis,et al. Evaluation of hierarchical clustering algorithms for document datasets , 2002, CIKM '02.
[8] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[9] Radu Sion,et al. On-the-fly intrusion detection for Web portals , 2003, Proceedings ITCC 2003. International Conference on Information Technology: Coding and Computing.
[10] V. Rao Vemuri,et al. Using Text Categorization Techniques for Intrusion Detection , 2002, USENIX Security Symposium.
[11] Oleksiy Mazhelis,et al. Learning temporal patterns for anomaly intrusion detection , 2002, SAC '02.