ADAM: Detecting Intrusions by Data Mining
暂无分享,去创建一个
Sushil Jajodia | Daniel Barbará | Julia Couto | Ningning Wu | Leonard J. Popyack | L. Popyack | S. Jajodia | Julia Couto | Ningning Wu | Daniel Barbará
[1] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[2] Stephen E. Fienberg,et al. Discrete Multivariate Analysis: Theory and Practice , 1976 .
[3] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[5] Phillip A. Porras,et al. STAT -- A State Transition Analysis Tool For Intrusion Detection , 1993 .
[6] Richard Lippmann,et al. The 1999 DARPA off-line intrusion detection evaluation , 2000, Comput. Networks.
[7] H. Javitz,et al. Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .
[8] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[9] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[10] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[11] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[12] Giovanni Vigna,et al. NetSTAT: a network-based intrusion detection approach , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[13] R. Jagannathan,et al. A prototype real-time intrusion-detection expert system , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.