


default search action
Applications of Data Mining in Computer Security 2002
- Daniel Barbará, Sushil Jajodia:
Applications of Data Mining in Computer Security. Advances in Information Security, Springer 2002, ISBN 9781461353218 - Steven Noel, Duminda Wijesekera, Charles E. Youman:
Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt. 1-31 - Klaus Julisch:
Data Mining for Intrusion Detection. 33-62 - Daniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu:
An Architecture for Anomaly Detection. 63-76 - Eleazar Eskin, Andrew Arnold, Michael J. Prerau, Leonid Portnoy, Salvatore J. Stolfo:
A Geometric Framework for Unsupervised Anomaly Detection. 77-101 - Oliver Dain, Robert K. Cunningham:
Fusing A Heterogeneous Alert Stream Into Scenarios. 103-122 - Xinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera:
Using MIB II Variables for Network Intrusion Detection. 123-151 - Andrew Honig, Andrew Howard, Eleazar Eskin, Salvatore J. Stolfo:
Adaptive Model Generation. 153-193 - João B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra:
Proactive Intrusion Detection. 195-227 - Olivier Y. de Vel, Alison Anderson, Malcolm Corney, George M. Mohay:
E-Mail Authorship Attribution for Computer Forensics. 229-250

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.