Mining in a data-flow environment: experience in network intrusion detection
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
Adaptive Intrusion Detection: A Data Mining Approach
Artificial Intelligence Review - Issues on the application of data mining
A framework for constructing features and models for intrusion detection systems
ACM Transactions on Information and System Security (TISSEC)
Toward cost-sensitive modeling for intrusion detection and response
Journal of Computer Security
Distributed Data Mining in Credit Card Fraud Detection
IEEE Intelligent Systems
Anomaly Detection over Noisy Data using Learned Probability Distributions
ICML '00 Proceedings of the Seventeenth International Conference on Machine Learning
MEF: Malicious Email Filter - A UNIX Mail Filter That Detects Malicious Windows Executables
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Automated Intrusion Detection Using NFR: Methods and Experiences
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Information-Theoretic Measures for Anomaly Detection
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Data Mining Methods for Detection of New Malicious Executables
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
An extensible meta-learning approach for scalable and accurate inductive learning
An extensible meta-learning approach for scalable and accurate inductive learning
A data mining framework for constructing features and models for intrusion detection systems (computer security, network security)
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Mining system audit data: opportunities and challenges
ACM SIGMOD Record
Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility
ACM SIGKDD Explorations Newsletter
Principle Components and Importance Ranking of Distributed Anomalies
Machine Learning
Maintaining Implicated Statistics in Constrained Environments
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Mapping maintenance for data integration systems
VLDB '05 Proceedings of the 31st international conference on Very large data bases
Summarization — Compressing Data into an Informative Representation
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Hierarchical Visualization of Network Intrusion Detection Data
IEEE Computer Graphics and Applications
International Journal of Human-Computer Studies
An efficient collaborative intrusion detection system for MANET using Bayesian Approach
Proceedings of the 9th ACM international symposium on Modeling analysis and simulation of wireless and mobile systems
Summarization – compressing data into an informative representation
Knowledge and Information Systems
A new intrusion detection system using support vector machines and hierarchical clustering
The VLDB Journal — The International Journal on Very Large Data Bases
Autonomous decision on intrusion detection with trained BDI agents
Computer Communications
Evaluation of Intrusion Detection Systems Under a Resource Constraint
ACM Transactions on Information and System Security (TISSEC)
Semi-supervised multiple classifier systems: background and research directions
MCS'05 Proceedings of the 6th international conference on Multiple Classifier Systems
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Using attack-specific feature subsets for network intrusion detection
AI'06 Proceedings of the 19th Australian joint conference on Artificial Intelligence: advances in Artificial Intelligence
Learning from socio-economic characteristics of IP geo-locations for cybercrime prediction
International Journal of Business Intelligence and Data Mining
Hi-index | 0.00 |