Daniel Barbará, Julia Couto, S. Jajodia, Ningning Wu
{"title":"An Architecture for Anomaly Detection","authors":"Daniel Barbará, Julia Couto, S. Jajodia, Ningning Wu","doi":"10.1007/978-1-4615-0953-0_3","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_3","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125076048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fusing A Heterogeneous Alert Stream Into Scenarios","authors":"Oliver Dain, R. Cunningham","doi":"10.1007/978-1-4615-0953-0_5","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_5","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125269001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Mining for Intrusion Detection","authors":"Klaus Julisch","doi":"10.1007/978-1-4615-0953-0_2","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_2","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132493118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Model Generation","authors":"A. Honig, Andrew Howard, E. Eskin, S. Stolfo","doi":"10.1007/978-1-4615-0953-0_7","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_7","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive Intrusion Detection","authors":"J. Cabrera, L. Lewis, X. Qin, Wenke Lee, R. Mehra","doi":"10.1007/978-1-4615-0953-0_8","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_8","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134483691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Mail Authorship Attribution for Computer Forensics","authors":"O. Vel, Alison Anderson, M. Corney, G. Mohay","doi":"10.1007/978-1-4615-0953-0_9","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_9","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114679648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using MIB II Variables for Network Intrusion Detection","authors":"X. Qin, Wenke Lee, L. Lewis, J. Cabrera","doi":"10.1007/978-1-4615-0953-0_6","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_6","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133502281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt","authors":"S. Noel, D. Wijesekera, C. E. Youman","doi":"10.1007/978-1-4615-0953-0_1","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_1","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"147 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Eskin, Andrew O. Arnold, Michael J. Prerau, Leonid Portnoy, S. Stolfo
{"title":"A Geometric Framework for Unsupervised Anomaly Detection","authors":"E. Eskin, Andrew O. Arnold, Michael J. Prerau, Leonid Portnoy, S. Stolfo","doi":"10.1007/978-1-4615-0953-0_4","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_4","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}