Applications of Data Mining in Computer Security最新文献

筛选
英文 中文
An Architecture for Anomaly Detection 一种异常检测体系结构
Applications of Data Mining in Computer Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4615-0953-0_3
Daniel Barbará, Julia Couto, S. Jajodia, Ningning Wu
{"title":"An Architecture for Anomaly Detection","authors":"Daniel Barbará, Julia Couto, S. Jajodia, Ningning Wu","doi":"10.1007/978-1-4615-0953-0_3","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_3","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125076048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Fusing A Heterogeneous Alert Stream Into Scenarios 将异构告警流融合到场景中
Applications of Data Mining in Computer Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4615-0953-0_5
Oliver Dain, R. Cunningham
{"title":"Fusing A Heterogeneous Alert Stream Into Scenarios","authors":"Oliver Dain, R. Cunningham","doi":"10.1007/978-1-4615-0953-0_5","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_5","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125269001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 282
Data Mining for Intrusion Detection 入侵检测中的数据挖掘
Applications of Data Mining in Computer Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4615-0953-0_2
Klaus Julisch
{"title":"Data Mining for Intrusion Detection","authors":"Klaus Julisch","doi":"10.1007/978-1-4615-0953-0_2","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_2","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132493118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Adaptive Model Generation 自适应模型生成
Applications of Data Mining in Computer Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4615-0953-0_7
A. Honig, Andrew Howard, E. Eskin, S. Stolfo
{"title":"Adaptive Model Generation","authors":"A. Honig, Andrew Howard, E. Eskin, S. Stolfo","doi":"10.1007/978-1-4615-0953-0_7","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_7","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Proactive Intrusion Detection 主动入侵检测
Applications of Data Mining in Computer Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4615-0953-0_8
J. Cabrera, L. Lewis, X. Qin, Wenke Lee, R. Mehra
{"title":"Proactive Intrusion Detection","authors":"J. Cabrera, L. Lewis, X. Qin, Wenke Lee, R. Mehra","doi":"10.1007/978-1-4615-0953-0_8","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_8","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134483691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Mail Authorship Attribution for Computer Forensics 计算机取证的电子邮件作者归属
Applications of Data Mining in Computer Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4615-0953-0_9
O. Vel, Alison Anderson, M. Corney, G. Mohay
{"title":"E-Mail Authorship Attribution for Computer Forensics","authors":"O. Vel, Alison Anderson, M. Corney, G. Mohay","doi":"10.1007/978-1-4615-0953-0_9","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_9","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114679648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Using MIB II Variables for Network Intrusion Detection 利用MIB II变量进行网络入侵检测
Applications of Data Mining in Computer Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4615-0953-0_6
X. Qin, Wenke Lee, L. Lewis, J. Cabrera
{"title":"Using MIB II Variables for Network Intrusion Detection","authors":"X. Qin, Wenke Lee, L. Lewis, J. Cabrera","doi":"10.1007/978-1-4615-0953-0_6","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_6","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133502281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt 现代入侵检测、数据挖掘和攻击罪责程度
Applications of Data Mining in Computer Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4615-0953-0_1
S. Noel, D. Wijesekera, C. E. Youman
{"title":"Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt","authors":"S. Noel, D. Wijesekera, C. E. Youman","doi":"10.1007/978-1-4615-0953-0_1","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_1","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"147 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132734602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 87
A Geometric Framework for Unsupervised Anomaly Detection 一种无监督异常检测的几何框架
Applications of Data Mining in Computer Security Pub Date : 1900-01-01 DOI: 10.1007/978-1-4615-0953-0_4
E. Eskin, Andrew O. Arnold, Michael J. Prerau, Leonid Portnoy, S. Stolfo
{"title":"A Geometric Framework for Unsupervised Anomaly Detection","authors":"E. Eskin, Andrew O. Arnold, Michael J. Prerau, Leonid Portnoy, S. Stolfo","doi":"10.1007/978-1-4615-0953-0_4","DOIUrl":"https://doi.org/10.1007/978-1-4615-0953-0_4","url":null,"abstract":"","PeriodicalId":151991,"journal":{"name":"Applications of Data Mining in Computer Security","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116995136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 641
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信