Information Technology Reference
In-Depth Information
Acknowledgements. We would like to thank Gjøvik University College, Norwegian
Information Security Laboratory, project CUCO (MTM2008-02194) from the Minis-
terio de Ciencia e Innovación, program JAE/I3P from the Consejo Superior de Inves-
tigaciones Científicas.
References
1. Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. John Wiley & Sons, USA (2001)
2. Guyon, I., Gunn, S., Nikravesh, M., Zadeh, L.A.: Feature Extraction: Foundations and Ap-
plications. Series Studies in Fuzziness and Soft Computing. Springer, Heidelberg (2005)
3. Liu, H., Motoda, H.: Computational Methods of Feature Selection. Chapman & Hall/CRC,
Boca Raton (2008)
4. Nguyen, H., Franke, K., Petrović, S.: Towards a Generic Feature-Selection Measure for In-
trusion Detection. In: 20th International Conference on Pattern Recognition, Istanbul, Tur-
key, pp. 1529-1532 (August 2010)
5. Torrano-Gimenez, C., Perez-Villegas, A., Alvarez, G.: A Self-Learning Anomaly-Based
Web Application Firewall. In: Proceedings of Computational Intelligence In Security For In-
formation Systems (CISIS 2009), pp. 85-92 (2009)
6. Rassi, C., Brissaud, J., Dray, G., Poncelet, P., Roche, M., Teisseire, M.: Web Analyzing
Traffic Challenge: Description and Results. In: Proceedings of the Discovery Challenge
ECML/PKDD 2007, pp. 47-52 (2007)
7. McHugh, J.: Testing Intrusion Detection Systems: Critique of the 1998 and 1999 DARPA
Intrusion Detection System Evaluations as Performed by Lincoln Laboratory. Proc. ACM
Transactions on Information and System Security (TISSEC) 3(4), 262-294 (2000)
8. Becher, M.: Web Application Firewalls. VDM Verlag Dr. Mueller e.K. (February 1, 2007);
ISBN-10: 383640446X, ISBN-13: 978-3836404464
9. Lee, W.: A data mining framework for building intrusion detection models. In: IEEE Sym-
posium on Security and Privacy, Berkeley, California, pp. 120-132 (1999)
 
Search WWH ::




Custom Search