Information Technology Reference
In-Depth Information
4. Eskin, E., Arnold, A., Prerau, M., Portnoy, L. and Stolfo, S. J.: '' A Geometric Framework
for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data '', To Appear
in Data Mining for Security Applications. Kluwer (2002)
5. George H. John and Pat Langley: Estimating continuous distributions in bayesian classifi-
ers. In Proceedings of the Eleventh Conference on Uncertainty in Artificial Intelligence .
(1995) 338-345
6. Wenke Lee, Sal Stolfo, and Kui Mok: Mining Audit Data to Build Intrusion Detection
Models. In Proceedings of the Fourth International Conference on Knowledge Discovery
and Data Mining (KDD '98) , New York, NY, August 1998
7. Wenke Lee, Sal Stolfo, and Phil Chan. ''Learning Patterns from Unix Process Execution
Traces for Intrusion Detection'' AAAI Workshop: AI Approaches to Fraud Detection and
Risk Management , July 1997
8. MySQL, www.mysql.org (2002)
9. Niblack, W. et al. “The QBIC project: querying images by content using color, texture, and
shape”. In Proceedings of the SPIE , February 1993
10. Procmail,www.procmail.org (2002)
11. Sendmail,www.sendmail.org (2002)
12. Matthew G. Schultz, Eleazar Eskin, and Salvatore J. Stolfo. '' Malicious Email Filter - A
UNIX Mail Filter that Detects Malicious Windows Executables .'' Proceedings of USENIX
Annual Technical Conference — FREENIX Track. Boston, MA: June 2001
13. Smith, J.R.: Integrated Spatial and Feature Image Systems: Retrieval, Compression and
Analysis . PhD thesis, Columbia University (1997)
14. Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile
code. Prof. ACSAC Security Conference, Las Vegas, NV (2002)
15. Newman, M.E., Forrest, S. and Balthrup, J.: Email networks and the spread of computer vi-
ruses. The American Physical Society (2002)
16. Damashek, M.: Gauging similarity with n-grams: language independent categorization of
text . Science, 267(5199) (1995) 843-848
17. Mitchell, Tom M. Machine Learning . McGraw-Hill (1997) 180-183
18. Hogg, R.V., Craig, A.T.: Introduction to Mathematical Statistics. Prentice Hall (1994) 293-
301
19. Schonlau, M., DuMouchel, W., WH Ju, Karr, A.F., M theus and Y. Vardi: Computer Intru-
sion Detecting Masquerades. Statistical Science, Vol. 16 (2001)
Search WWH ::




Custom Search