Biomedical Engineering Reference
In-Depth Information
20. Stolfo SJ, Fan W, Lee W (2000) Cost-based modeling for fraud and intrusion detection:
results from the JAM project. In: Proceedings of the 2000 DARPA information survivability
conference and exposition, 2000
21. Kohonen T (1995) Self-organizing maps. In: Springer series in information sciences, vol 30.
Springer, Berlin (Second Extended Edition 1997)
22. Lichodzijewski P, Zincir-Heywood AN, Heywood MI (2002) Host-based intrusion detection
using neural gas. In: Proceedings of the 2002 IEEE world congress on computational
intelligence, 2002 (in press)
23. Lee W, Stolfo S, Mok K (1999) Mining in a data environment: experience in network
intrusion
detection.
In:
Proceedings
of
5th
ACM
SIGKDD
international
conference
knowledge discovery and data mining, 124, San Diego, CA, p 114
24. Lee W, Stolfo S (1998) Data mining approaches for intrusion detection. In: Proceedings of
the 7th USENIX security symposium (SECURITY '98), San Antonio, TX
25. Forrest, S. et al (1994) Self-Nonself Discrimination in a Computer, In: Proceedings of IEEE
Symposium on Research in Security and Privacy, Los Alamos, CA: IEEE Computer Society
Press
26. Sequeira and Zaki (2002) Anomaly Based Data Mining For Intrusion IJCSI PUBLICATION
SP 800-31
Search WWH ::




Custom Search