A Framework for Constructing Features and Models for Intrusion Detection Systems (2000)

by Wenke Lee , Salvatore J. Stolfo
Venue:ACM Transactions on Information and System Security
Citations:168 - 7 self

Active Bibliography

39 A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems – Wenke Lee - 1999
Behavioral feature Extraction for NETWORK ANOMALY DETECTION – James P. Early - 2005
260 A data mining framework for building intrusion detection models – Wenke Lee, Salvatore J. Stolfo, Kui W. Mok - 1999
118 Information-Theoretic Measures for Anomaly Detection – Wenke Lee, Dong Xiang - 2001
1 Outlier Detection: A Survey – Varun Chandola, Arindam Banerjee, Vipin Kumar - 2007
3 Modern intrusion detection, data mining, and degrees of attack guilt – Steven Noel, Duminda Wijesekera, Charles Youman - 2002
33 Real time data mining-based intrusion detection – Wenke Lee, Salvatore J. Stolfo, Philip K. Chan, Eleazar Eskin, Wei Fan, Matthew Miller, Shlomo Hershkop, Junxin Zhang - 2001
12 Data Mining Methods for Network Intrusion Detection – S Terry Brugger - 2004
1 A Filtering Approach To Anomaly and Masquerade Detection – S. Jha, L. Kruger, T. Kurtz, Y. Lee, A. Smith
164 Intrusion Detection Systems: A Survey and Taxonomy – Stefan Axelsson - 2000
2 Abstract Mining System Audit Data: Opportunities and Challenges – Wenke Lee
186 Anomaly Detection: A Survey – Varun Chandola, Arindam Banerjee, Vipin Kumar - 2007
320 Data Mining Approaches for Intrusion Detection – Wenke Lee, Salvatore J. Stolfo
6 INTRUSION DETECTION: A SURVEY – Aleksandar Lazarevic, Vipin Kumar, Jaideep Srivastava - 2005
Anomaly Detection for Symbolic Sequences . . . – Varun Chandola - 2009
2 Data Mining Techniques for (Network) Intrusion Detection Systems – Theodoros Lappas, Konstantinos Pelechrinis
31 Cost-sensitive modeling for fraud and intrusion detection: Results from the JAM project – Salvatore J. Stolfo, Wei Fan, Andreas Prodromidis, Philip K. Chan, Wenke Lee - 2000
12 A Data Mining Framework for Adaptive Intrusion Detection – Wenke Lee, Salvatore J. Stolfo, Kui W. Mok - 1998
Intrusion Detection Technology – Tyrone Grandison, Evimaria Terzi - 2007