참고문헌
- Sandeep Kumar, Classification and Detection of Computer Intrusions. Ph.D. Dissertation, August 1995
- Harold S. Javitz and Alfonso Valdes, 'The NIDES Statistical Component Description and Justification,' Annual report, SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025, March 1994
- Phillip A. Porras and Peter G. Neumann, 'EMERALD : Event Monitoring Enabling Responses to Anomalous Live Disturbances,' 20th NISSC, October 1997
- Jai Sundar Balesubramaniyan, Jose Omar Garcia-Fernandes, David Isacoff, Eugene Spafford, Diego Zamboni, 'An Architecture for Intrusion Detection using Autonomous Agents,' Technical Report 98-05, COAST Laboratory, Purdue University, West Lafayette, IN 47907-1398, May 1998
- W. Lee and S. Stolfo, 'Data Mining Approaches for Intrusion Detection,' In Proc. of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29, 1998
- W. Lee, S. J. Stolfo and P. K. Chan, 'Learning Patterns from Unix Process Execution Traces for Intrusion Detection,' Proc. AAAI-97 Work. on AI Methods in Fraud and Risk Management, 1997
- S. J. Stolfo, A. L. Prodromidis, S. Tselepis, W. Lee, D. Fan, P.K. Chan, 'JAM : Java agents for Meta-Learning over Distributed Databases,' Proc. KDD-97 and AAAI97 Work. on AI Methods in Fraud and Risk Management, 1997
- B. Mukherjee, T. L. Heberlein, and K. N. Kevitt, 'Network intrusion Detection,' IEEE Network, 8(3) : 26-41, May/June 1994 https://doi.org/10.1109/65.283931
- R. Heady, G. Luger, A. Maccabe, and M. Servilla, 'The Architecture of a Network Level Intrusion Detection System,' Technical Report, Computer Science Department, University of New Mexico, August 1990
- K. Illgun, R. Kemmerer, Phillip A. Porras, 'State Transition Analysis : A rule-based intrusion detection approach,' IEEE Transaction on Software Engineering pp.181-199, March. 1995 https://doi.org/10.1109/32.372146
- K. Illgun, 'USTAT : A Real-Time Intrusion Detection System for UNIX,' in Proc. Of the 1993 Symposium Security and Privacy, pp.16-28, May 24-26, 1993 https://doi.org/10.1109/RISP.1993.287646
- T. D. Garvey and Teresa F. Lunt, 'Model based intrusion detection,' In Proc. Of the 14th National Computer Security Conference, pp.372-385, October 1991
- H. S. Javitz, A. Valdes, 'The SRI IDES Statistical Anomaly Detector,' In Proc. of the 1991 IEEE Symposium on Research in Security and Privacy, May 1991
- Jai Sundar Balesubramaniyan, Jose Omar Garcia-Fernandes, David Isacoff, Engene Spafford, Diego Zamboni. An Architecture for Intrusion Detection using Autonomous Agents. Technical Report 98-05, COAST Laboratory, Purdue University, West Lafayette, IN 47907-1398, May 1998
- Martin Ester, Hans-Peter Kriegel, Sander, Michael Wimmer, Xiaowei Xu, 'Incremental Clustering for Mining in a Data Warehousing Environment,' Proceedings of the 24th VLDB Conference, New York, USA, 1998
- Sudipto Guha, Rajeev Rastogi and Kyuseok Shim, 'ROCK : A Clustering Algorithm for Categorical Attributes,' the 15th International Conference on IEEE Data Engineering, Sydney, Australia, 1999
- Sudipto Guha, Rajeev Rastogi and Kyuseok Shim, 'CURE : An Efficient Clustering Algorithm for Large Databases,' ACM SIGMOD International Conference on Management of Data, Seattle, Washington, 1998 https://doi.org/10.1145/276304.276312
- Tian Zhang, Raghu Ramakrishnan, and Miron Livny, 'Birch : An Efficient data clustering method for very large databases,' Proceedings for the ACM SIGMOD Conference on Management of Data, Montreal, Canada, June 1996 https://doi.org/10.1145/233269.233324
- R. Agrawal, R. Srikant : 'Fast Algorithms for Mining Association Rules,' Proc. of the 20th Int'l Conference on Very Large Databases, Santiago, Chile, Sept. 1994
- R. Agrawal, R. Srikant : 'Mining Sequential Patterns,' Proc. of the Int'l Conference on Data Engineering (ICDE), Taipei, Taiwan, March 1995
- Sun Microsystems. SunShield Basic Security Module Guide