References
- T. Lane and C. E. Brodley. 'Temporal sequence leaming and data reduction dor anomaly detection'. In Processsing of the fifth ACM Conference on Computer and Communications Security, pages 150-158, 1998
- W. Lee, R. Nimbalkar, K. Yee, S.Patil, P. Desai, T. Tran, and S. J. Stolfo. 'A data mining and CIDF based approach for detecting novel and distributed intrusions'. In Proceedings of the 3rd International Workshop on Recent Advances in intrusion Detection, October 2000
- W. Lee, S. J. Stolfo. 'Data mining approaches for intrusion detection'. In Proceeding of the 1998 USENIX security Symposium, 1998
- W.Lee, S.J.Stolfo, and K.Mok, 'A Data Mining Framework for Building Intrusion Detection models', 1999 IEEE Symposium on security and Privacy, 1999
- Sandeep Kumar, gene Spafford. 'A Pattern Matching Model for Misuse Intrusion Detection,' Proceedings of the 17th National Computer Security Conference, October 1994
- T. lane and C. E. Brodley. 'Detecting abnormal : Machine leaming in computer security', Technical Report TRECE 97-1, Prudue University, West Lafayette, IN, 1997
- Jai Sundar B. Spafford E, 'Software Agents for Intrusion Detection,' Technical Report, Purdue University, Department of Computer Science, 1997
- Crosbie M, Spafford E, 'Defending a Computer System using Autonomous Agents,' Technical Report, Purdue University, Department of Computer Science, 1996
- Wenke Lee, Salvatore J.Stolfo, Philip k.Chan, 'Real Time Data Mining-based Intrusion Detection'. In proceedings of IEEE symposium on research in security and privacy, 2000