References
- Berry, Michael, J. A. and Linoff, G. (1999), Mastering Data Mining, John Wiley & Sons
- Bloedorn, Eric (2000), Data Mining for Improving Intrusion Detection, MITRE
- Clifton, Chris and Gengo, Gary (2000), Developing Custom Intrusion Detection Filters using Data Mining, Proceedings of MILCOM 2000, 440-443
- Cuppens, Frederic (2001), Managing Alerts in a Multi-Intrusion Detection Environment, Proceedings of the 17th ACSAC 2001
- Ellis, J., Hayes, E., Marella, J. and Willke, B. (2002), State of the Practice of Intrusion Detection Technologies, Technical Report, SEI, Carnegie Mellon University
- Erbacher, R. F., Walker, K. L. and Frincke, D. A. (2002), Intrusion and Misuse Detection in Large-Scale Systems, IEEE computer Graphics and Applications, 38-48
- Han, J. and Fu, Y. (1996), Exploration of the Power of Attribute-Oriented Induction in Data, Advances in Knowledge Discovery and Data Mining
- Han, J. and Kamber, M. (2001), Data Mining Concepts and Techniques, Morgan Kaufmann
- Han, J., Cai, Y. and Cercone, N. (1992), Knowledge Discovery in Databases: An Attribute-Oriented Approach, Proceedings of the 18th International Conference on Very Large Databases, 547-559
- Julisch, K. (2000), Dealing with False Positives in Intrusion Detection, In Extended Abstract, the 3rd Workshop on Recent Advances in Intrusion Detection (RAID), (http://www.raid-symposium.org/raid2000/program.html)
- Julisch, K. (2001), Mining Alarm Clusters to Improve Alarm Handling Efficiency, Proceedings of the 17th Computer Security Applications Conference, 12-21
- Julisch, K. (2002), Clustering Intrusion Detection Alarms to Support Root Cause Analysis, ACM, 2(3), 111-138
- Julisch, K. and Dacier, M. (2002), Mining Intrusion Detection Alarms for Actionable Knowledge, Proceedings of 8th SIGKDD, 366-375
- Korea Information Security Agency (2001), Intrusion Detection System Estimate Standard, Report, 2001-12
- Korea Information Security Agency (2003), 2003 Information Security Industry Survey, Report, 2003-12
- Korea Information Security Agency (2004), Hacking/Virus Statics and analysis , Report, 2004-12
- Magbag, Sheilla D. (2004), A Survey of Misuse Intrusion Detection, (Seminar bstract). UPLB-ICSwebpage (http://www.ics.uplb.edu.ph/node/143)
- Ministry of Information And Communication Republic of Korea (2005), Diving in IT 2005 Numerically, Report, 2005-12
- Sherif, J. S. (2002), Intrusion Detection: Systems and Models, Proceedings of the 7th IEEE International workshop, 115-133