1 |
W. Lee, S. Stolfo and P. K. Chan, 'Learning Patterns from Unix Process Execution Traces for Intrusion Detection,' Proc. AAAI-97 Work. On AI Methods in Fraud and Risk Management, 1997
|
2 |
T. D. Garvey and Teresa, F. Lunt, 'Model Based Intrusion Detection,' In Proc. Of the 14th National Computer Security Conference, pp.372-385, October, 1991
|
3 |
D. E. Denning, Cryptography and Data Security, Addision-Wesley, 1982
|
4 |
William Stallings, Network And Internetwork Security Principles and Practice, Prentice Hall, Inc. 1995
|
5 |
Carter and Katz, Computer crime : an emerging challenge for law enforcement, FBI Law Enforcement Bulletin, pp.1-8, December, 1996
|
6 |
W. Lee and S. Stolfo, 'Data Mining Approaches for Intrusion Detection,' In Proc. of the 7th USENIX Security Symposium, San Antonio, Texas, January, 1998
|
7 |
F. Chin, 'Security in Statistical Databases for Queries with Small Counts,' TODS, 3 : 1, March, 1978
DOI
ScienceOn
|
8 |
D. E. Bell, L. J. La Padula, Secure Computer Systems : Mathematical Foundations and Model, Technical Report M74-244, MITRE Corp, 1974
|
9 |
S. Stolfo, A. L. Prodromidis, S. Tselepis, W. Lee, D. Fan, P. K. Chan, 'JAM : Java Agents for Meta-Learning over Distributed Databases,' Proc. KDD-97 and AAAI97 Work. On AI Methods in Fraud and Risk Management, 1997
|
10 |
Sandeep Kumar, Classification and Detection of Computer Intrusions, Ph.D Dissertation, August, 1995
|
11 |
K. J. Biba, Integrity Considerations for Secure Computer Systems, Technical Report 76-372, MITRE Corp., 1977
|
12 |
Ming-Syan Chen, Jiawei Han, Philip S. Yu, 'Data Mining : An Overview from Database Perspective,'
DOI
ScienceOn
|
13 |
C. Chung, M. Gertz, K. Levitt, 'DEMIDS : A Misuse Detection System for Database Systems,' IFIP WG 11.5, 1999
|
14 |
Yon-Wu Huang, Philip S. Yu, 'Adaptive Query Processing for Time-Series Data,' KDD-99, ACM August, 1999
DOI
|
15 |
G. M. Landau and U. Vishkin, Fast parallel and serial approximate string matching. Journal of Algorithms, (2), pp.157-169, 1989
DOI
|
16 |
Ian H. Witten and Eibe Frand, Data Mining practical machine learning tools and techniques with JAVA implementations, Morgan Kaufmann Publishers, pp.119-156, 1999
|
17 |
윤정혁, 오상현, 이원석, '사용자 명령어 분석을 통한 비정상 행위 판정에 관한 연구', 한국정보보호학회논문지, 제10권 제4호, 2000
과학기술학회마을
|
18 |
Rakesh Agrawal, Ramakrishnan Srikant, 'Fast Algorithms for Mining Association Rules,' In Proc. Of the 20th VLDB Conference, 1994
|
19 |
Computational Mathematics, Online Lecture, http://www.maths.bris.ac.uk/~macpc/lect5
|
20 |
H. Mannila, H. Toivonen and I. Verkamo, 'Discovery of frequent episodes in event sequences,' Data Mining and Knowledge Discovery, 1, 3, pp.259-289, 1997
DOI
|