1 |
B. Mukherjee, T. L. Heberlein and K. N. Kevitt, 'Network intrusion Detection,' IEEE Network, Vol. 8, No. 3, pp. 26-41, May/June, 1994
DOI
ScienceOn
|
2 |
K. Illgun, 'USTAT : A Real-Time Intrusion Detection System for UNIX,' in Proc. Of the 1993 Symposium Security and Privacy, pp. 16-28, May, 1993
DOI
|
3 |
T. D. Garvey and Teresa, F. Lunt, 'Model based intrusion detection,' In Proc. Of the 14th National Computer Security Conference, pp. 372-385, October, 1991
|
4 |
H. S. Javitz, A. Valdes, 'The SRIIDES Statistical Anomaly Detector,' In Proc. of the 1991 IEEE Symposium on Research in Security and Privacy, May, 1991
|
5 |
W. Wnag, J. Yang and R. Muntz, STING : A statistical information grid approach to spatial data mining, 1997
|
6 |
Harold S. Javitz and Alfonso Valdes, The NIDES Statistical Component Description and Justification, Annual report, SRI International, 333 Ravenwood Avenue, Menlo Park, CA 94025, March, 1994
|
7 |
Phillip A. Porras and Peter G. Neumann, 'EMERALD : Event Monitoring Enabling Responses to Anomalous Live Disturbances,' 20th NISSC, October, 1997
|
8 |
Martin Ester, Hans-Peter Kriegel, Sander, Michael Wimmer, Xiaowei Xu, 'Incremental Clustering for Mining in a Data Warehousing Environment,' Proceedings of the 24th VLDB Conference, New York, USA, 1998
|
9 |
Henry S. Teng, Kaihu Chen and Stephen C. Lu, 'Security Audit Trail Analysis Using Inductively Generated Predictive Rules,' In Proceedings of the Sixth Conference on Artificial Intelligence Applications, Piscataway, New Jersey, pp. 24-29, March, 1990
DOI
|
10 |
Sudipto Guha, Rajeev Rastogi and Kyuseok Shim, 'CURE : An Effeicient Clustering Algorithm for Large Databases,' ACM SIGMOD International Conference on Management of Data, Seattle, Washington, 1998
|
11 |
MacQueen, J., 'Some Methods for Classification and Analyisis of Multivariate Observations,' Proc. 5th Berkeley Symp., pp. 281-297, 1967
|
12 |
Kaufman, L. and Rouseeuw, P., Finding Groups in Data : an Introduction to Cluster Analysis, John Wiley & Sons, 1990
|
13 |
http://www.ll.mit.edu/IST/ideval/index.html
|
14 |
R. Agrawal, R. Srikant, 'Fast Algorithms for Mining Association Rules,' Proc. of the 20th Int'l Conference on Very Large Databases, Santiago, Chile, Sept., 1994
|
15 |
Tian Zhang, Raghu Ramakrishnan and Miron Livny, 'Birch : An Efficient data clustering method for very large databases,' Proceedings for the ACM SIGMOD Conference on Management of Data, Montreal, Canada, June, 1996
DOI
ScienceOn
|
16 |
Rakesh Agrawal, Johannes Gehrke, Dimitrios Gunopulos, Prabhakar Raghavan, 'Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications,' Proc. of the ACM SIGMOD Int'l Conference on Management of Data, Seattle, Washington, June, 1998
DOI
ScienceOn
|
17 |
R. Agrawal, R. Srikant, 'Mining Sequential Patterns,' Proc. of the Int'l Conference on Data Engineering (ICDE), Taipei, Taiwan, March, 1995
|
18 |
Sun Microsystems. SunShield Basic Security Module Guide
|