1 |
Richard P.Lippmann and David J. Freid etc., 'Evaluating Intrusion Detection System:The 1998 DARPA off-line Intrusion Detection Evalution,'
DOI
|
2 |
Y. Liao and R. Vemuri, 'Using Text Categorization Techiques for Intrusion Detection,' the 11th USENIX Security Symposium, 2002
|
3 |
E. Eskin, A. Arnold, M, Prerau and L. Portnoy, 'A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data,' Application of Data Mining in Computer Security, Kluwer., 2002
|
4 |
S. Mukkamala and A. Sung, 'Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques,' Intl. of Digital Evidence. Vol. 1., 2003
|
5 |
Smaha, Stephen E., 'Haystack: An Intrusion Detection System,' Proceedings of the Fourth Aerospace Computer Security Applications Conference, 1988
DOI
|
6 |
R. O. Duda, P. E. Hart and D. G. Stork, Pattern Classification 2nd edition, Wiley-INTERSCIENCE., 2001
|
7 |
The third international Knowledge discovery and data mining tools competition dataset KDD99 CUP, http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html, 1998
|
8 |
D. E. Denning, 'An Intrusion-Detection Model,' IEEE Trans. on Software Engineering, No.2, Feb., 1987
DOI
ScienceOn
|
9 |
진성해, '네트워크 침입 탐지를 위한 변형된 통계적 학습 모형,' 정보처리학회논문지C, 2003
과학기술학회마을
|
10 |
J.Ross Quinlan, C4.5: Programs for Machine Learing, Morgan Kaufmann Publishers
|
11 |
W. Lee and D. Xiang, 'Information-Theoretic Measures for Anomaly Detection,' IEEE Symposium on Security and Privacy, 2001
DOI
|