Next: About this document ...
Up: Toward Cost-Sensitive Modeling for
Previous: 7. Conclusion and Future
- 1
-
E. Amoroso.
Intrusion Detection: An Introduction to Internet Surveillance,
Correlation, Traps, Trace Back, and Response.
Intrusion.Net Books, 1999.
- 2
-
A. M. Anderson.
Comparing risk analysis methodologies.
In D. T. Lindsay and W. L. Price, editors, Information
Security. Elsevier Science Publishers, 1991.
- 3
-
R. Bace.
Intrusion Detection.
Macmillan Technical Publishing, 2000.
- 4
-
R. P. Campbell and G. A. Sands.
A modular approach to computer security risk management.
In AFIPS Conference Proceedings. AFIPS Press, 1979.
- 5
-
F. Cohen.
Protection and Security on the Information Superhighway.
John Wiley & Sons, 1995.
- 6
-
W. W. Cohen.
Fast effective rule induction.
In Machine Learning: the 12th International Conference, Lake
Taho, CA, 1995. Morgan Kaufmann.
- 7
-
DARCOM.
Engineering Design Handbook: Army Weapon Systems Analysis, Part
Two (DARCOM-P 706-102).
US Army Materiel Development And Readiness Command, 1979.
- 8
-
D. Denning.
Information Warfare and Security.
Addison Wesley, 1999.
- 9
-
P. Domingos.
Metacost: A general method for making classifiers cost-sensitive.
In Proceedings of the 5th ACM SIGKDD International Conference on
Knowledge Discovery & Data Mining (KDD-99), August 1999.
- 10
-
W. Fan, W. Lee, S. J. Stolfo, and M. Miller.
A multiple model cost-sensitive approach for intrusion detection.
To appear in the Eleventh European Conference on Machine Learning
(ECML-2000), May 2000.
- 11
-
S. Glaseman, R. Turn, and R. S. Gaines.
Problem areas in computer security assessment.
In Proceedings of the National Computer Conference, 1977.
- 12
-
W. Lee.
A Data Mining Framework for Constructing Features and Models for
Intrusion Detection Systems.
PhD thesis, Columbia University, June 1999.
- 13
-
W. Lee, S. J. Stolfo, and K. W. Mok.
A data mining framework for building intrusion detection models.
In Proceedings of the 1999 IEEE Symposium on Security and
Privacy, May 1999.
- 14
-
U. Lindqvist and E. Jonsson.
How to systematically classify computer security intrusions.
In Proceedings of the IEEE Symposium on Research in Security and
Privacy, Oakland CA, May 1997.
- 15
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber,
S. Webster, D. Wyschogrod, R. Cunninghan, and M. Zissman.
Evaluating intrusion detection systems: The 1998 darpa off-line
intrusion detection evaluation.
In Proceedings of the 2000 DARPA Information Survivability
Conference and Exposition, January 2000.
- 16
-
M. Miller.
Learning cost-sensitive classification rules for network intrusion
detection using ripper.
Technical Report CUCS-035-99, Computer Science Department, Columbia
University, June 1999.
- 17
-
T. Mitchell.
Machine Learning.
McGraw-Hill, 1997.
- 18
-
Network Flight Recorder Inc.
Network flight recorder.
http://www.nfr.com, 1997.
- 19
-
S. Northcutt.
Intrusion Detection: An Analyst's Handbook.
New Riders, 1999.
- 20
-
V. Paxson.
Bro: A system for detecting network intruders in real-time.
In Proceedings of the 7th USENIX Security Symposium, San
Antonio, TX, 1998.
Erez Zadok
2000-11-09