next up previous
Next: About this document ... Up: Toward Cost-Sensitive Modeling for Previous: 7. Conclusion and Future

Bibliography

1
E. Amoroso.
Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Traps, Trace Back, and Response.
Intrusion.Net Books, 1999.

2
A. M. Anderson.
Comparing risk analysis methodologies.
In D. T. Lindsay and W. L. Price, editors, Information Security. Elsevier Science Publishers, 1991.

3
R. Bace.
Intrusion Detection.
Macmillan Technical Publishing, 2000.

4
R. P. Campbell and G. A. Sands.
A modular approach to computer security risk management.
In AFIPS Conference Proceedings. AFIPS Press, 1979.

5
F. Cohen.
Protection and Security on the Information Superhighway.
John Wiley & Sons, 1995.

6
W. W. Cohen.
Fast effective rule induction.
In Machine Learning: the 12th International Conference, Lake Taho, CA, 1995. Morgan Kaufmann.

7
DARCOM.
Engineering Design Handbook: Army Weapon Systems Analysis, Part Two (DARCOM-P 706-102).
US Army Materiel Development And Readiness Command, 1979.

8
D. Denning.
Information Warfare and Security.
Addison Wesley, 1999.

9
P. Domingos.
Metacost: A general method for making classifiers cost-sensitive.
In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD-99), August 1999.

10
W. Fan, W. Lee, S. J. Stolfo, and M. Miller.
A multiple model cost-sensitive approach for intrusion detection.
To appear in the Eleventh European Conference on Machine Learning (ECML-2000), May 2000.

11
S. Glaseman, R. Turn, and R. S. Gaines.
Problem areas in computer security assessment.
In Proceedings of the National Computer Conference, 1977.

12
W. Lee.
A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems.
PhD thesis, Columbia University, June 1999.

13
W. Lee, S. J. Stolfo, and K. W. Mok.
A data mining framework for building intrusion detection models.
In Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999.

14
U. Lindqvist and E. Jonsson.
How to systematically classify computer security intrusions.
In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland CA, May 1997.

15
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunninghan, and M. Zissman.
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation.
In Proceedings of the 2000 DARPA Information Survivability Conference and Exposition, January 2000.

16
M. Miller.
Learning cost-sensitive classification rules for network intrusion detection using ripper.
Technical Report CUCS-035-99, Computer Science Department, Columbia University, June 1999.

17
T. Mitchell.
Machine Learning.
McGraw-Hill, 1997.

18
Network Flight Recorder Inc.
Network flight recorder.
http://www.nfr.com, 1997.

19
S. Northcutt.
Intrusion Detection: An Analyst's Handbook.
New Riders, 1999.

20
V. Paxson.
Bro: A system for detecting network intruders in real-time.
In Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, 1998.


Erez Zadok
2000-11-09