Author:
Davis Jonathan J.,Clark Andrew J.
Subject
Law,General Computer Science
Reference74 articles.
1. The base-rate fallacy and the difficulty of intrusion detection;Axelsson;ACM Transactions on Information and System Security (TISSEC),2000
2. Intrusion detection systems. Technical report 800–31;Bace,2001
3. Barbara D, Wu N, Jajodia S. Detecting novel network intrusions using Bayes estimators. 2001. First SIAM Conference on Data Mining.
4. Data mining applied to intrusion detection: mitre experiences;Bloedorn;Machine Learning and Data Mining for Computer Security,2006
5. Bolzoni D, Etalle S, Hartel P. Poseidon: a 2-tier anomaly-based network intrusion detection system. In: Information Assurance. IWIA 2006. Fourth IEEE International Workshop on 2006. p. 10.
Cited by
166 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献