標(biāo)題: Titlebook: Applications of Data Mining in Computer Security; Daniel Barbará,Sushil Jajodia Book 2002 Springer Science+Business Media New York 2002 In [打印本頁] 作者: CURD 時間: 2025-3-21 17:47
書目名稱Applications of Data Mining in Computer Security影響因子(影響力)
書目名稱Applications of Data Mining in Computer Security影響因子(影響力)學(xué)科排名
書目名稱Applications of Data Mining in Computer Security網(wǎng)絡(luò)公開度
書目名稱Applications of Data Mining in Computer Security網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Applications of Data Mining in Computer Security被引頻次
書目名稱Applications of Data Mining in Computer Security被引頻次學(xué)科排名
書目名稱Applications of Data Mining in Computer Security年度引用
書目名稱Applications of Data Mining in Computer Security年度引用學(xué)科排名
書目名稱Applications of Data Mining in Computer Security讀者反饋
書目名稱Applications of Data Mining in Computer Security讀者反饋學(xué)科排名
作者: 假裝是你 時間: 2025-3-21 23:37 作者: BUST 時間: 2025-3-22 03:32
1568-2633 tivity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence..978-1-4613-5321-8978-1-4615-0953-0Series ISSN 1568-2633 Series E-ISSN 2512-2193 作者: Middle-Ear 時間: 2025-3-22 06:45
Mike Robinson,Helaine Silvermanersus data volume. We introduce a novel way of characterizing intrusion detection activities: degree of attack guilt. It is useful for qualifying the degree of confidence associated with detection events, providing a framework in which we analyze detection quality versus cost.作者: 逗留 時間: 2025-3-22 12:16 作者: WAX 時間: 2025-3-22 13:30
https://doi.org/10.1007/978-3-319-57669-5ive probability estimation techniques are compared to an algorithm that builds scenarios using a set of rules. Both probability estimate approaches make use of training data to learn the appropriate probability measures. Our algorithm can determine the scenario membership of a new alert in time proportional to the number of candidate scenarios.作者: 龍卷風(fēng) 時間: 2025-3-22 18:43 作者: 交響樂 時間: 2025-3-23 00:07 作者: gastritis 時間: 2025-3-23 04:40
Using MIB II Variables for Network Intrusion Detection,tion provided by the MIB II variables and use data mining techniques and information-theoretic measures to build an intrusion detection model. We test our MIB II-based intrusion detection model with several Denial of Service (DoS) and probing attacks. The results have shown that the model can detect these attacks effectively.作者: 增減字母法 時間: 2025-3-23 08:52
1568-2633 aign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. .Applications Of Data Mining In Computer Security. presents a co作者: 紡織品 時間: 2025-3-23 12:02
https://doi.org/10.1007/978-3-319-13183-2tion. This chapter surveys a representative cross section of these research efforts. Moreover, four characteristics of contemporary research are identified and discussed in a critical manner. Conclusions are drawn and directions for future research are suggested.作者: 遷移 時間: 2025-3-23 17:43 作者: arterioles 時間: 2025-3-23 20:52
Data Mining for Intrusion Detection,tion. This chapter surveys a representative cross section of these research efforts. Moreover, four characteristics of contemporary research are identified and discussed in a critical manner. Conclusions are drawn and directions for future research are suggested.作者: micronutrients 時間: 2025-3-24 01:51 作者: abreast 時間: 2025-3-24 05:21 作者: 干涉 時間: 2025-3-24 08:15
https://doi.org/10.1007/978-3-031-27990-4s. We present three algorithms for detecting which points lie in sparse regions of the feature space. We evaluate our methods by performing experiments over network records from the KDD CUP 1999 data set and system call traces from the 1999 Lincoln Labs DARPA evaluation.作者: 公理 時間: 2025-3-24 11:37
Why Don’t Scientists Respect Philosophers?em with general classes of components that can be easily changed within the framework of the system. We also present specific examples of system components including auditing sub-systems, model generators for misuse detection and anomaly detection, and support for visualization and correlation of multiple audit sources.作者: integrated 時間: 2025-3-24 17:52
A Geometric Framework for Unsupervised Anomaly Detection,s. We present three algorithms for detecting which points lie in sparse regions of the feature space. We evaluate our methods by performing experiments over network records from the KDD CUP 1999 data set and system call traces from the 1999 Lincoln Labs DARPA evaluation.作者: HAIRY 時間: 2025-3-24 20:48
Adaptive Model Generation,em with general classes of components that can be easily changed within the framework of the system. We also present specific examples of system components including auditing sub-systems, model generators for misuse detection and anomaly detection, and support for visualization and correlation of multiple audit sources.作者: buoyant 時間: 2025-3-25 02:16 作者: neutrophils 時間: 2025-3-25 05:50
Summary and Policy Implication,s have the proclivity of generating lots of false alarms. In this chapter we present an efficient architecture that can effectively be used to design anomaly detection systems and keep false alarms at a manageable level. We also present an implementation of this architecture that we have realized and experimented with.作者: Verify 時間: 2025-3-25 07:49
Comprehensively Critical Metapoliticstion provided by the MIB II variables and use data mining techniques and information-theoretic measures to build an intrusion detection model. We test our MIB II-based intrusion detection model with several Denial of Service (DoS) and probing attacks. The results have shown that the model can detect these attacks effectively.作者: separate 時間: 2025-3-25 15:43 作者: 裝飾 時間: 2025-3-25 18:49 作者: 錯誤 時間: 2025-3-25 21:06 作者: 才能 時間: 2025-3-26 01:35 作者: FAZE 時間: 2025-3-26 06:53 作者: Water-Brash 時間: 2025-3-26 11:22
Comprehensively Critical Metapoliticsmendous growth in network-based services. Intrusion detection is an important security technique for networks and systems. In this paper, we propose a methodology for utilizing MIB II objects for network intrusion detection. We establish the normal profiles of network activities based on the informa作者: TOXIC 時間: 2025-3-26 15:57 作者: MUT 時間: 2025-3-26 19:29
Comprehensively Critical Metapoliticsd information systems. These precursors can be used by security analysts to better understand the evolution of complex computer attacks, and also to trigger alarms indicating that an attack is imminent. We call Proactive Intrusion Detection the utilization of these temporal rules as part of an overa作者: 記憶 時間: 2025-3-27 00:15
https://doi.org/10.1007/978-3-662-66015-7ion or identification undertaken on a corpus of multi-author and multi-topic e-mail documents. We use an extended set of e-mail document features such as structural characteristics and linguistic patterns together with a Support Vector Machine as the learning algorithm. Experiments on a number of e-作者: 使乳化 時間: 2025-3-27 04:03
https://doi.org/10.1007/978-1-4615-0953-0Information; Variable; architecture; data mining; genome; knowledge; security作者: champaign 時間: 2025-3-27 09:13 作者: custody 時間: 2025-3-27 12:54
Advances in Information Securityhttp://image.papertrans.cn/a/image/159359.jpg作者: Anthrp 時間: 2025-3-27 14:58
Applications of Data Mining in Computer Security978-1-4615-0953-0Series ISSN 1568-2633 Series E-ISSN 2512-2193 作者: eustachian-tube 時間: 2025-3-27 18:32
Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt,llels two important aspects of intrusion detection: general detection strategy (misuse detection versus anomaly detection) and data source (individual hosts versus network traffic). Misuse detection attempts to match known patterns of intrusion, while anomaly detection searches for deviations from n作者: Incorporate 時間: 2025-3-27 21:56
Data Mining for Intrusion Detection,nd network management. Over the past five years, a growing number of research projects have applied data mining to various problems in intrusion detection. This chapter surveys a representative cross section of these research efforts. Moreover, four characteristics of contemporary research are ident作者: Living-Will 時間: 2025-3-28 05:02
An Architecture for Anomaly Detection,profile that contains a representation of the “normal” or expected traffic. The system flags anything that exceeds the normal activity (usually by means of thresholds) as an attack. Unfortunately, not everything that surpasses the expected activity is indeed an attack. Thus, anomaly detection system作者: 柱廊 時間: 2025-3-28 07:12 作者: 膽小懦夫 時間: 2025-3-28 11:23 作者: Eosinophils 時間: 2025-3-28 15:41
Using MIB II Variables for Network Intrusion Detection,mendous growth in network-based services. Intrusion detection is an important security technique for networks and systems. In this paper, we propose a methodology for utilizing MIB II objects for network intrusion detection. We establish the normal profiles of network activities based on the informa