Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Using Text Categorization Techniques Previous: Acknowledgment

Bibliography

1
H.S. Javitz and A. Valdes, The NIDES Statistical Component: Description and Justification, Technical Report, Computer Science Laboratory, SRI International, Menlo Park, CA, March 1994.

2
H.S. Vaccaro and G.E. Liepins, ``Detection of Anomalous Computer Session Activity'', Proceedings of 1989 IEEE Symposium on Security and Privacy, 280-289, 1989.

3
E. Lundin and E. Johnsson, ``Anomaly-based intrusion detection: privacy concern and other problems'', Computer Networks, vol. 34, 623-640, 2000.

4
V. Dao and V. R. Vemuri, ``Computer Network Intrusion Detection: A Comparison of Neural Networks Methods'', Differential Equations and Dynamical Systems, (Special Issue on Neural Networks, Part-2), vol.10, No. 1&2, 2002.

5
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Logstaff, ``A Sense of Self for Unix process'', Proceedings of 1996 IEEE Symposium on Computer Security and Privacy, 120-128, 1996.

6
C. Warrender, S. Forrest and B. Pearlmutter, ``Detecting Intrusions Using System Calls: Alternative Data Models'', Proceedings of 1999 IEEE Symposium on Security and Privacy, 133-145, 1999.

7
W. Lee, S. J. Stolfo and P. K. Chan, ``Learning Patterns from Unix Process Execution Traces for Intrusion Detection'', Proceedings of AAAI97 Workshop on AI Methods in Fraud and Risk Management, 50-56, 1997.

8
A. K. Ghosh, A. Schwartzbard and A. M. Shatz, ``Learning Program Behavior Profiles for Intrusion Detection'', Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, CA, April 1999.

9
K. Aas and L. Eikvil, Text Categorisation: A Survey, https://citeseer.nj.nec.com/
aas99text.html
, 1999.

10
Y. Yang, An Evaluation of Statistical Approaches to Text Categorization, Technical Report CMU-CS-97-127, Computer Science Department, Carnegie Mellon University, 1997.

11
Y. Yang, ``Expert Network: Effective and Efficient Learning from Human Decisions in Text Categorization and Retrieval'', Proceedings of 17th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'94), 13-22, 1994.

12
C. Ko, G. Fink and K. Levitt, ``Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring'', Proceedings of 10th Annual Computer Security Applications Conference, Orlando, FL, Dec, 134-144, 1994.

13
P. Uppuluri and R. Sekar, ``Experiences with Specification-Based Intrusion Detection'', Recent Advances in Intrusion Detection (RAID 2001), LNCS 2212, Springer, 172-189, 2001.

14
D. Wagner and D. Dean, ``Intrusion Detection via Static Analysis'', Proceedings of IEEE Symposium on Research in Security and Privacy, Oakland, CA, 2001.

15
M. Asaka, T. Onabuta, T. Inoue, S. Okazawa and S. Goto, ``A New Intrusion Detection Method Based on Discriminant Analysis'', IEEE TRANS. INF. & SYST., Vol. E84-D, No. 5, 570-577, 2001.

16
N. Ye, X. Li, Q. Chen S. M. Emran and M. Xu, ``Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data'', IEEE Trans. SMC-A, Vol. 31, No. 4, 266-274, 2001.

17
J. T.-Y. Kwok, ``Automatic Text Categorization Using Support Vector Machine'', Proceedings of International Conference on Neural Information Processing, 347-351, 1998.

18
MIT Lincoln Laboratory, https://www.ll.mit.edu/IST/ideval/.

19
Sun Microsystems, SunShield Basic Security Module Guide, 1995.

20
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Webber, S. Webster, D. Wyschograd, R. Cunninghan and M. Zissan, ``Evaluating Intrusion Detection Systems: the 1998 DARPA off-line Intrusion Detection Evaluation'', Proceedings of the DARPA Information Survivability Conference and Exposition, IEEE Computer Society Press, Los Alamitos, CA, 12-26, 2000.

21
K. Kendall, ``A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems'', Master's Thesis, Massachusetts Institute of Technology, 1998.



Yihua Liao 2002-05-13