Next: About this document ...
Up: Using Text Categorization Techniques
Previous: Acknowledgment
-
- 1
-
H.S. Javitz and A. Valdes, The NIDES Statistical Component:
Description and Justification, Technical
Report, Computer Science Laboratory, SRI International, Menlo Park, CA, March 1994.
- 2
-
H.S. Vaccaro and G.E. Liepins, ``Detection of Anomalous Computer Session Activity'',
Proceedings of 1989 IEEE Symposium on Security and Privacy, 280-289, 1989.
- 3
-
E. Lundin and E. Johnsson, ``Anomaly-based intrusion detection: privacy concern and other
problems'', Computer Networks, vol. 34, 623-640, 2000.
- 4
-
V. Dao and V. R. Vemuri, ``Computer Network Intrusion Detection: A
Comparison of Neural Networks Methods'', Differential Equations and
Dynamical Systems, (Special Issue on Neural Networks, Part-2), vol.10, No.
1&2, 2002.
- 5
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Logstaff, ``A Sense of Self for Unix
process'', Proceedings of 1996 IEEE Symposium on Computer Security and Privacy,
120-128, 1996.
- 6
-
C. Warrender, S. Forrest and B. Pearlmutter, ``Detecting Intrusions Using System Calls:
Alternative Data Models'', Proceedings of 1999 IEEE Symposium on Security and
Privacy, 133-145, 1999.
- 7
-
W. Lee, S. J. Stolfo and P. K. Chan, ``Learning Patterns from Unix Process Execution
Traces for Intrusion Detection'', Proceedings of AAAI97 Workshop on AI Methods in
Fraud and Risk Management, 50-56, 1997.
- 8
-
A. K. Ghosh, A. Schwartzbard and A. M. Shatz, ``Learning Program Behavior Profiles for
Intrusion Detection'', Proceedings of 1st USENIX Workshop on Intrusion Detection
and Network Monitoring, Santa Clara, CA, April 1999.
- 9
-
K. Aas and L. Eikvil, Text Categorisation: A Survey,
https://citeseer.nj.nec.com/
aas99text.html, 1999.
- 10
-
Y. Yang, An Evaluation of Statistical Approaches to Text Categorization, Technical Report
CMU-CS-97-127, Computer Science Department, Carnegie Mellon University, 1997.
- 11
-
Y. Yang, ``Expert Network: Effective and Efficient Learning from Human Decisions in Text
Categorization and Retrieval'', Proceedings of 17th Annual International ACM SIGIR Conference
on Research and Development in Information Retrieval (SIGIR'94), 13-22, 1994.
- 12
-
C. Ko, G. Fink and K. Levitt, ``Automated Detection of Vulnerabilities in
Privileged Programs by Execution Monitoring'', Proceedings of 10th Annual Computer Security
Applications Conference, Orlando, FL, Dec, 134-144, 1994.
- 13
-
P. Uppuluri and R. Sekar, ``Experiences with Specification-Based Intrusion Detection'',
Recent Advances in Intrusion Detection (RAID 2001), LNCS 2212, Springer, 172-189, 2001.
- 14
-
D. Wagner and D. Dean, ``Intrusion Detection via Static Analysis'', Proceedings of IEEE
Symposium on Research in Security and Privacy, Oakland, CA, 2001.
- 15
-
M. Asaka, T. Onabuta, T. Inoue, S. Okazawa and S. Goto, ``A New Intrusion Detection Method
Based on Discriminant Analysis'', IEEE TRANS. INF. & SYST., Vol. E84-D, No. 5, 570-577, 2001.
- 16
-
N. Ye, X. Li, Q. Chen S. M. Emran and M. Xu, ``Probabilistic Techniques for Intrusion Detection Based
on Computer Audit Data'', IEEE Trans. SMC-A, Vol. 31, No. 4, 266-274, 2001.
- 17
-
J. T.-Y. Kwok, ``Automatic Text Categorization Using Support Vector Machine'', Proceedings
of International Conference on Neural Information Processing, 347-351, 1998.
- 18
-
MIT Lincoln Laboratory, https://www.ll.mit.edu/IST/ideval/.
- 19
-
Sun Microsystems, SunShield Basic Security Module Guide, 1995.
- 20
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Webber, S. Webster, D. Wyschograd,
R. Cunninghan and M. Zissan, ``Evaluating Intrusion Detection Systems: the 1998 DARPA off-line Intrusion
Detection Evaluation'', Proceedings of the DARPA Information Survivability Conference and Exposition,
IEEE Computer Society Press, Los Alamitos, CA, 12-26, 2000.
- 21
-
K. Kendall, ``A Database of Computer Attacks for the Evaluation of Intrusion
Detection Systems'', Master's Thesis, Massachusetts Institute of
Technology, 1998.
Yihua Liao
2002-05-13