default search action
Search dblp for Publications
export results for "toc:db/books/collections/BJ2002.bht:"
@incollection{DBLP:books/sp/02/BarbaraCJW02, author = {Daniel Barbar{\'{a}} and Julia Couto and Sushil Jajodia and Ningning Wu}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {An Architecture for Anomaly Detection}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {63--76}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_3}, doi = {10.1007/978-1-4615-0953-0\_3}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/BarbaraCJW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/CabreraLQLM02, author = {Jo{\~{a}}o B. D. Cabrera and Lundy M. Lewis and Xinzhou Qin and Wenke Lee and Raman K. Mehra}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {Proactive Intrusion Detection}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {195--227}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_8}, doi = {10.1007/978-1-4615-0953-0\_8}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/CabreraLQLM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/DainC02, author = {Oliver Dain and Robert K. Cunningham}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {Fusing {A} Heterogeneous Alert Stream Into Scenarios}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {103--122}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_5}, doi = {10.1007/978-1-4615-0953-0\_5}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/DainC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/EskinAPPS02, author = {Eleazar Eskin and Andrew Arnold and Michael J. Prerau and Leonid Portnoy and Salvatore J. Stolfo}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {A Geometric Framework for Unsupervised Anomaly Detection}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {77--101}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_4}, doi = {10.1007/978-1-4615-0953-0\_4}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/EskinAPPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/HonigHES02, author = {Andrew Honig and Andrew Howard and Eleazar Eskin and Salvatore J. Stolfo}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {Adaptive Model Generation}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {153--193}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_7}, doi = {10.1007/978-1-4615-0953-0\_7}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/HonigHES02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/Julisch02, author = {Klaus Julisch}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {Data Mining for Intrusion Detection}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {33--62}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_2}, doi = {10.1007/978-1-4615-0953-0\_2}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/Julisch02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/NoelWY02, author = {Steven Noel and Duminda Wijesekera and Charles E. Youman}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {1--31}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_1}, doi = {10.1007/978-1-4615-0953-0\_1}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/NoelWY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/QinLLC02, author = {Xinzhou Qin and Wenke Lee and Lundy M. Lewis and Jo{\~{a}}o B. D. Cabrera}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {Using {MIB} {II} Variables for Network Intrusion Detection}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {123--151}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_6}, doi = {10.1007/978-1-4615-0953-0\_6}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/QinLLC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/VelACM02, author = {Olivier Y. de Vel and Alison Anderson and Malcolm Corney and George M. Mohay}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {E-Mail Authorship Attribution for Computer Forensics}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {229--250}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_9}, doi = {10.1007/978-1-4615-0953-0\_9}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/VelACM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/02/BJ2002, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0}, doi = {10.1007/978-1-4615-0953-0}, isbn = {9781461353218}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/BJ2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.