Search dblp for Publications

export results for "toc:db/books/collections/BJ2002.bht:"

 download as .bib file

@incollection{DBLP:books/sp/02/BarbaraCJW02,
  author       = {Daniel Barbar{\'{a}} and
                  Julia Couto and
                  Sushil Jajodia and
                  Ningning Wu},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {An Architecture for Anomaly Detection},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_3},
  doi          = {10.1007/978-1-4615-0953-0\_3},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/BarbaraCJW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/CabreraLQLM02,
  author       = {Jo{\~{a}}o B. D. Cabrera and
                  Lundy M. Lewis and
                  Xinzhou Qin and
                  Wenke Lee and
                  Raman K. Mehra},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {Proactive Intrusion Detection},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {195--227},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_8},
  doi          = {10.1007/978-1-4615-0953-0\_8},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/CabreraLQLM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/DainC02,
  author       = {Oliver Dain and
                  Robert K. Cunningham},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {Fusing {A} Heterogeneous Alert Stream Into Scenarios},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {103--122},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_5},
  doi          = {10.1007/978-1-4615-0953-0\_5},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/DainC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/EskinAPPS02,
  author       = {Eleazar Eskin and
                  Andrew Arnold and
                  Michael J. Prerau and
                  Leonid Portnoy and
                  Salvatore J. Stolfo},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {A Geometric Framework for Unsupervised Anomaly Detection},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {77--101},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_4},
  doi          = {10.1007/978-1-4615-0953-0\_4},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/EskinAPPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/HonigHES02,
  author       = {Andrew Honig and
                  Andrew Howard and
                  Eleazar Eskin and
                  Salvatore J. Stolfo},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {Adaptive Model Generation},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {153--193},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_7},
  doi          = {10.1007/978-1-4615-0953-0\_7},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/HonigHES02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/Julisch02,
  author       = {Klaus Julisch},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {Data Mining for Intrusion Detection},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {33--62},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_2},
  doi          = {10.1007/978-1-4615-0953-0\_2},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/Julisch02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/NoelWY02,
  author       = {Steven Noel and
                  Duminda Wijesekera and
                  Charles E. Youman},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {1--31},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_1},
  doi          = {10.1007/978-1-4615-0953-0\_1},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/NoelWY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/QinLLC02,
  author       = {Xinzhou Qin and
                  Wenke Lee and
                  Lundy M. Lewis and
                  Jo{\~{a}}o B. D. Cabrera},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {Using {MIB} {II} Variables for Network Intrusion Detection},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {123--151},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_6},
  doi          = {10.1007/978-1-4615-0953-0\_6},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/QinLLC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/VelACM02,
  author       = {Olivier Y. de Vel and
                  Alison Anderson and
                  Malcolm Corney and
                  George M. Mohay},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {E-Mail Authorship Attribution for Computer Forensics},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {229--250},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_9},
  doi          = {10.1007/978-1-4615-0953-0\_9},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/VelACM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/02/BJ2002,
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0},
  doi          = {10.1007/978-1-4615-0953-0},
  isbn         = {9781461353218},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/BJ2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}