Asian Journal of Information Technology
70 - 76
Agrawal, R., T. Imielinski and A. Swami, 1993. Mining association rules between sets of items in large databases. Proceedings of the ACM SIGMOD International Conference on Management of Data, May 25-28, 1993, Washington, DC., USA., pp: 207-216.
Amor, N.B., S. Benferhat and Z. Elouedi, 2004. Naive bayes vs decision trees in intrusion detection systems. Proceedings of the ACM Symposium on Applied Computing, March 14-17, 2004, Nicosia, Cyprus, pp: 420-424.
Anderson, J.P., 2010. Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Washington.
Andrew, H.S. and M. Srinivas, 2003. Identifying important features for intrusion detection using support vector machines and neural networks. Proceedings of the 2003 Symposium on Applications and Internet, January 27-31, 2003, IEEE Xplore, London, pp: 209-216.
Cureton, E.E. and R.B. D'Agostino, 1983. Factor Analysis: An Applied Approach. Vol. 1, Routledge, London, ISBN: 9780805815467, Pages: 457.
Du, Y., H. Wang and Y. Pang, 2004. A hidden markov models-based anomaly intrusion detection method. Proceedings of the 5th World Congress on Intelligent Control and Automation, June 15-19, 2004, China, pp: 4348-4351.
Forrest, S., S.A. Hofmeyr, A. Somayaji and T.A. Longstaff, 1996. A sense of self for Unix processes. Proceedings of the IEEE Symposium on Securiry and Privacy, May 6-8, 1996, Oakland, CA. USA., pp: 120-128.
Hu, Y. and B. Panda, 2004. A data mining approach for database intrusion detection. Proceedings of the ACM Symposium on Applied Computing, March 14-17, 2004, Nicosia, Cyprus, pp: 711-716.
Jolliffe, I.T., 2002. Principal Component Analysis. 2nd Edn., Springer, New York.
Koller, D. and M. Sahami, 1996. Toward optimal feature selection. Proceedings of the International Conference on Machine Learning, July 3-6, 1996, Bari, Italy, pp: 284-292.
Kruegel, C., D. Mutz, W. Robertson and F. Valeur, 2003. Bayesian event classification for intrusion detection. Proceedings of the 19th Annual Computer Security Applications Conference, December 8-12, 2003, Barbara, CA., pp: 14-23.
Kuchimanchi, G.K., V.V. Phoha, K.S. Balagami and S.R. Gaddam, 2004. Dimension reduction using feature extraction methods for Real-time misuse detection systems. Proceedings from the 5th Annual Information Assurance Workshop, June 10-11, 2004, Ruston, LA., pp: 195-202.
Lee, S.Y., W.L. Low and P.Y. Wong, 2002. Learning fingerprints for a database intrusion detection system. Proceedings of the 7th European Symposium on Research in Computer Security Zurich, October 14-16, 2002, Switzerland, pp: 264-279.
Lee, W. and S. Stolfo, 1998. Data mining approaches for intrusion detection. Proceedings of the 7th USENIX Security Symposium, January 26-29, 1998, USENIX Association, Berkeley, CA., USA., pp: 79-94.
Lee, W., S. Stolfo and K. Mok, 1998. Mining audit data to build intrusion detection models. Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, August 27-31, 1998, New York, USA., pp: 66-72.
Mukkamala, S., G. Janoski and A. Sung, 2002. Intrusion detection using neural networks and support vector machines. Proceedings of IEEE International Joint Conference on Neural Network, May 12-17, Honolulu, HI, USA., pp: 1702-1707.
Oja, E., 1992. Principal components, minor components and linear neural networks. Neural Networks, 5: 927-935.CrossRef | Direct Link |
Portnoy, L., E. Eskin and S. Stolfo, 2001. Intrusion detection with unlabeled data using clustering. Proceedings of ACM CSS Workshop on Data Mining Applied to Security, November 5-8, 2001, Philadelphia, PA., pp: 5-8.
Shah, H., J. Undercoffer and A. Joshi, 2003. Fuzzy clustering for intrusion detection. Proceedings of the 12th IEEE International Conference on Fuzzy Systems, Volume 2, May 25-28, 2003, Baltimore, MD., pp: 1274-1278.
Shyu, M.L., S.C. Chen, K. Sarinnapakorn and L. Chang, 2003. A novel anomaly detection scheme based on principal component classifier. Proceedings of the 3rd IEEE International Conference on Data Mining, November 19-22, 2003, Melbourne, Florida, USA., pp: 172-179.
Valdes, A. and K. Skinner, 2000. Adaptive, model-based monitoring for cyber attack detection. Proceedings of the 3rd International Workshop on RAID 2000, October 2-4, 2000, Toulouse, France, pp: 80-92.
Wang, W., X.H. Guan and X.L. Zhang, 2004. Modeling program behaviors by hidden markov models for intrusion detection. Proceedings of the International Conference on Machine Learning and Cybernetics, Volume 5, August 26-29, 2004, China, pp: 2830-2835.
Warrender, C., S. Forrest and B.A. Pearlmutter, 1999. Detecting intrusions using system calls: Alternative data models. Proceedings of the Symposium on Security and Privacy, May 9-12, 1999, Oakland, CA., USA., pp: 133-145.
Zhong, Y., Z. Zhu and X.L. Qin, 2005. A clustering method based on data queries and its application in database intrusion detection. Proceedings of the 4th International Conference on Machine Learning and Cybernetics, Volume 4, August 18-21, 2005, Guangzhou, China, pp: 2096-2101.