<--- Back to Details
First PageDocument Content
Computer network security / Data analysis / Anomaly detection / Intrusion detection system / Local outlier factor / Network performance / Misuse detection / Robust random early detection / Outlier / Statistics / Data security / Data mining
Date: 2002-10-29 14:04:58
Computer network security
Data analysis
Anomaly detection
Intrusion detection system
Local outlier factor
Network performance
Misuse detection
Robust random early detection
Outlier
Statistics
Data security
Data mining

Add to Reading List

Source URL: www.csee.umbc.edu

Download Document from Source Website

File Size: 590,82 KB

Share Document on Facebook

Similar Documents

Radioactivity / Statistical inference / Analytical chemistry / Detection limit / Hypothesis testing / Ionizing radiation / Statistical hypothesis testing / Background radiation / Radiation / Statistics / Science / Measurement

Making Counting Decisions Use/Misuse of Sample Statistics John Doroski Pat Donahue Indian Pont, Entergy

DocID: 16g1M - View Document

Computer security / Data mining / Statistics / Spamming / Anomaly detection / Intrusion detection system / Network intrusion detection system / Misuse detection / Snort / Computer network security / Data security / Computing

Outside the Closed World: On Using Machine Learning For Network Intrusion Detection Robin Sommer International Computer Science Institute, and Lawrence Berkeley National Laboratory

DocID: 13mGm - View Document

Computer vision / Anomaly detection / Intrusion detection system / Misuse detection / Synthetic data / Feature / Receiver operating characteristic / Statistics / Data security / Data mining

Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation Dae-Ki Kang1 , Doug Fuller2 , and Vasant Honavar1 1 Artificial Intelligence Lab, Department of Computer Science, Iowa State Universi

DocID: 11XIH - View Document

Data mining / Anomaly detection / Misuse detection / Intrusion detection system / Synthetic data / Host-based intrusion detection system / Feature / Information / Data security / Statistics / Information technology management

Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation

DocID: 11S4q - View Document

Cyberwarfare / Computing / Anomaly detection / Data mining / Intrusion detection system / Misuse detection / Anomaly-based intrusion detection system / Bro / Intrusion detection system evasion techniques / Computer network security / Computer security / Data security

Politecnico di Milano Dip. Elettronica e Informazione Milano, Italy Anomaly detection through system call argument analysis

DocID: ZIbl - View Document