Abstract is missing.
- Modern Intrusion Detection, Data Mining, and Degrees of Attack GuiltSteven Noel, Duminda Wijesekera, Charles E. Youman. 1-31 [doi]
- Data Mining for Intrusion DetectionKlaus Julisch. 33-62 [doi]
- An Architecture for Anomaly DetectionDaniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu. 63-76 [doi]
- A Geometric Framework for Unsupervised Anomaly DetectionEleazar Eskin, Andrew Arnold, Michael J. Prerau, Leonid Portnoy, Salvatore J. Stolfo. 77-101 [doi]
- Fusing A Heterogeneous Alert Stream Into ScenariosOliver Dain, Robert K. Cunningham. 103-122 [doi]
- Using MIB II Variables for Network Intrusion DetectionXinzhou Qin, Wenke Lee, Lundy M. Lewis, João B. D. Cabrera. 123-151 [doi]
- Adaptive Model GenerationAndrew Honig, Andrew Howard, Eleazar Eskin, Salvatore J. Stolfo. 153-193 [doi]
- Proactive Intrusion DetectionJoão B. D. Cabrera, Lundy M. Lewis, Xinzhou Qin, Wenke Lee, Raman K. Mehra. 195-227 [doi]
- E-Mail Authorship Attribution for Computer ForensicsOlivier Y. de Vel, Alison Anderson, Malcolm Corney, George M. Mohay. 229-250 [doi]