2008 |
6 | | Matthew Miller,
Alexander Stoytchev:
Hierarchical Voting Experts: An Unsupervised Algorithm for Segmenting Hierarchically Structured Sequences.
AAAI 2008: 1820-1821 |
2004 |
5 | EE | Wei Fan,
Matthew Miller,
Salvatore J. Stolfo,
Wenke Lee,
Philip K. Chan:
Using artificial anomalies to detect unknown and known network intrusions.
Knowl. Inf. Syst. 6(5): 507-527 (2004) |
2003 |
4 | EE | Seth Robertson,
Eric V. Siegel,
Matthew Miller,
Salvatore J. Stolfo:
Surveillance Detection in High Bandwidth Environments.
DISCEX (1) 2003: 130- |
2002 |
3 | | Wenke Lee,
Wei Fan,
Matthew Miller,
Salvatore J. Stolfo,
Erez Zadok:
Toward Cost-Sensitive Modeling for Intrusion Detection and Response.
Journal of Computer Security 10(1/2): 5-22 (2002) |
2001 |
2 | EE | Wei Fan,
Matthew Miller,
Salvatore J. Stolfo,
Wenke Lee,
Philip K. Chan:
Using Artificial Anomalies to Detect Unknown and Known Network Intrusions.
ICDM 2001: 123-130 |
2000 |
1 | EE | Wei Fan,
Wenke Lee,
Salvatore J. Stolfo,
Matthew Miller:
A Multiple Model Cost-Sensitive Approach for Intrusion Detection.
ECML 2000: 142-153 |