|
[1] R. Agrawal, T. Imielinski, and A. Swami. “Mining association rules between sets of items in large databases”, Proc. Of ACM SIGMOD, pages 207-217, May 1993. [2] N. F. Ayan, A. U. Tansel and E. Arkun. “An efficient algorithm to update large itemsets with early pruning”. Fifth ACM SIGKDD International Conference on Knowledge Discovery & Data, August 1999. [3] Tim Bass and Alfredo Freyre, “E-Mail bombs and countermeasures”, IEEE Network, March/April 1998. [4] Christian Borgelt , Association rule induction, “http://fuzzy.cs.uni-magdeburg.de/~borgelt/software.html#assoc”, 2002. [5] Q. Chen, U. Dayal, M.Hsu, "A distributed OLAP infrastructure for e-commerce”, Proceedings, Fourth IFCIS International Conference on Cooperative Information Systems, Sept. 1999. [6] Her-Tsaan Cheng, An Intelligent E-mail Management System, Master Thesis, National Chiao Tung University, 1999. [7] D. Cheung, S. Lee, B. Kao, “A general incremental technique for maintaining discovered association rules”, In Proceedings of the 5th International Conference on Database Systems for Advanced Applications (DASFAA), pp. 185-194, 1997. [8] Kenjiro Cho, R. Kaizaki, A. Kato “Aguri, An aggregation-based traffic profiler”, http://www.csl.sony.co.jp/person/kjc/software.html#aguri [9] Edward R. Fuller “Denial of service attack”, http://www.sans.org/infosecFAQ/securitybasics/dos.htm , 2002. [10] Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques, Morgan Kaufmann, 2001. [11] C.-H. Lee, C.-R. Lin and M.-S. Chen, “Sliding-Window Filtering: An efficient algorithm for incremental mining”, Proc. of the ACM 10th Intern''l Conf. on Information and Knowledge Management, November 5-10, 2001. [12] Gary C. Kessler, “Defenses against distributed denial of service attacks.” 29 Nov. 2000. URL: http://www.sans.org/infosecFAQ/threats/DDoS.htm , 2001. [13] T. Lunt, “A survey in intrusion detection techniques”, Computer and Security, Vol. 12, no.4, June 1993, pp.405-418. [14] Steve Maxwell, UNIX network management tools, McGraw-Hill, 1999. [15] Vikram Pudi, Jayany R. Haritsa, “Quantifying the utility of the past in mining large databases”, Information Systems, Vol. 25, pp. 323-343, 2000. [16] Mehhran Sahami, “A bayesian approach to filtering junk e-mail”, Proceedings of AAAI’98 Workshop on Learning for Text Categorization, 1998. [17] Ashoka Savasere, Edward Omiecinski, and Shamkant B. Navathe, “An efficient algorithm for mining association rules in large databases”, Proceedings of the 21nd International Conference on Very Large Databases, pp. 432-444, Zurich, Swizerland, 1995. [18] C. M. Su, S. S. Tseng, M. F. Jiang, and J. C. S. Chen, “A fast clustering process for outliers and remainder clusters,” Lecture Notes in Artificial Intelligence, Vol. 1574, pp. 360-364, 1999. [19] E-Mail Spamming countermeasures, http://ciac.llnl.gov/ciac/bulletins/i-005c.shtml, CIAC INFORMATION BULLETIN, 1997. [20] MRTG: The Multi Router Traffic Grapher, http://people.ee.ethz.ch/~oetiker/webtools/mrtg/. [21] MAILMGR: Sendmail log analyser, http://web.onda.com.br/orso/index.html.
|