The base-rate fallacy and its implications for the difficulty of intrusion detection, Proceedings of the 6th ACM conference on Computer and communications security , CCS '99, pp.1-7, 1999. ,
DOI : 10.1145/319709.319710
Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.12-26, 2000. ,
DOI : 10.1109/DISCEX.2000.821506
Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation, Proceedings of International Symposium on Recent Advances in Intrusion Detection, pp.162-182, 1907. ,
DOI : 10.1007/3-540-39945-3_11
Cost-based modeling for fraud and intrusion detection: results from the JAM project, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00, pp.130-144, 2000. ,
DOI : 10.1109/DISCEX.2000.821515
Evaluation of intrusion detectors: a decision theory approach, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001, pp.50-61, 2001. ,
DOI : 10.1109/SECPRI.2001.924287
Measuring intrusion detection capability, Proceedings of the 2006 ACM Symposium on Information, computer and communications security , ASIACCS '06, 2006. ,
DOI : 10.1145/1128817.1128834
A framework for the evaluation of intrusion detection systems, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.63-77, 2006. ,
DOI : 10.1109/SP.2006.2
An IDS Evaluation-Centric Taxonomy of Wireless Security Attacks, International Conference on Network Security & Applications (CNSA'11, pp.402-413, 2011. ,
DOI : 10.1016/S0167-4048(97)85785-9