Mining association rules between sets of items in large databases, Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, pp.207-216 ,
A Model-Based Frequency Constraint for Mining Associations from Transaction Data, Data Mining and Knowledge Discovery, vol.13, issue.2, pp.137-166, 2006. ,
DOI : 10.1007/s10618-005-0026-2
Extending the packet coded backdoor server to netcat relays on relatively high-bandwidth home networks, Tech. rep., SANS, 2001. ,
Use port knocking to bypass firewall rules and keep security intact http://www.techrepublic.com/article/ use-port-knocking-to-bypass-firewall-rules-and-keep-security-intact, p.5798871, 2005. ,
Fast portscan detection using sequential hypothesis testing, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, 2004. ,
DOI : 10.1109/SECPRI.2004.1301325
Finding Sporadic Rules Using Apriori-Inverse, Lecture Notes in Computer Science, vol.3518, pp.97-106, 2005. ,
DOI : 10.1007/11430919_13
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.269.6823
Rare Association Rule Mining and Knowledge Discovery: Technologies for Infrequent and Critical Event Detection. Information Science Reference -Imprint of, 2009. ,
DOI : 10.4018/978-1-60566-754-6
Mining association rules with multiple minimum supports, Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining , KDD '99, pp.337-341, 1999. ,
DOI : 10.1145/312129.312274
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.8948
Learning rules for anomaly detection of hostile network traffic, Third IEEE International Conference on Data Mining, pp.601-604, 2003. ,
DOI : 10.1109/ICDM.2003.1250987
Identification of correlated network intrusion alerts, 2011 Third International Workshop on Cyberspace Safety and Security (CSS), 2011. ,
DOI : 10.1109/CSS.2011.6058565
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.646.1574
Pa018 -term project -port knocking enhancements, 2011. ,
Fast Detection of Scanning Worm Infections, Proceedings of the 7 th International Symposium on Recent Advances in Intrusion Detection (RAID, pp.59-81, 2004. ,
DOI : 10.1007/978-3-540-30143-1_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.6643
Adaptive, Model-Based Monitoring for Cyber Attack Detection, Proceedings of the Third International Workshop on Recent Advances in Intrusion Detection, pp.80-9200, 2000. ,
DOI : 10.1007/3-540-39945-3_6
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.4.7086
Efficient mining of both positive and negative association rules, ACM Transactions on Information Systems, vol.22, issue.3, pp.381-405, 2004. ,
DOI : 10.1145/1010614.1010616
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.399.569