1. Modeling System Calls for Intrusion Detection with Dynamic Window Sizes Eskin, Eleazar; Lee, Wenke; Stolfo, Salvatore 2001 Articles Computer science
2. Real Time Data Mining-based Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Chan, Philip K.; Eskin, Eleazar; Fan, Wei; Miller, Matthew; Hershkop, Shlomo; Zhang, Junxin 2001 Articles Computer science
3. A Multiple Model Cost-Sensitive Approach for Intrusion Detection Fan, Wei; Lee, Wenke; Stolfo, Salvatore; Miller, Matthew 2000 Articles Computer science
4. Cost-based Modeling for Fraud and Intrusion Detection: Results from the JAM Project Stolfo, Salvatore; Fan, Wei; Lee, Wenke; Prodromidis, Andreas L.; Chan, Philip K. 2000 Articles Computer science
5. Toward Cost-Sensitive Modeling for Intrusion Detection Lee, Wenke; Miller, Matthew; Stolfo, Salvatore; Jallad, Kahil; Park, Christopher T.; Zadok, Erez; Prabhakar, Vijay 2000 Reports Computer science
6. Toward Cost-Sensitive Modeling for Intrusion Detection and Response Lee, Wenke; Fan, Wei; Miller, Matthew; Stolfo, Salvatore; Zadok, Erez 2000 Articles Computer science
7. A Data Mining Framework for Building Intrusion Detection Models Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
8. Automated Intrusion Detection Methods Using NFR Lee, Wenke; Park, Christopher T.; Stolfo, Salvatore 1999 Articles Computer science
9. Mining in a Data-flow Environment: Experience in Network Intrusion Detection Lee, Wenke; Stolfo, Salvatore; Mok, Kui W. 1999 Articles Computer science
10. Data Mining Approaches for Intrusion Detection Lee, Wenke; Stolfo, Salvatore 1998 Articles Computer science