Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric. Rawat, S., Gulati, V. P., Pujari, A. K., & Vemuri, V. R. JIAS, September, 2006. Paper bibtex @article{rawat_intrusion_2006,
title = {Intrusion {Detection} {Using} {Text} {Processing} {Techniques} with a {Binary}-{Weighted} {Cosine} {Metric}},
volume = {1},
url = {http://web.cs.ucdavis.edu/~vemuri/papers/cosinemetricpaper.pdf},
number = {1},
journal = {JIAS},
author = {Rawat, Sanjay and Gulati, Ved P. and Pujari, Arun K. and Vemuri, V. Rao},
month = sep,
year = {2006},
keywords = {data mining, intrusion detection, system call tracing, type\_backup, type\_journal},
}
Downloads: 0
{"_id":"9YAiyu7WxdnMDRPSZ","bibbaseid":"rawat-gulati-pujari-vemuri-intrusiondetectionusingtextprocessingtechniqueswithabinaryweightedcosinemetric-2006","author_short":["Rawat, S.","Gulati, V. P.","Pujari, A. K.","Vemuri, V. R."],"bibdata":{"bibtype":"article","type":"article","title":"Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric","volume":"1","url":"http://web.cs.ucdavis.edu/~vemuri/papers/cosinemetricpaper.pdf","number":"1","journal":"JIAS","author":[{"propositions":[],"lastnames":["Rawat"],"firstnames":["Sanjay"],"suffixes":[]},{"propositions":[],"lastnames":["Gulati"],"firstnames":["Ved","P."],"suffixes":[]},{"propositions":[],"lastnames":["Pujari"],"firstnames":["Arun","K."],"suffixes":[]},{"propositions":[],"lastnames":["Vemuri"],"firstnames":["V.","Rao"],"suffixes":[]}],"month":"September","year":"2006","keywords":"data mining, intrusion detection, system call tracing, type_backup, type_journal","bibtex":"@article{rawat_intrusion_2006,\n\ttitle = {Intrusion {Detection} {Using} {Text} {Processing} {Techniques} with a {Binary}-{Weighted} {Cosine} {Metric}},\n\tvolume = {1},\n\turl = {http://web.cs.ucdavis.edu/~vemuri/papers/cosinemetricpaper.pdf},\n\tnumber = {1},\n\tjournal = {JIAS},\n\tauthor = {Rawat, Sanjay and Gulati, Ved P. and Pujari, Arun K. and Vemuri, V. Rao},\n\tmonth = sep,\n\tyear = {2006},\n\tkeywords = {data mining, intrusion detection, system call tracing, type\\_backup, type\\_journal},\n}\n\n","author_short":["Rawat, S.","Gulati, V. P.","Pujari, A. K.","Vemuri, V. R."],"key":"rawat_intrusion_2006","id":"rawat_intrusion_2006","bibbaseid":"rawat-gulati-pujari-vemuri-intrusiondetectionusingtextprocessingtechniqueswithabinaryweightedcosinemetric-2006","role":"author","urls":{"Paper":"http://web.cs.ucdavis.edu/~vemuri/papers/cosinemetricpaper.pdf"},"keyword":["data mining","intrusion detection","system call tracing","type_backup","type_journal"],"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"https://download.vusec.net/papers/zotero.php?tag=&full=1&format=bibtex&sort=date","dataSources":["iCWck2No2wmaEqiac","YcxhhRHvY4HWj3ESG","LY5xkJFgS2sBQ9umB","cEmMXPermWEFsgmMR"],"keywords":["data mining","intrusion detection","system call tracing","type_backup","type_journal"],"search_terms":["intrusion","detection","using","text","processing","techniques","binary","weighted","cosine","metric","rawat","gulati","pujari","vemuri"],"title":"Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric","year":2006}