Detecting Computer Intrusions with Bayesian Networks. Tylman, W. In Corchado, E. & Yin, H., editors, Intelligent Data Engineering and Automated Learning - IDEAL 2009 SE - 11, volume 5788, of Lecture Notes in Computer Science, pages 82--91. Springer Berlin Heidelberg, 2009.
Paper doi bibtex @incollection{Tylman2009,
author = {Tylman, Wojciech},
booktitle = {Intelligent Data Engineering and Automated Learning - IDEAL 2009 SE - 11},
doi = {10.1007/978-3-642-04394-9\_11},
editor = {Corchado, Emilio and Yin, Hujun},
isbn = {978-3-642-04393-2},
keywords = {Bayesian Network-based Security Analysis},
pages = {82--91},
publisher = {Springer Berlin Heidelberg},
series = {Lecture Notes in Computer Science},
title = {{Detecting Computer Intrusions with Bayesian Networks}},
url = {http://dx.doi.org/10.1007/978-3-642-04394-9\_11},
volume = {5788},
year = {2009}
}
Downloads: 0
{"_id":{"_str":"535ed25b97e559e821000513"},"__v":1,"authorIDs":[],"author_short":["Tylman, W."],"bibbaseid":"tylman-detectingcomputerintrusionswithbayesiannetworks-2009","bibdata":{"bibtype":"incollection","type":"incollection","author":[{"propositions":[],"lastnames":["Tylman"],"firstnames":["Wojciech"],"suffixes":[]}],"booktitle":"Intelligent Data Engineering and Automated Learning - IDEAL 2009 SE - 11","doi":"10.1007/978-3-642-04394-9_11","editor":[{"propositions":[],"lastnames":["Corchado"],"firstnames":["Emilio"],"suffixes":[]},{"propositions":[],"lastnames":["Yin"],"firstnames":["Hujun"],"suffixes":[]}],"isbn":"978-3-642-04393-2","keywords":"Bayesian Network-based Security Analysis","pages":"82--91","publisher":"Springer Berlin Heidelberg","series":"Lecture Notes in Computer Science","title":"Detecting Computer Intrusions with Bayesian Networks","url":"http://dx.doi.org/10.1007/978-3-642-04394-9_11","volume":"5788","year":"2009","bibtex":"@incollection{Tylman2009,\nauthor = {Tylman, Wojciech},\nbooktitle = {Intelligent Data Engineering and Automated Learning - IDEAL 2009 SE - 11},\ndoi = {10.1007/978-3-642-04394-9\\_11},\neditor = {Corchado, Emilio and Yin, Hujun},\nisbn = {978-3-642-04393-2},\nkeywords = {Bayesian Network-based Security Analysis},\npages = {82--91},\npublisher = {Springer Berlin Heidelberg},\nseries = {Lecture Notes in Computer Science},\ntitle = {{Detecting Computer Intrusions with Bayesian Networks}},\nurl = {http://dx.doi.org/10.1007/978-3-642-04394-9\\_11},\nvolume = {5788},\nyear = {2009}\n}\n","author_short":["Tylman, W."],"editor_short":["Corchado, E.","Yin, H."],"key":"Tylman2009","id":"Tylman2009","bibbaseid":"tylman-detectingcomputerintrusionswithbayesiannetworks-2009","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/978-3-642-04394-9_11"},"keyword":["Bayesian Network-based Security Analysis"],"downloads":0},"bibtype":"incollection","biburl":"https://dl.dropboxusercontent.com/u/14215034/bibs/bibs/A-List-bb.bib","downloads":0,"keywords":["bayesian network-based security analysis"],"search_terms":["detecting","computer","intrusions","bayesian","networks","tylman"],"title":"Detecting Computer Intrusions with Bayesian Networks","year":2009,"dataSources":["jGrSs2aYARmRcupKy"]}