Toward cost-sensitive modeling for intrusion detection and responseWenke LeeWei Fanet al.2002Journal of Computer SecurityPaper
Using artificial anomalies to detect unknown and known network intrusionsWei FanMatthew Milleret al.2001ICDM 2001Conference paper
Real time data mining-based intrusion detectionWenke LeeS.J. Stolfoet al.2001DISCEX 2001Conference paper