A comparative study of anomaly detection schemes in network intrusion detection A Lazarevic, L Ertoz, V Kumar, A Ozgur, J Srivastava Proceedings of the 2003 SIAM International Conference on Data Mining, 25-36, 2003 | 1272 | 2003 |
Finding clusters of different sizes, shapes, and density in noisy, high dimensional data,” in L Ertöz, M Steinbach Proc. of SIAM International Conference on Data Mining, 2003 | 1023 | 2003 |
Finding clusters of different sizes, shapes, and densities in noisy, high dimensional data L Ertöz, M Steinbach, V Kumar Proceedings of the 2003 SIAM International Conference on Data Mining, 47-58, 2003 | 1020 | 2003 |
Finding Clusters of Different Sizes, Shapes, and Densities in Noisy, High Dimensional Data. L Ertöz, M Steinbach, V Kumar SDM, 47-58, 2003 | 1020 | 2003 |
The challenges of clustering high dimensional data M Steinbach, L Ertöz, V Kumar New directions in statistical physics, 273-309, 2004 | 758 | 2004 |
Data mining for network intrusion detection P Dokas, L Ertoz, V Kumar, A Lazarevic, J Srivastava, PN Tan Proc. NSF Workshop on Next Generation Data Mining, 21-30, 2002 | 443 | 2002 |
Minds-minnesota intrusion detection system L Ertoz, E Eilertson, A Lazarevic, PN Tan, V Kumar, J Srivastava, P Dokas Next generation data mining, 199-218, 2004 | 338 | 2004 |
A new shared nearest neighbor clustering algorithm and its applications L Ertoz, M Steinbach, V Kumar Workshop on clustering high dimensional data and its applications at 2nd …, 2002 | 337 | 2002 |
Finding topics in collections of documents: A shared nearest neighbor approach L Ertöz, M Steinbach, V Kumar Clustering and Information Retrieval, 83-103, 2004 | 190 | 2004 |
Detection and summarization of novel network attacks using data mining L Ertoz, E Eilertson, A Lazarevic, P Tan, P Dokas, J Srivastava, V Kumar Minnesota INtrusion Detection System (MINDS) Technical Report, 2003 | 66 | 2003 |
Detection of novel network attacks using data mining L Ertoz, E Eilertson, A Lazarevic, PN Tan, P Dokas, V Kumar, J Srivastava Proc. of Workshop on Data Mining for Computer Security, 2003 | 63 | 2003 |
Identification of anomalous data records L Ertoz, V Kumar US Patent 7,668,843, 2010 | 61 | 2010 |
Data mining for cyber security V Chandola, E Eilertson, L Ertoz, G Simon, V Kumar Data Warehousing and Data Mining Techniques for Computer Security 20, 2006 | 54 | 2006 |
Protecting against cyber threats in networked information systems L Ertoz, A Lazarevic, E Eilertson, PN Tan, P Dokas, V Kumar, J Srivastava Battlespace Digitization and Network-Centric Systems III 5101, 51-57, 2003 | 27 | 2003 |
Data Warehousing and Data Mining Techniques for Computer Security V Chandola, E Eilertson, L Ertoz, G Simon, V Kumar ch. Data mining for cyber security, 2006 | 22* | 2006 |
MINDS: A new approach to the information security process EE Eilertson, L Ertoz, V Kumar, KS Long ARMY HIGH PERFORMANCE COMPUTING RESEARCH CENTER MINNEAPOLIS MN, 2004 | 17 | 2004 |
Scan detection-revisited L Ertoz, E Eilertson, P Dokas, V Kumar, K Long Army High Performance Computing Research Center Technical Report, 2004 | 15 | 2004 |
Usage Aware PageRank. BU Oztekin, L Ertöz, V Kumar WWW (Posters), 2003 | 15 | 2003 |
Personalized profile based search interface with ranked and clustered display S Kumar, BU Oztekin, L Ertoz, S Singhal, E Han, V Kumar MINNESOTA UNIV MINNEAPOLIS DEPT OF COMPUTER SCIENCE, 2001 | 15 | 2001 |
MINDS: Architecture & Design V Chandola, E Eilertson, L Ertoz, G Simon, V Kumar Data Warehousing and Data Mining Techniques for Cyber Security, 83-107, 2007 | 10* | 2007 |