“Secure Audit Logs to Support Computer Forensics”, Bruce Schneier and John Kelsey, May 1999, ACM Transactions on Information and System Security, vol. 2, No. 2, pp. 159-176.* |
“A Classification-based Methodology for Planning Audit Strategies in Fraud Detection”, F. Bonchi, F. Giannotti, G. Mainetto, D. Pedreschi, 1999, ACM, pp. 175-184.* |
“Secure Audit Logs to Support Computer Forensics”, Bruce Schneier and John Kelsey, May 1999, ACM Transactions on Information and System Security, vol. 1, No. 2, pp. 159-176.* |
“A Classification-based Methodology for Planning Audit Strategies in Fraud Detection”, F. Bonchi, F. Giannotti, G. Mainetto, D. Pedreschi, 1999, ACM, pp. 175-184.* |
“A Data Mining Framework for Buidling Intrusion Detection Models”. Wenke Lee, Salvatore J. Stolfo, Kui W. Mok. Security and Privacy, 1999. Proceedings of the 1999 IEEE Symposium on, 1999. pp.: 120-132. |