Guest Editor’s Introduction Daniel Barbara Available in: PDF Published in December 2001 (Vol.30 No.4)
Data Mining-based Intrusion Detectors: An Overview of the Columbia IDS Project S. J. Stolfo, W. Lee, P. K. Chan, W. Fan, and E. Eskin Available in: PDF Published in December 2001 (Vol.30 No.4)
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection D. Barbara, J. Couto, S. Jajodia, and N. Wu Available in: PDF Published in December 2001 (Vol.30 No.4)
Detection and Classification of Intrusions and Faults using Sequences of System Calls J.B.D. Cabrera, L. Lewis, and R.K. Mehra Available in: PDF Published in December 2001 (Vol.30 No.4)
Mining System Audit Data: Opportunities and Challenges W. Lee and W. Fan Available in: PDF Published in December 2001 (Vol.30 No.4)
Using Unknowns to Prevent Discovery of Association Rules Y. Saygin, V.S. Verykios and C. Clifton Available in: PDF Published in December 2001 (Vol.30 No.4)
Mining Email Content for Author Identification Forensics O. De Vel, A. Anderson, M. Corney, and G. Mohay Available in: PDF Published in December 2001 (Vol.30 No.4)
Transactional Information Systems Reviewer: Marc H. Scholl Available in: PDF Published in December 2001 (Vol.30 No.4)
Information Warfare and Security Reviewer: H. V. Jagadish Available in: PDF Published in December 2001 (Vol.30 No.4)