ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection D. Barbara, J. Couto, S. Jajodia, and N. Wu Available in: PDF Published in December 2001 (Vol.30 No.4)
Detection and Classification of Intrusions and Faults using Sequences of System Calls J.B.D. Cabrera, L. Lewis, and R.K. Mehra Available in: PDF Published in December 2001 (Vol.30 No.4)
Mining System Audit Data: Opportunities and Challenges W. Lee and W. Fan Available in: PDF Published in December 2001 (Vol.30 No.4)
Using Unknowns to Prevent Discovery of Association Rules Y. Saygin, V.S. Verykios and C. Clifton Available in: PDF Published in December 2001 (Vol.30 No.4)
Mining Email Content for Author Identification Forensics O. De Vel, A. Anderson, M. Corney, and G. Mohay Available in: PDF Published in December 2001 (Vol.30 No.4)
Transactional Information Systems Reviewer: Marc H. Scholl Available in: PDF Published in December 2001 (Vol.30 No.4)
Information Warfare and Security Reviewer: H. V. Jagadish Available in: PDF Published in December 2001 (Vol.30 No.4)
Reminiscences on Influential Papers – Kenneth A. Ross ed. J. Hamilton, L.V.S. Lakshmanan, L. Wong Available in: PDF Published in December 2001 (Vol.30 No.4)
SQL Multimedia and Application Packages (SQL/MM) Andrew Eisenberg and Jim Melton Available in: PDF Published in December 2001 (Vol.30 No.4)