-----BEGIN PGP SIGNED MESSAGE----- For anyone wanting to look at "Intrusion Detection" for research (or just good education), I cannot recommend this book highly enough. I suspect that lots of the recent questions about NN and other ID techniques, what has been tried, what worked, etc, will be found in this book: _Intrusion Detection_ by Rebecca Gurley Bace http://www.amazon.com/exec/obidos/ASIN/1578701856/qid=1024771423/sr=8-1/ref=sr_8_1/102-5289660-1223300 Since she "was there" when the NSA Computer Misuse and Anomaly Detection (CMAD) was started, and appears to have been involved with defining and funding some of the early ID research, she knows her stuff. If I was teaching a computer science (undergrad or grad) course in ID, I'd use this book. This is a deeper CS-style book, not a practioner's guide and "how to" or cookbook. It does cover, IIRC, some (lots?) of the original Neural Net and other expert system work w.r.t to ID. The extensive bibliography alone is worth the price of this book, as far as I am concerned. Caveat: I know Becky a little, respect her work, and have an autographed copy (Thanks infomom!), so I *may* be slightly biased. - --tep - -- Tom E. Perrine <tepat_private> | San Diego Supercomputer Center http://www.sdsc.edu/~tep/ | -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (GNU/Linux) Comment: Processed by Mailcrypt 3.5.6 and Gnu Privacy Guard <http://www.gnupg.org/> iQCVAwUBPRTHTRTSxpWcaAFRAQETWQP/VU7SYBezzwE7Pk1yI+9EmVwxEUeMApzk OamY9Sjb9Cn98Vqe1n9PvgB3AKLWKsSD/u9uOZwlU2Pidcd24dktvPx6mllKcbQb gQVaNdcIb0H6t9UmNSMo8i546s018VuYup+JzOtfmS6VXX48T45VWAYIV6QRR6m7 kUz2dWhPt/w= =+WH2 -----END PGP SIGNATURE----- --------------------------------------------------------------------- To unsubscribe, e-mail: loganalysis-unsubscribeat_private For additional commands, e-mail: loganalysis-helpat_private
This archive was generated by hypermail 2b30 : Sun Jun 23 2002 - 12:22:55 PDT