Learn More
This paper presents a comprehensive method for evaluating intrusion detection systems (IDSs). It integrates and extends ROC (receiver operating characteristic) and cost analysis methods to provide an expected cost metric. Results are given for determining the optimal operation of an IDS based on this expected cost metric. Results are given for the operation(More)
Several metrics related to the distribution of use of instructions in a program have been developed. They appear to have potential for assessing the degree to which a program "matches" the architecture of the host computer. Also, they may serve as the basis for bridging the gap between the software science metrics of Halstead and others that focus on the(More)