메뉴 건너뛰기




Volumn 14, Issue 5, 1997, Pages 35-41

Intrusion detection via system call traces

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA ACQUISITION; DATA COMMUNICATION SYSTEMS; DATA RECORDING; DATABASE SYSTEMS; FINITE AUTOMATA; HEURISTIC PROGRAMMING; ONLINE SYSTEMS;

EID: 0031233430     PISSN: 07407459     EISSN: None     Source Type: Journal    
DOI: 10.1109/52.605929     Document Type: Article
Times cited : (152)

References (9)
  • 2
    • 0025548907 scopus 로고
    • Security Audit Trait Analysis Using Inductively Generated Predictive Rules
    • IEEE, Piscataway, N.J., March
    • H.S.Teng, K. Chen, and S.C. Lu, "Security Audit Trait Analysis Using Inductively Generated Predictive Rules," Proc. Sixth Conf. Artificial Intelligence Applications, IEEE, Piscataway, N.J., March 1990, pp. 24-29.
    • (1990) Proc. Sixth Conf. Artificial Intelligence Applications , pp. 24-29
    • Chen, H.K.1    Lu, S.C.2
  • 3
    • 0000524153 scopus 로고
    • Intrusion Detection: Its Role and Validation
    • G. Liepens and H. Vaccaro, "Intrusion Detection: Its Role and Validation," Computers and Security, Vol. 11, 1992, pp. 347-355.
    • (1992) Computers and Security , vol.11 , pp. 347-355
    • Liepens, G.1    Vaccaro, H.2
  • 4
    • 0012292276 scopus 로고
    • A Neural Network Approach Towards Intrusion Detection
    • Nat'l Inst. Standards and Technology, Washington, D.C.
    • K.L. Fox et al., "A Neural Network Approach Towards Intrusion Detection," Proc. 13th Nat'l Computer Security Conf., Nat'l Inst. Standards and Technology, Washington, D.C., 1990, pp. 125-134.
    • (1990) Proc. 13th Nat'l Computer Security Conf. , pp. 125-134
    • Fox, K.L.1
  • 5
    • 0028714365 scopus 로고
    • Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring
    • IEEE Computer Soc. Press, Los Alamitos, Calif.
    • C. Ko, G. Fink, and K. Levitt, "Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring," Proc. 10th Annual Computer Security Applications Conf., IEEE Computer Soc. Press, Los Alamitos, Calif., 1994, pp. 134-144.
    • (1994) Proc. 10th Annual Computer Security Applications Conf. , pp. 134-144
    • Ko, C.1    Fink, G.2    Levitt, K.3
  • 7
    • 0003451777 scopus 로고
    • tech. report, Computer Science Laboratory, SRI Int'l, Menio Park, Calif., Feb.
    • T.F. Lunt et al., A Real-Time Intrusion Detection Expert System (IDES), tech. report, Computer Science Laboratory, SRI Int'l, Menio Park, Calif., Feb. 1992.
    • (1992) A Real-Time Intrusion Detection Expert System (IDES)
    • Lunt, T.F.1
  • 9
    • 85084162735 scopus 로고    scopus 로고
    • A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker
    • Usenis Assoc., Berkeley, Calif.
    • I. Goldberg et al., "A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker," 6th Usenix Security Symp., Usenis Assoc., Berkeley, Calif., 1996, pp. 1-13.
    • (1996) 6th Usenix Security Symp. , pp. 1-13
    • Goldberg, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.