메뉴 건너뛰기




Volumn , Issue , 2003, Pages 62-75

Anomaly detection using call stack information

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING LANGUAGES; COMPUTER SIMULATION; FINITE AUTOMATA; ONLINE SYSTEMS; PERFORMANCE;

EID: 0038825045     PISSN: 10637109     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (187)

References (20)
  • 4
    • 0006921491 scopus 로고    scopus 로고
    • On the time complexity of the TEIRESIAS algorithm
    • Research Report 98A00290, IBM
    • A. Floratos and I. Rigoutsos, "On the Time Complexity of the TEIRESIAS Algorithm", Research Report 98A00290, IBM, 1998.
    • (1998)
    • Floratos, A.1    Rigoutsos, I.2
  • 6
    • 85084160308 scopus 로고    scopus 로고
    • A study in using neural networks for anomaly and misuse detection
    • A. Ghosh and A. Schwartzbard, "A study in using neural networks for anomaly and misuse detection", 8th USENIX Security Symposium, pp. 141-151, 1999.
    • (1999) 8th USENIX Security Symposium , pp. 141-151
    • Ghosh, A.1    Schwartzbard, A.2
  • 8
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection system using sequences of system calls
    • S.A. Hofmeyr, A. Somayaji, and S. Forrest, "Intrusion Detection System Using Sequences of System Calls", Journal of Computer Security, 6(3), pp. 151-180, 1998.
    • (1998) Journal of Computer Security , vol.6 , Issue.3 , pp. 151-180
    • Hofmeyr, S.A.1    Somayaji, A.2    Forrest, S.3
  • 9
    • 0003829943 scopus 로고    scopus 로고
    • Execution monitoring of security-critical programs in distributed systems: A specification-based approach
    • PhD thesis, UC Davis
    • C. Ko, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach". PhD thesis, UC Davis, 1996.
    • (1996)
    • Ko, C.1
  • 13
    • 84874268641 scopus 로고    scopus 로고
    • WebStone benchmark information
    • Mindcraft
    • Mindcraft, "WebStone Benchmark Information", http://www.mindcraft.com/webstone/.
  • 14
    • 0031684427 scopus 로고    scopus 로고
    • Combinatorial pattern discovery in biological sequences: The TEIRESIAS algorithm
    • I. Rigoutsos and A. Floratos, "Combinatorial Pattern Discovery in Biological Sequences: The TEIRESIAS Algorithm", Bioinformatics, 14 (1), pp. 55-67, 1998.
    • (1998) Bioinformatics , vol.14 , Issue.1 , pp. 55-67
    • Rigoutsos, I.1    Floratos, A.2
  • 15
    • 77952265719 scopus 로고    scopus 로고
    • The process of security
    • April
    • B. Schneier, "The Process of Security", Information Security, April. 2000 http://www.infosecuritymag.com/articles/april00/columns_cryptorphythms.shtml
    • (2000) Information Security
    • Schneier, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.