메뉴 건너뛰기




Volumn 4, Issue , 2003, Pages 2443-2447

An Adaptive Detection of Anomalies in User's Behavior

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; MARKOV PROCESSES; PROBABILITY DISTRIBUTIONS;

EID: 0141592495     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (3)

References (13)
  • 1
    • 0030282113 scopus 로고    scopus 로고
    • The power of amnesia: Learning probabilistic automata with variable memory length
    • D. Ron, Y. Singer, and N. Tishby. The power of amnesia: Learning probabilistic automata with variable memory length. Machine Learning, 25 (2-3): 117-149, 1996.
    • (1996) Machine Learning , vol.25 , Issue.2-3 , pp. 117-149
    • Ron, D.1    Singer, Y.2    Tishby, N.3
  • 4
    • 0029531733 scopus 로고
    • The Application Of Neural Networks To UNIX Computer Security
    • Perth, Australia
    • K. Tan. The Application Of Neural Networks To UNIX Computer Security. In Proc. of the IEEE International Conference on Neural Networks, 1, pp. 476-481, Perth, Australia, 1995.
    • (1995) Proc. of the IEEE International Conference on Neural Networks , vol.1 , pp. 476-481
    • Tan, K.1
  • 6
    • 0002979739 scopus 로고    scopus 로고
    • Hidden markov models for human/computer interface modeling
    • T. Lane. Hidden markov models for human/computer interface modeling. In IJCAI-99 Workshop on Learning About Users, pp. 35-44, 1999.
    • (1999) IJCAI-99 Workshop on Learning about Users , pp. 35-44
    • Lane, T.1
  • 8
    • 0034836394 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • F. M. Titsworth, editor, Los Alamitos, CA, May 14-16. IEEE Computer Society
    • D. Wagner and R. Dean. Intrusion detection via static analysis. In F. M. Titsworth, editor, Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 156-169, Los Alamitos, CA, May 14-16 2001. IEEE Computer Society.
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 156-169
    • Wagner, D.1    Dean, R.2
  • 9
    • 0002511297 scopus 로고    scopus 로고
    • Predicting sequences of user actions
    • Madison, WI, July. AAAI Press. Proceedings of AAAI-98/ICML-98 Workshop, published as Technical Report WS-98-07
    • B. D. Davison and H. Hirsh. Predicting sequences of user actions. In Predicting the Future: AI Approaches to Time-Series Problems, pp. 5-12, Madison, WI, July 1998. AAAI Press. Proceedings of AAAI-98/ICML-98 Workshop, published as Technical Report WS-98-07.
    • (1998) Predicting the Future: AI Approaches to Time-series Problems , pp. 5-12
    • Davison, B.D.1    Hirsh, H.2
  • 10
    • 0009900351 scopus 로고    scopus 로고
    • Anomaly detection over noisy data using learned probability distributions
    • Morgan Kaufmann, San Francisco, CA
    • E. Eskin. Anomaly detection over noisy data using learned probability distributions. In Proc. 17 International Conf. on Machine Learning, pp. 255-262. Morgan Kaufmann, San Francisco, CA, 2000.
    • (2000) Proc. 17 International Conf. on Machine Learning , pp. 255-262
    • Eskin, E.1
  • 12
    • 0002819135 scopus 로고    scopus 로고
    • Binding and normalization of binary sparse distributed representations by context-dependent thinning
    • D. A. Rachkovskij and E. M. Kussul. Binding and normalization of binary sparse distributed representations by context-dependent thinning. Neural Computation 13(2): 411-452, 2001.
    • (2001) Neural Computation , vol.13 , Issue.2 , pp. 411-452
    • Rachkovskij, D.A.1    Kussul, E.M.2
  • 13
    • 85084164032 scopus 로고    scopus 로고
    • Automated response using system-call delays
    • A. Somayaji. Automated response using system-call delays. In USENIX Security Syposium 2000. pp. 185-197, 2000.
    • (2000) USENIX Security Syposium 2000 , pp. 185-197
    • Somayaji, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.