메뉴 건너뛰기




Volumn , Issue , 2004, Pages 318-329

Gray-box extraction of execution graphs for anomaly detection

Author keywords

Anomaly detection; Control flow graph; Intrusion detection; System call monitoring

Indexed keywords

COMPUTER OPERATING SYSTEMS; COMPUTER SOFTWARE; GRAPH THEORY; HTTP; INTERFACES (COMPUTER); MATHEMATICAL MODELS; SERVERS; THEOREM PROVING;

EID: 14844297052     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1030083.1030126     Document Type: Conference Paper
Times cited : (95)

References (21)
  • 9
    • 14844332684 scopus 로고    scopus 로고
    • Master's Thesis, Computer and Information Science, National Unviersity of Singpaore
    • X. Lu. A Linux executable editing library. Master's Thesis, Computer and Information Science, National Unviersity of Singpaore. 1999.
    • (1999) A Linux Executable Editing Library
    • Lu, X.1
  • 16
    • 0036085540 scopus 로고    scopus 로고
    • "Why 6?" - Denning the operational limits of stide, an anomaly-based intrusion detector
    • May
    • K. Tan and R. Maxion. "Why 6?" - Denning the operational limits of stide, an anomaly-based intrusion detector. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 188-201, May 2002.
    • (2002) Proceedings of the 2002 IEEE Symposium on Security and Privacy , pp. 188-201
    • Tan, K.1    Maxion, R.2
  • 17
    • 0242671076 scopus 로고    scopus 로고
    • Janus: An approach for confinement of untrusted applications
    • Department of Computer Science, University of California at Berkeley, August
    • D. Wagner. Janus: an approach for confinement of untrusted applications. Technical Report CSD-99-1056, Department of Computer Science, University of California at Berkeley, August 1999.
    • (1999) Technical Report , vol.CSD-99-1056
    • Wagner, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.