-
1
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, S.A. Forrest, S. and Somayaji, A. Intrusion detection using sequences of system calls. In Journal of Computer Security, Vol. 6, pages 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
2
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
Forrest, S., Warrender,C., and Pearlmutter, B. Detecting intrusions using system calls: Alternative data models. In IEEE Symposium on Security and Privacy, pages 133-145, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
, pp. 133-145
-
-
Forrest, S.1
Warrender, C.2
Pearlmutter, B.3
-
3
-
-
0037142572
-
Anomaly intrusion detection method based on HMM
-
Bin, Y., Qiao, Y., Xin, X.W., and Ge, S. Anomaly intrusion detection method based on HMM. In IEEE Electronic letters Online No: 20020467, volume 38, pages 663-664, 2002.
-
(2002)
IEEE Electronic Letters Online No: 20020467
, vol.38
, pp. 663-664
-
-
Bin, Y.1
Qiao, Y.2
Xin, X.W.3
Ge, S.4
-
5
-
-
0037282635
-
Efficient anomaly detection by modelling privilege flows using HMM
-
Sung Bae Cho and Hyuk Jang Park. Efficient anomaly detection by modelling privilege flows using HMM. In Computers & Security, Vol. 22, pages 45-55, 2003.
-
(2003)
Computers & Security
, vol.22
, pp. 45-55
-
-
Cho, S.B.1
Park, H.J.2
-
6
-
-
84890861404
-
A multi layer model for anomaly intrusion detection using program sequences of system calls
-
Hu, J., Hoang, X.D., and Bertok, P. A multi layer model for anomaly intrusion detection using program sequences of system calls. In IEEE International Conference on Networks, 2003.
-
(2003)
IEEE International Conference on Networks
-
-
Hu, J.1
Hoang, X.D.2
Bertok, P.3
-
7
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
Rabiner L R. A tutorial on hidden Markov models and selected applications in speech recognition. In Proceedings of the IEEE, Vol. 77, pages 257-286, 1989.
-
(1989)
Proceedings of the IEEE
, vol.77
, pp. 257-286
-
-
Rabiner, L.R.1
-
8
-
-
33744911592
-
Use of k-nearest neighbor classifier for intrusion detection
-
Liao, Yihua, and Vemuri, V. Rao, Use of k-nearest neighbor classifier for intrusion detection. In Networks and Security, Vol. 21, pages 438-448, 2002.
-
(2002)
Networks and Security
, vol.21
, pp. 438-448
-
-
Liao, Y.1
Vemuri, V.R.2
-
9
-
-
24944554151
-
Intrusion detection system using sequence and set preserving metric
-
Radha Krishna, P., Raju, S. Bapi, Arijit Laha, Pradeep Kumar, M. Venkateswara Rao. Intrusion detection system using sequence and set preserving metric. In IEEE International Conference on Intelligence and Security Informatics, ISI, pages 498-504, 2005.
-
(2005)
IEEE International Conference on Intelligence and Security Informatics, ISI
, pp. 498-504
-
-
Radha Krishna, P.1
Raju, S.B.2
Arijit, L.3
Pradeep Kumar, M.4
Venkateswara, R.5
-
10
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
Hofmeyr, Steven A., Forrest, S, and Somayaji, A. Intrusion detection using sequences of system calls. In Journal of Computer Security, Vol. 6, pages 151-180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
11
-
-
0036085540
-
Why 6? defining the operational limits of STIDE, an anomaly based intrusion detector
-
Tan, K.M.C., and Maxion, R A. Why 6? defining the operational limits of STIDE, an anomaly based intrusion detector. In Proceeding of the 2002 IEEE Symposium on Security and Privacy, pages 188, 2002.
-
(2002)
Proceeding of the 2002 IEEE Symposium on Security and Privacy
, pp. 188
-
-
Tan, K.M.C.1
Maxion, R.A.2
-
12
-
-
33744922876
-
Project work "intrusion detection using HMM with improved semantics"
-
submitted to, Hyderabad, June
-
Raman, C.V., Project work "Intrusion Detection using HMM with improved semantics"submitted to University of Hyderabad, Hyderabad, June, 2005.
-
(2005)
University of Hyderabad
-
-
Raman, C.V.1
|