메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 420-425

Anomaly detection based intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; INTRUSION DETECTION; RESEARCHERS;

EID: 33750804406     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2006.33     Document Type: Conference Paper
Times cited : (40)

References (9)
  • 1
    • 0003993827 scopus 로고    scopus 로고
    • DARPA. MIT Lincoln Laboratory
    • DARPA, Intrusion Detection Evaluation. MIT Lincoln Laboratory, 1998 (http://www.ll.mit.edu/ist/ideval).
    • (1998) Intrusion Detection Evaluation
  • 2
    • 4644256188 scopus 로고    scopus 로고
    • University of California, Department of Information and Computer Science
    • Hettich, S. and S.D. Bay, The UCIKDD Archive. University of California, Department of Information and Computer Science, 1999.
    • (1999) The UCIKDD Archive
    • Hettich, S.1    Bay, S.D.2
  • 4
    • 0013114810 scopus 로고    scopus 로고
    • Mining in a data-flow environment: Eperience in network intrusion detection
    • Lee, W., S. Stolfo, and K. Mok, Mining in a Data-Flow Environment: Eperience in Network Intrusion Detection. In Proceedings of the 5th ACM SIGKDD, 1999.
    • (1999) Proceedings of the 5th ACM SIGKDD
    • Lee, W.1    Stolfo, S.2    Mok, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.