-
3
-
-
0031233430
-
Intrusion detection via system call traces
-
A. P. Kosoresow, S.A.Hofmeyr. "Intrusion Detection via System Call Traces" in IEEE Software. Volume 14(5), 1997, pp. 24-42.
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 24-42
-
-
Kosoresow, A.P.1
Hofmeyr, S.A.2
-
11
-
-
85166350822
-
Occam's two razors, the sharp and the blunt
-
P. Domingos, "Occam's two razors, the sharp and the blunt," in Proceedings of KDD '98, 1998.
-
(1998)
Proceedings of KDD '98
-
-
Domingos, P.1
-
13
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni, "A Fast Automaton-Based Method for Detecting Anomalous Program Behaviors," in Proceedings of 2001 IEEE Symposium on Security and Privacy, 2001.
-
(2001)
Proceedings of 2001 IEEE Symposium on Security and Privacy
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
14
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo., T. Shanbhag, A. Tiwari, H. Yang and S. Zhou, "Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions," in Proceedings of the 9th ACM conference on Computer and communications security. 2002.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
15
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S.A.Hoftmeyr., S. Forrest, A. Somayaji, "Intrusion Detection using Sequences of System Calls," in Journal of Computer Security Vol. 6, pp. 151-180.
-
Journal of Computer Security
, vol.6
, pp. 151-180
-
-
Hoftmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
17
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S.A.Hofmeyr., A. Somayaji, D. Longstaff, "A Sense of Self for Unix Processes," Proceedings of 1996 IEEE Symposium on Security and Privacy, 1996, pp. 120-128.
-
(1996)
Proceedings of 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, D.4
-
18
-
-
84958035045
-
Patterns in numerical data: Practical approximations to Kolmogorov complexity
-
th workshop on Rough Sets, Data Mining, and Granular-Soft Computing, Yamaguchi, Japan, Nov 9-11, New Directions in Rough Sets, Data Mining, and Granular-Soft Computing, Zhong, Skowron, Ohsuga (eds), Springer-Verlag
-
th workshop on Rough Sets, Data Mining, and Granular-Soft Computing, Yamaguchi, Japan, Nov 9-11, 1999, Lecture Notes in AI series No 1711, New Directions in Rough Sets, Data Mining, and Granular-Soft Computing, Zhong, Skowron, Ohsuga (eds), Springer-Verlag, 509-513.
-
(1999)
Lecture Notes in AI Series No 1711
, vol.1711
, pp. 509-513
-
-
Lin, T.Y.1
-
19
-
-
33845321873
-
Rough patterns in data-rough sets and foundation of intrusion detection systems
-
T. Y. Lin, "Rough Patterns in Data-Rough Sets and Foundation of Intrusion Detection Systems," Journal of Foundation of Computer Science and Decision Support, Vol.18, No. 3-4, 1993. 225-241.
-
(1993)
Journal of Foundation of Computer Science and Decision Support
, vol.18
, Issue.3-4
, pp. 225-241
-
-
Lin, T.Y.1
|