메뉴 건너뛰기




Volumn 23, Issue 5, 2007, Pages 545-553

Attack-norm separation for detecting attack-induced quality problems on computers and networks

Author keywords

Artificial neural network; Attack norm separation; Chi square distance monitoring; Cyber attack detection

Indexed keywords

COMPUTER MONITORS; COMPUTER NETWORKS; COMPUTERS; NEURAL NETWORKS; RELIABILITY ANALYSIS; SEPARATION;

EID: 34547849701     PISSN: 07488017     EISSN: 10991638     Source Type: Journal    
DOI: 10.1002/qre.830     Document Type: Article
Times cited : (4)

References (14)
  • 1
    • 28244467214 scopus 로고    scopus 로고
    • A scientific approach to cyberattack detection
    • Ye N, Farley T. A scientific approach to cyberattack detection. IEEE Computer 2005; 38(11):55-61.
    • (2005) IEEE Computer , vol.38 , Issue.11 , pp. 55-61
    • Ye, N.1    Farley, T.2
  • 3
    • 1942436335 scopus 로고    scopus 로고
    • Robustness of the Markov-chain model for cyber-attack detection
    • Ye N, Zhang Y, Borror CM. Robustness of the Markov-chain model for cyber-attack detection. IEEE Transactions on Reliability 2004; 53(1):116-123.
    • (2004) IEEE Transactions on Reliability , vol.53 , Issue.1 , pp. 116-123
    • Ye, N.1    Zhang, Y.2    Borror, C.M.3
  • 4
    • 0346960125 scopus 로고    scopus 로고
    • Scalable chi square distance versus conventional statistical distance for process monitoring with uncorrelated data variables
    • Ye N, Borror C, Parmar D. Scalable chi square distance versus conventional statistical distance for process monitoring with uncorrelated data variables. Quality and Reliability Engineering International 2003; 19(6):505-515.
    • (2003) Quality and Reliability Engineering International , vol.19 , Issue.6 , pp. 505-515
    • Ye, N.1    Borror, C.2    Parmar, D.3
  • 5
    • 0036122767 scopus 로고    scopus 로고
    • Robustness of chi-square and Canberra techniques in detecting intrusions into information systems
    • Emran SM, Ye N. Robustness of chi-square and Canberra techniques in detecting intrusions into information systems. Quality and Reliability Engineering International 2002; 18(1):19-28.
    • (2002) Quality and Reliability Engineering International , vol.18 , Issue.1 , pp. 19-28
    • Emran, S.M.1    Ye, N.2
  • 6
    • 0036647172 scopus 로고    scopus 로고
    • Multivariate statistical analysis of audit trails for host-based intrusion detection
    • Ye N, Emran SM, Chen Q, Vilbert S. Multivariate statistical analysis of audit trails for host-based intrusion detection. IEEE Transactions on Computers 2002; 51(7):810-820.
    • (2002) IEEE Transactions on Computers , vol.51 , Issue.7 , pp. 810-820
    • Ye, N.1    Emran, S.M.2    Chen, Q.3    Vilbert, S.4
  • 8
    • 0003807773 scopus 로고    scopus 로고
    • Prentice-Hall: Upper Saddle River, NJ
    • Haykin S. Adaptive Filter Theory. Prentice-Hall: Upper Saddle River, NJ, 1996.
    • (1996) Adaptive Filter Theory
    • Haykin, S.1
  • 9
    • 0003881196 scopus 로고    scopus 로고
    • Time-domain approach using multi Kalman filters and EM algorithm to speech enhancement with nonstationary noise
    • Lee KY, Jung S. Time-domain approach using multi Kalman filters and EM algorithm to speech enhancement with nonstationary noise. IEEE Transactions on Speech and Audio Processing 2000; 8(3):282-291.
    • (2000) IEEE Transactions on Speech and Audio Processing , vol.8 , Issue.3 , pp. 282-291
    • Lee, K.Y.1    Jung, S.2
  • 11
    • 0036575252 scopus 로고    scopus 로고
    • First-order versus high-order stochastic models for computer intrusion detection
    • Ye N, Ehiabor T, Zhang Y. First-order versus high-order stochastic models for computer intrusion detection. Quality and Reliability Engineering International 2002; 18(3):243-250.
    • (2002) Quality and Reliability Engineering International , vol.18 , Issue.3 , pp. 243-250
    • Ye, N.1    Ehiabor, T.2    Zhang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.