메뉴 건너뛰기




Volumn , Issue , 2007, Pages 473-479

Process profiling using frequencies of system calls

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION); ENGINEERING RESEARCH; INTRUSION DETECTION; MESSAGE PASSING; PROBABILITY;

EID: 34548147746     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ARES.2007.116     Document Type: Conference Paper
Times cited : (10)

References (14)
  • 3
    • 84882800335 scopus 로고    scopus 로고
    • And Anup Ghosh, Simple, State-Based Approaches to Program-Based Anomaly Detection
    • August
    • C. C. Michael And Anup Ghosh, Simple, State-Based Approaches to Program-Based Anomaly Detection, ACM Transactions on Information and System Security, Vol. 5, No. 3, August 2002.
    • (2002) ACM Transactions on Information and System Security , vol.5 , Issue.3
    • Michael, C.C.1
  • 4
    • 33745463455 scopus 로고    scopus 로고
    • Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation
    • United States Military Academy, West Point, NY.,pp
    • Dae-Ki Kang, Doug Fuller, Vasant Honavar, Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation, In the Proceedings of the 2005 IEEE Workshop on Information Assurance and Security ,United States Military Academy, West Point, NY.,pp 118-125 http://www.cs.iastate.edu/~honavar/Papers/isi05.pdf
    • In the Proceedings of the 2005 IEEE Workshop on Information Assurance and Security , pp. 118-125
    • Kang, D.1    Fuller, D.2    Honavar, V.3
  • 12
    • 34548191048 scopus 로고    scopus 로고
    • Probabilistic networks-with-undirected.pdf
    • Probabilistic networks-with-undirected.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.