-
1
-
-
0023294428
-
An intrusion-detection model
-
D.E. Denning, An intrusion-detection model, IEEE Transactions on software Engineering, Vol: 13, No:2,pp. 222-232, 1987.
-
(1987)
IEEE Transactions on software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
3
-
-
84882800335
-
And Anup Ghosh, Simple, State-Based Approaches to Program-Based Anomaly Detection
-
August
-
C. C. Michael And Anup Ghosh, Simple, State-Based Approaches to Program-Based Anomaly Detection, ACM Transactions on Information and System Security, Vol. 5, No. 3, August 2002.
-
(2002)
ACM Transactions on Information and System Security
, vol.5
, Issue.3
-
-
Michael, C.C.1
-
4
-
-
33745463455
-
Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation
-
United States Military Academy, West Point, NY.,pp
-
Dae-Ki Kang, Doug Fuller, Vasant Honavar, Learning Classifiers for Misuse and Anomaly Detection Using a Bag of System Calls Representation, In the Proceedings of the 2005 IEEE Workshop on Information Assurance and Security ,United States Military Academy, West Point, NY.,pp 118-125 http://www.cs.iastate.edu/~honavar/Papers/isi05.pdf
-
In the Proceedings of the 2005 IEEE Workshop on Information Assurance and Security
, pp. 118-125
-
-
Kang, D.1
Fuller, D.2
Honavar, V.3
-
5
-
-
0013114810
-
Mining in a Data-flow Environment: Experience in Network Intrusion Detection
-
San Diego, CA, August
-
W. Lee, S. Stolfo, and K. Mok. Mining in a Data-flow Environment: Experience in Network Intrusion Detection. In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '99), San Diego, CA, August 1999.
-
(1999)
Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD '99)
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
8
-
-
0031192274
-
A statistically based system for prioritizing information exploration under uncertainty
-
July
-
P. Herman and J. Bhangoo. A statistically based system for prioritizing information exploration under uncertainty. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 27(4):449-466, July 1997.
-
(1997)
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans
, vol.27
, Issue.4
, pp. 449-466
-
-
Herman, P.1
Bhangoo, J.2
-
9
-
-
0034829697
-
A Fast Automaton-Based Method For Detecting Anomalous Program Beha viors
-
IEEE Computer Society, Los Alamitos, Calif
-
Sekar, R., Bendre, M., Dhurjati, D., And Bollineni, P, A Fast Automaton-Based Method For Detecting Anomalous Program Beha viors. In Proceedings Of The 2000 IEEE Symposium On SecurityAnd Privacy. IEEE Computer Society, Los Alamitos, Calif., 144-155.
-
Proceedings Of The 2000 IEEE Symposium On SecurityAnd Privacy
, pp. 144-155
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
And Bollineni, P.4
-
12
-
-
34548191048
-
-
Probabilistic networks-with-undirected.pdf
-
Probabilistic networks-with-undirected.pdf
-
-
-
|