-
1
-
-
0037400054
-
An empirical study of two approaches to sequence learning for anomaly detection
-
T Lane, E B Carla. An empirical study of two approaches to sequence learning for anomaly detection [J]. Machine Learning, 2003, 51 (1): 73-107
-
(2003)
Machine Learning
, vol.51
, Issue.1
, pp. 73-107
-
-
Lane, T.1
Carla, E.B.2
-
2
-
-
14844301453
-
Robustness of the Markov chain model for cyber attack detection
-
N Ye, Y Zhang, C M Borror. Robustness of the Markov chain model for cyber attack detection [J]. IEEE Trans on Reliability, 2003, 52 (3): 122-138
-
(2003)
IEEE Trans on Reliability
, vol.52
, Issue.3
, pp. 122-138
-
-
Ye, N.1
Zhang, Y.2
Borror, C.M.3
-
3
-
-
0013425679
-
Machine learning techniques for the computer security domain of anomaly detection: [Ph D dissertation]
-
Purdue: Purdue University
-
T Lane. Machine learning techniques for the computer security domain of anomaly detection: [Ph D dissertation] [D]. Purdue: Purdue University, 2000
-
(2000)
-
-
Lane, T.1
-
4
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
Los Alamitos, CA: IEEE Computer Society Press
-
C Warrender, S Forrest, B Pearlmutter. Detecting intrusions using system calls: Alternative data models [C]. In: Proc of the 1999 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 1999. 133-145
-
(1999)
Proc of the 1999 IEEE Symp on Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
5
-
-
0037142572
-
An anomaly intrusion detection method based on HMM
-
Yan Qiao, Xie Weixin, Yang Bin, et al. An anomaly intrusion detection method based on HMM [J]. Electronics Letters, 2002, 38 (13): 663-664
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 663-664
-
-
Yan, Q.1
Xie, W.2
Yang, B.3
-
6
-
-
10844230994
-
Intrusion detection using an ensemble of intelligent paradigms
-
S Mukkamala, A H Sung, A Abraham. Intrusion detection using an ensemble of intelligent paradigms [J]. Journal of Network and Computer Application, 2005, 28 (2): 167-182
-
(2005)
Journal of Network and Computer Application
, vol.28
, Issue.2
, pp. 167-182
-
-
Mukkamala, S.1
Sung, A.H.2
Abraham, A.3
-
7
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S A Hofmeyr, S Forrest, A Somayaji. Intrusion detection using sequences of system calls [J]. Journal of Computer Security, 1998, 6 (3): 151-180
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
8
-
-
0031258214
-
Computer immunology
-
S Forrest, S A Hofmeyr, A Somayaji. Computer immunology [J]. Communications of the ACM, 1997, 40 (10): 88-96
-
(1997)
Communications of the ACM
, vol.40
, Issue.10
, pp. 88-96
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
-
9
-
-
70350556318
-
Two sophisticated techniques to improve HMM-based intrusion detection systems
-
Pittsburgh, USA
-
S Cho, S Han. Two sophisticated techniques to improve HMM-based intrusion detection systems [J]. Int'l Symp on Recent Advances in Intrusion Detection, Pittsburgh, USA, 2003
-
(2003)
Int'l Symp on Recent Advances in Intrusion Detection
-
-
Cho, S.1
Han, S.2
-
10
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Los Alamitos, CA: IEEE Computer Society Press
-
W Lee, X Dong. Information-theoretic measures for anomaly detection [C]. In: Proc of the 2001 IEEE Symp on Security and Privacy. Los Alamitos, CA: IEEE Computer Society Press, 2001. 130-134
-
(2001)
Proc of the 2001 IEEE Symp on Security and Privacy
, pp. 130-134
-
-
Lee, W.1
Dong, X.2
-
11
-
-
34249990673
-
Anomaly detection methods for host-based intrusion detection systems: [Ph D dissertation]
-
Changsha: National University of Defense Technology, in Chinese
-
Tian Xinguang. Anomaly detection methods for host-based intrusion detection systems: [Ph D dissertation] [D]. Changsha: National University of Defense Technology, 2005 (in Chinese)
-
(2005)
-
-
Tian, X.1
-
12
-
-
17644369553
-
Network intrusion detection based on support vector machine
-
in Chinese
-
Li Hui, Guan Xiaohong, Zan Xin, et al. Network intrusion detection based on support vector machine [J]. Journal of Computer Research and Development, 2003, 40 (6): 799-807 (in Chinese)
-
(2003)
Journal of Computer Research and Development
, vol.40
, Issue.6
, pp. 799-807
-
-
Li, H.1
Guan, X.2
Zan, X.3
-
13
-
-
0037105910
-
Intrusion detection techniques and approaches
-
T Verwoerd, R Hunt. Intrusion detection techniques and approaches [J]. Computer Communication, 2002, 25 (15): 1356-1365
-
(2002)
Computer Communication
, vol.25
, Issue.15
, pp. 1356-1365
-
-
Verwoerd, T.1
Hunt, R.2
-
14
-
-
33749860521
-
Intrusion detection method based on machine learning
-
in Chinese
-
Tian Xinguang, Gao Lizhi, Zhang Eryang. Intrusion detection method based on machine learning [J]. Journal on Communications, 2006, 27 (6): 108-114 (in Chinese)
-
(2006)
Journal on Communications
, vol.27
, Issue.6
, pp. 108-114
-
-
Tian, X.1
Gao, L.2
Zhang, E.3
-
15
-
-
1542362262
-
An improved anomaly detection model for IDS
-
in Chinese
-
Sun Hongwei, Tian Xinguang, Li Xuechun, et al. An improved anomaly detection model for IDS [J]. Chinese Journal of Computers, 2003, 26 (11): 1450-1455 (in Chinese)
-
(2003)
Chinese Journal of Computers
, vol.26
, Issue.11
, pp. 1450-1455
-
-
Sun, H.1
Tian, X.2
Li, X.3
|