-
1
-
-
38049161631
-
-
R. Anderson, A. Khattak. The use of information retrieval techniques for intrusion detection [EB/OL]. http://www.raid-symposium.org/raid98/index.html, 2004-10-04.
-
R. Anderson, A. Khattak. The use of information retrieval techniques for intrusion detection [EB/OL]. http://www.raid-symposium.org/raid98/index.html, 2004-10-04.
-
-
-
-
2
-
-
0002979739
-
Hidden markov models for human/computer interface modeling[A]
-
Stockholm, Sweden: Morgan Kaufmann Publishers
-
Terran L. Hidden markov models for human/computer interface modeling[A]. Proceedings of the IJCAI-99 Workshop on Learning about Users[C]. Stockholm, Sweden: Morgan Kaufmann Publishers, 1999. 35-44.
-
(1999)
Proceedings of the IJCAI-99 Workshop on Learning about Users[C]
, pp. 35-44
-
-
Terran, L.1
-
4
-
-
0037282635
-
Efficient anomaly detection by modeling privilege flows using hidden Markov model[J]
-
Sung B C, Hyuk J P. Efficient anomaly detection by modeling privilege flows using hidden Markov model[J]. Computers & Security, 2003, 22(1):45-55.
-
(2003)
Computers & Security
, vol.22
, Issue.1
, pp. 45-55
-
-
Sung, B.C.1
Hyuk, J.P.2
-
6
-
-
0032313923
-
Intrusion detection using sequences of system calls[J]
-
Steven A H, Stephanie F, Anil S. Intrusion detection using sequences of system calls[J]. Journal of Computer Security, 1998,6(3): 151-180.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Steven, A.H.1
Stephanie, F.2
Anil, S.3
-
7
-
-
0031192274
-
A statistically based system for prioritizing information exploration under uncertainty[J]
-
Helman P, Bhangoo J. A statistically based system for prioritizing information exploration under uncertainty[J]. IEEE Transactions on Systems, Man and Cyberneticsm, Part A: Systems and Humans. 1997,27(4):449-466.
-
(1997)
IEEE Transactions on Systems, Man and Cyberneticsm, Part A: Systems and Humans
, vol.27
, Issue.4
, pp. 449-466
-
-
Helman, P.1
Bhangoo, J.2
-
9
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models[A]
-
Oakland, California: IEEE Computer Society Press
-
Christina W, Stephanie F, Barak P. Detecting intrusions using system calls: alternative data models[A]. Proceedings of IEEE Symposium on Security and Privacy[C]. Oakland, California: IEEE Computer Society Press, 1999.133-145.
-
(1999)
Proceedings of IEEE Symposium on Security and Privacy[C]
, pp. 133-145
-
-
Christina, W.1
Stephanie, F.2
Barak, P.3
-
10
-
-
38049168877
-
-
D.Snyder. On-line intrusion detection using sequences of system calls[D]. Master's thesis, Department of Computer Science, Florida State University, 2001.
-
D.Snyder. On-line intrusion detection using sequences of system calls[D]. Master's thesis, Department of Computer Science, Florida State University, 2001.
-
-
-
-
11
-
-
38049161632
-
-
Jinhui-xie. HMM and its application in speech recognition[M] (in Chinese). Wuhan : Huazhong University of Technology Press, 1995.
-
Jinhui-xie. HMM and its application in speech recognition[M] (in Chinese). Wuhan : Huazhong University of Technology Press, 1995.
-
-
-
-
12
-
-
38049138563
-
-
Computer Immune Systems Data Sets. University of New Mexico[EB/OL], http://www.cs.unm.edu/~immsec/data/synth-sm.html, 2004-9-10.
-
Computer Immune Systems Data Sets. University of New Mexico[EB/OL], http://www.cs.unm.edu/~immsec/data/synth-sm.html, 2004-9-10.
-
-
-
|