-
2
-
-
34548127995
-
Human Computer Interaction Based Intrusion Detection
-
presented at , Las Vegas, Nevada, USA, April 2-4
-
R. V. Yampolskiy, "Human Computer Interaction Based Intrusion Detection," presented at 4th International Conference on Information Technology: New Generations (ITNG 2007), Las Vegas, Nevada, USA, April 2-4, 2007.
-
(2007)
4th International Conference on Information Technology: New Generations (ITNG
-
-
Yampolskiy, R.V.1
-
3
-
-
84947881522
-
Motor-Skill Based Biometrics
-
presented at, Ed. G. Dhillon. Global Publishing, Las Vegas, NV, USA, April 11-12
-
R. V. Yampolskiy, "Motor-Skill Based Biometrics," presented at In Assuring Business processes, Proceedings of the 6th Annual Security Conference, Ed. G. Dhillon. Global Publishing, Las Vegas, NV, USA., April 11-12, 2007.
-
(2007)
In Assuring Business processes, Proceedings of the 6th Annual Security Conference
-
-
Yampolskiy, R.V.1
-
4
-
-
47849105957
-
-
Available at:, Retrieved October 24, 2005
-
BioPassword, "Biopassword," Available at: http://www. biopassword.com/bp2/welcome.asp, Retrieved October 24, 2005.
-
Biopassword
-
-
-
5
-
-
34147151570
-
-
Available at:, Retrieved July 12, 2006
-
J. Ilonen, "Keystroke dynamics," Available at: www.it.lut.fi/kurssit/03-04/010970000/seminars/Ilonen.pdf, Retrieved July 12, 2006.
-
Keystroke dynamics
-
-
Ilonen, J.1
-
9
-
-
47849125043
-
Keystroke Analysis of Different Languages: A Case Study
-
presented at , Madrid, Spain
-
D. Gunetti, C. Picardi, and G. Ruffo, "Keystroke Analysis of Different Languages: a Case Study," presented at Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA 2005), Madrid, Spain, 2005.
-
(2005)
Proc. of the Sixth Symposium on Intelligent Data Analysis (IDA
-
-
Gunetti, D.1
Picardi, C.2
Ruffo, G.3
-
10
-
-
79956145257
-
Keystroke Biometric Recognition on Long-Text Input: A Feasibility Study
-
presented at , Hong Kong, June
-
M. Curtin, C. C. Tappert, M. Villani, G. Ngo, J. Simone, H. S. Fort, and S. Cha, "Keystroke Biometric Recognition on Long-Text Input: A Feasibility Study," presented at Proc. Int. Workshop Sci Comp/Comp Stat (IWSCCS 2006), Hong Kong, June 2006.
-
(2006)
Proc. Int. Workshop Sci Comp/Comp Stat (IWSCCS
-
-
Curtin, M.1
Tappert, C.C.2
Villani, M.3
Ngo, G.4
Simone, J.5
Fort, H.S.6
Cha, S.7
-
11
-
-
60749096615
-
-
G. Bartolacci, M. Curtin, M. Katzenberg, N. Nwana, S.-H. Cha, and C. C. Tappert, Long-Text Keystroke Biometric Applications over the Internet, presented at MLMTA, 2005.
-
G. Bartolacci, M. Curtin, M. Katzenberg, N. Nwana, S.-H. Cha, and C. C. Tappert, " Long-Text Keystroke Biometric Applications over the Internet," presented at MLMTA, 2005.
-
-
-
-
13
-
-
84883286001
-
Detecting Computer Intrusions Using Behavioral Biometrics
-
presented at, St. Andrews, New Brunswick, Canada, October
-
A. A. E. Ahmed and I. Traore, "Detecting Computer Intrusions Using Behavioral Biometrics," presented at Third Annual Conference on Privacy, Security and Trust, St. Andrews, New Brunswick, Canada, October, 2005.
-
(2005)
Third Annual Conference on Privacy, Security and Trust
-
-
Ahmed, A.A.E.1
Traore, I.2
-
14
-
-
33745449771
-
Anomaly Intrusion Detection based on Biometrics
-
presented at, United States Military Academy, West Point, NY, June
-
A. A. E. Ahmed and I. Traore, "Anomaly Intrusion Detection based on Biometrics," presented at Workshop on Information Assurance, United States Military Academy, West Point, NY, June 2005.
-
(2005)
Workshop on Information Assurance
-
-
Ahmed, A.A.E.1
Traore, I.2
-
15
-
-
8844279221
-
A Behavioral Biometric System Based on Human Computer Interaction
-
H. Gamboa and V.-. A. Fred., "A Behavioral Biometric System Based on Human Computer Interaction," In Proceedings of SPIE, 2004.
-
(2004)
Proceedings of SPIE
-
-
Gamboa, H.1
Fred, V.A.2
-
17
-
-
33845498470
-
Automatic Identification of Participants in Haptic Systems
-
presented at, Ottawa, Canada, 17-19 May
-
M. Orozco, Y. Asfaw, A. Adler, S. Shirmohammadi, and A. E. Saddik, "Automatic Identification of Participants in Haptic Systems," presented at 2005 IEEE Instrumentation and Measurement Technology Conference, Ottawa, Canada, 17-19 May 2005.
-
(2005)
2005 IEEE Instrumentation and Measurement Technology Conference
-
-
Orozco, M.1
Asfaw, Y.2
Adler, A.3
Shirmohammadi, S.4
Saddik, A.E.5
-
18
-
-
33750122385
-
Haptic-Based Biometrics: A Feasibility Study
-
presented at, Alexandria, Virginia, USA, March 25-29
-
M. Orozco, Y. Asfaw, S. Shirmohammadi, A. Adler, and A. E. Saddik, "Haptic-Based Biometrics: A Feasibility Study," presented at IEEE Virtual Reality Conference, Alexandria, Virginia, USA, March 25-29, 2006.
-
(2006)
IEEE Virtual Reality Conference
-
-
Orozco, M.1
Asfaw, Y.2
Shirmohammadi, S.3
Adler, A.4
Saddik, A.E.5
-
19
-
-
84883097385
-
Haptic: The new biometrics-embedded media to recognizing and quantifying human patterns
-
Hilton, Singapore
-
M. O. Trujillo, I. Shakra, and A. E. Saddik, "Haptic: the new biometrics-embedded media to recognizing and quantifying human patterns," Proceedings of the 13th annual ACM international conference on Multimedia, Hilton, Singapore, 2005.
-
(2005)
Proceedings of the 13th annual ACM international conference on Multimedia
-
-
Trujillo, M.O.1
Shakra, I.2
Saddik, A.E.3
-
20
-
-
47849117864
-
-
Caslon-Analytics, presented at Available at: http://www.caslon.com.au/ biometricsnote6.htm, Retrieved October 2, 2005.
-
Caslon-Analytics, presented at Available at: http://www.caslon.com.au/ biometricsnote6.htm, Retrieved October 2, 2005.
-
-
-
-
21
-
-
67650697862
-
A Behavior-based Approach to Securing Email Systems
-
presented at, Sept
-
S. J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern, and C.-W. Hu, "A Behavior-based Approach to Securing Email Systems," presented at Mathematical Methods, Models and Architectures for Computer Networks Security, Sept. 2003.
-
(2003)
Mathematical Methods, Models and Architectures for Computer Networks Security
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.-W.5
-
22
-
-
47849087378
-
-
S. J. Stolfo, C.-W. Hu, W.-J. Li, S. Hershkop, K. Wang, and O. Nimeskern, Combining Behavior Models to Secure Email Systems, presented at CU Tech Report, Available at: www1.cs.columbia.edu/ids/publications/EMT-weijen.pdf, April 2003.
-
S. J. Stolfo, C.-W. Hu, W.-J. Li, S. Hershkop, K. Wang, and O. Nimeskern, "Combining Behavior Models to Secure Email Systems," presented at CU Tech Report, Available at: www1.cs.columbia.edu/ids/publications/EMT-weijen.pdf, April 2003.
-
-
-
-
25
-
-
67649949220
-
Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process
-
presented at Security and Reliability in Information Systems and Networks Track, Setubal Portugal, August
-
G. Frantzeskou, S. Gritzalis, and S. MacDonell, "Source Code Authorship Analysis for Supporting the Cybercrime Investigation Process," presented at 1st International Conference on eBusiness and Telecommunication Networks - Security and Reliability in Information Systems and Networks Track, Setubal Portugal, August 2004.
-
(2004)
1st International Conference on eBusiness and Telecommunication Networks
-
-
Frantzeskou, G.1
Gritzalis, S.2
MacDonell, S.3
-
26
-
-
37349079305
-
Behavior Based Identification of Network Intruders
-
presented at, Buffalo, NY, February 24
-
R. V. Yampolskiy, "Behavior Based Identification of Network Intruders," presented at 19th Annual CSE Graduate Conference (Grad-Conf2006), Buffalo, NY, February 24, 2006.
-
(2006)
19th Annual CSE Graduate Conference (Grad-Conf2006)
-
-
Yampolskiy, R.V.1
-
27
-
-
33747666972
-
Use of Behavioral Biometrics in Intrusion Detection and Online Gaming
-
presented at, Orlando, Florida, 17-22 April
-
R. V. Yampolskiy and V. Govindaraju, "Use of Behavioral Biometrics in Intrusion Detection and Online Gaming," presented at Biometric Technology for Human Identification III. SPIE Defense and Security Symposium, Orlando, Florida, 17-22 April 2006.
-
(2006)
Biometric Technology for Human Identification III. SPIE Defense and Security Symposium
-
-
Yampolskiy, R.V.1
Govindaraju, V.2
-
28
-
-
47849107001
-
Opponent modeling by analysing play
-
presented at, Edmonton, Albera, Canada
-
J. Ramon and N. Jacobs, "Opponent modeling by analysing play," presented at Proceedings of the Computers and Games workshop on Agents in Computer Games, Edmonton, Albera, Canada, 2002.
-
(2002)
Proceedings of the Computers and Games workshop on Agents in Computer Games
-
-
Ramon, J.1
Jacobs, N.2
-
29
-
-
47849086305
-
-
A. Brömnme and S. Al-Zubi, Multifactor Biometric Sketch Authentication, presented at In A. Brömme and C. Busch, editors, Proceedings of the BIOSIG 2003, Darmstadt, Germany, 24. July 2003.
-
A. Brömnme and S. Al-Zubi, "Multifactor Biometric Sketch Authentication," presented at In A. Brömme and C. Busch, editors, Proceedings of the BIOSIG 2003, Darmstadt, Germany, 24. July 2003.
-
-
-
-
30
-
-
84860283359
-
Using an Active Shape Structural Model for Biometric Sketch Recognition
-
presented at, Magdeburg, Germany, September
-
S. Al-Zubi, A. Brömme, and K. Tönnies, "Using an Active Shape Structural Model for Biometric Sketch Recognition," presented at In Proceedings of DAGM, Magdeburg, Germany, September 2003.
-
(2003)
In Proceedings of DAGM
-
-
Al-Zubi, S.1
Brömme, A.2
Tönnies, K.3
-
34
-
-
47849121948
-
-
T. Lane and C. E. Brodley, Detecting the Abnormal: Machine Learning in Computer Security, presented at Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette, January 1997.
-
T. Lane and C. E. Brodley, "Detecting the Abnormal: Machine Learning in Computer Security," presented at Department of Electrical and Computer Engineering, Purdue University Technical Report ECE-97-1, West Lafayette, January 1997.
-
-
-
-
35
-
-
33845948788
-
Profiling Users in GUI Based Systems for Masquerade Detection
-
presented at The , West Point, New York, USA, June 21-23
-
A. Garg, R. Rahalkar, S. Upadhyaya, and K. Kwiat, "Profiling Users in GUI Based Systems for Masquerade Detection," presented at The 7th IEEE Information Assurance Workshop (IAWorkshop 2006), West Point, New York, USA, June 21-23, 2006.
-
(2006)
7th IEEE Information Assurance Workshop (IAWorkshop
-
-
Garg, A.1
Rahalkar, R.2
Upadhyaya, S.3
Kwiat, K.4
-
38
-
-
47849125042
-
-
J. P. Anderson, Computer Security Threat Monitoring and Surveillance, presented at Technical Report. James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
-
J. P. Anderson, "Computer Security Threat Monitoring and Surveillance," presented at Technical Report. James P. Anderson Company, Fort Washington, Pennsylvania, April 1980.
-
-
-
-
41
-
-
84942248748
-
Finding the vocabulary of program behavior data for anomaly detection
-
presented at, 22-24 April
-
C. C. Michael, "Finding the vocabulary of program behavior data for anomaly detection," presented at DARPA Information Survivability Conference and Exposition, 2003, 22-24 April 2003.
-
(2003)
DARPA Information Survivability Conference and Exposition
-
-
Michael, C.C.1
-
42
-
-
84940104123
-
A Data Mining Framework for Building Intrusion Detection Models
-
presented at, Okland, CA
-
W. Lee, S. J. Stolfo, and K. W. Mok, "A Data Mining Framework for Building Intrusion Detection Models," presented at IEEE Symposium on Security and Privacy, Okland, CA, 1999.
-
(1999)
IEEE Symposium on Security and Privacy
-
-
Lee, W.1
Stolfo, S.J.2
Mok, K.W.3
-
44
-
-
0036095845
-
Enhancing Profiles for Anomaly Detection Using Time Granularities
-
presented at
-
Y. Li, N. Wu, S. Jajodia, and X. S. Wang, "Enhancing Profiles for Anomaly Detection Using Time Granularities," presented at Journal of Computer Security, 2002.
-
(2002)
Journal of Computer Security
-
-
Li, Y.1
Wu, N.2
Jajodia, S.3
Wang, X.S.4
-
45
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
presented at
-
K. Ilgun, R. A. Kemmerer, and P. A. Porras, "State transition analysis: A rule-based intrusion detection approach," presented at Software Engineering, 1995.
-
(1995)
Software Engineering
-
-
Ilgun, K.1
Kemmerer, R.A.2
Porras, P.A.3
-
47
-
-
84866686042
-
Using finite automata to mine execution data for intrusion detection: A preliminary report
-
presented at, Toulouse, France, October
-
C. C. Michael and A. Ghosh, "Using finite automata to mine execution data for intrusion detection: A preliminary report," presented at In Proceedings of the Third International Workshop in Recent Advances in Intrusion Detection, Toulouse, France, October 2000.
-
(2000)
In Proceedings of the Third International Workshop in Recent Advances in Intrusion Detection
-
-
Michael, C.C.1
Ghosh, A.2
-
48
-
-
70349100099
-
Anomaly Detection using Call Stack Information
-
presented at, Oakland, CA, USA, May 11-14
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong, "Anomaly Detection using Call Stack Information," presented at Proceedings of the IEEE Security and Privacy, Oakland, CA, USA, May 11-14, 2003.
-
(2003)
Proceedings of the IEEE Security and Privacy
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
49
-
-
33846312311
-
Efficient context-sensitive intrusion detection
-
presented at, San Diego, California, February
-
J. Giffin, S. Jha, and B. Miller, "Efficient context-sensitive intrusion detection," presented at In 11th Annual Network and Distributed Systems Security Symposium (NDSS), San Diego, California, February 2004.
-
(2004)
In 11th Annual Network and Distributed Systems Security Symposium (NDSS)
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
50
-
-
33750798519
-
Baseline Profile Stability for Network Anomaly Detection
-
presented at, Las Vegas, NV, April
-
Y. Kim, J.-Y. Jo, and K. Suh, "Baseline Profile Stability for Network Anomaly Detection," presented at IEEE ITNG 2006, Internet and Wireless Network Security track, Las Vegas, NV, April 2006.
-
(2006)
IEEE ITNG 2006, Internet and Wireless Network Security track
-
-
Kim, Y.1
Jo, J.-Y.2
Suh, K.3
-
51
-
-
47849096614
-
A Neural Network Application for Attack Detection in Computer Networks
-
L. d. S. Silva, A. F. d. Santos, J. D. d. Silva, and A. Montes, "A Neural Network Application for Attack Detection in Computer Networks," Instituto Nacional de Pesquisas Espanciais, 2004.
-
(2004)
Instituto Nacional de Pesquisas Espanciais
-
-
Silva, L.D.S.1
Santos, A.F.D.2
Silva, J.D.D.3
Montes, A.4
-
52
-
-
77954316519
-
Investigation of neural network classification of computer network attacks
-
presented at Research and Education, 11-13 Aug
-
Z. Zhang and C. Manikopoulos, "Investigation of neural network classification of computer network attacks," presented at Proceedings of International Conference on Information Technology: Research and Education, 11-13 Aug. 2003.
-
(2003)
Proceedings of International Conference on Information Technology
-
-
Zhang, Z.1
Manikopoulos, C.2
-
54
-
-
47849130842
-
Artificial Intelligence Approaches for Intrusion Detection
-
presented at, Long Island, New York, May 5
-
D. Novikov, R. V. Yampolskiy, and L. Reznik, "Artificial Intelligence Approaches for Intrusion Detection," presented at Long Island Systems Applications and Technology Conference (LISAT2006). Long Island, New York., May 5, 2006.
-
(2006)
Long Island Systems Applications and Technology Conference (LISAT2006)
-
-
Novikov, D.1
Yampolskiy, R.V.2
Reznik, L.3
-
55
-
-
33750804406
-
Anomaly Detection Based Intrusion Detection
-
presented at , Las Vegas, Nevada, USA, April 10-12
-
D. Novikov, R. V. Yampolskiy, and L. Reznik, "Anomaly Detection Based Intrusion Detection," presented at Third International Conference on Information Technology: New Generations (ITNG 2006), Las Vegas, Nevada, USA, April 10-12, 2006.
-
(2006)
Third International Conference on Information Technology: New Generations (ITNG
-
-
Novikov, D.1
Yampolskiy, R.V.2
Reznik, L.3
-
56
-
-
47849124503
-
-
D. Novikov., Neural Networks to Intrusion Detection., presented at MS thesis, Rochester Institute of Technology. Rochester, NY, October 2005.
-
D. Novikov., "Neural Networks to Intrusion Detection.," presented at MS thesis, Rochester Institute of Technology. Rochester, NY, October 2005.
-
-
-
-
58
-
-
0031274649
-
Wide area Internet traffic patterns and characteristics
-
presented at, November
-
K. Thompson, G. Miller, and R. Wilder, "Wide area Internet traffic patterns and characteristics," presented at In IEEE Network, November 1997.
-
(1997)
In IEEE Network
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
59
-
-
3943082567
-
Detecting malicious software by monitoring anomalous windows registry accesses
-
presented at Technical report, CUCS Technical Report
-
F. Apap, A. Honig, S. Hershkop, E. Eskin, and S. Stolfo, "Detecting malicious software by monitoring anomalous windows registry accesses," presented at Technical report, CUCS Technical Report, 2001.
-
(2001)
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
60
-
-
47849092496
-
-
A. G. Pennington, J. D. Strunk, J. L. Griffin, C. A. N. Soules, G. R. Goodson, and G. R. Ganger, Storage-based intrusion detection: Watching storage activity for suspicious behavior, presented at Technical report CMU - CS - 02 - 179. Carnegie Mellon University, October 2002.
-
A. G. Pennington, J. D. Strunk, J. L. Griffin, C. A. N. Soules, G. R. Goodson, and G. R. Ganger, "Storage-based intrusion detection: Watching storage activity for suspicious behavior," presented at Technical report CMU - CS - 02 - 179. Carnegie Mellon University, October 2002.
-
-
-
-
61
-
-
27144528230
-
Storage-based intrusion detection for storage area networks (SANs)
-
presented at, 11-14 April
-
M. Banikazemi, D. Poff, and B. Abali, "Storage-based intrusion detection for storage area networks (SANs)," presented at Proceedings. 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies, 2005., 11-14 April 2005.
-
(2005)
Proceedings. 22nd IEEE / 13th NASA Goddard Conference on Mass Storage Systems and Technologies
-
-
Banikazemi, M.1
Poff, D.2
Abali, B.3
-
63
-
-
27144437024
-
On the Feasibility of Intrusion Detection Inside Workstation Disks,
-
CMU-PDL-03-106, Carnegie Mellon University
-
J. L. Griffin, A. G. Pennington, J. S. Bucy, D. Choundappan, N. Muralidharan, and G. R. Ganger, "On the Feasibility of Intrusion Detection Inside Workstation Disks," presented at Technical Report CMU-PDL-03-106, Carnegie Mellon University, 2003.
-
(2003)
presented at Technical Report
-
-
Griffin, J.L.1
Pennington, A.G.2
Bucy, J.S.3
Choundappan, D.4
Muralidharan, N.5
Ganger, G.R.6
-
66
-
-
84880174811
-
Detecting intrusions using system calls: Alternative data models
-
presented at
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: alternative data models," presented at Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 05/09/1999-05/12/1999.
-
Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 05/09/1999-05/12/1999
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
67
-
-
84946410215
-
Detecting insider threats by monitoring system call activity
-
presented at, 18-20 June
-
N. Nguyen, P. Reiher, and G. H. Kuenning, "Detecting insider threats by monitoring system call activity," presented at IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, 18-20 June 2003.
-
(2003)
IEEE Systems, Man and Cybernetics Society Information Assurance Workshop
-
-
Nguyen, N.1
Reiher, P.2
Kuenning, G.H.3
-
68
-
-
0034593307
-
Characterizing the Behavior of a Program Using Multiple-Length N-grams
-
presented at, Cork, Ireland, Sept. 19-21
-
C. Marceau, "Characterizing the Behavior of a Program Using Multiple-Length N-grams," presented at Proceedings of the New Security Paradigms Workshop 2000, Cork, Ireland, Sept. 19-21, 2000.
-
(2000)
Proceedings of the New Security Paradigms Workshop
-
-
Marceau, C.1
-
70
-
-
85042797742
-
Learning Program Behavior Profiles for Intrusion Detection
-
presented at, Santa Clara, California, April
-
A. K. Ghosh, A. Schwatzbard, and M. Shatz, "Learning Program Behavior Profiles for Intrusion Detection," presented at in Proceedings 1 st USENIX Workshop on Intrusion Detection and Network Monitoring, Santa Clara, California, April 1999.
-
(1999)
in Proceedings 1 st USENIX Workshop on Intrusion Detection and Network Monitoring
-
-
Ghosh, A.K.1
Schwatzbard, A.2
Shatz, M.3
-
72
-
-
47849096882
-
-
DARPA, Intrusion Detection Evaluation, presented at MIT Lincoln Laboratory, Available at: http://www.II.mit.edu/ist/ideval, 1998.
-
DARPA, "Intrusion Detection Evaluation," presented at MIT Lincoln Laboratory, Available at: http://www.II.mit.edu/ist/ideval, 1998.
-
-
-
-
73
-
-
0013114810
-
Mining in a Data-Flow Environment: Experience in Network Intrusion Detection
-
presented at, San Diego, CA
-
W. Lee, S. Stolfo, and K. Mok, "Mining in a Data-Flow Environment: Experience in Network Intrusion Detection," presented at In Proceedings of the 5th ACM SIGKDD, San Diego, CA, 1999.
-
(1999)
In Proceedings of the 5th ACM SIGKDD
-
-
Lee, W.1
Stolfo, S.2
Mok, K.3
-
74
-
-
47849092251
-
-
R. V. Yampolskiy, Feature Extraction Methods for Character Recognition, presented at Master's Thesis. Rochester Institute of Technology, Rochester, NY, May 10, 2004.
-
R. V. Yampolskiy, "Feature Extraction Methods for Character Recognition," presented at Master's Thesis. Rochester Institute of Technology, Rochester, NY, May 10, 2004.
-
-
-
-
75
-
-
0038825045
-
Anomaly detection using call stack information
-
presented at
-
H. H. Feng, O. M. Kolesnikov, P. Fogla, W. Lee, and W. Gong, "Anomaly detection using call stack information," presented at In Proceedings of IEEE Symposium on Security and Privacy, 2003.
-
(2003)
In Proceedings of IEEE Symposium on Security and Privacy
-
-
Feng, H.H.1
Kolesnikov, O.M.2
Fogla, P.3
Lee, W.4
Gong, W.5
|