-
2
-
-
65249152919
-
Taxonomy and Framework for Integrating Dependability and Security
-
Y. Qian et al, Eds, Elsevier
-
J. Hu, P. Bertok, and Z. Tari, "Taxonomy and Framework for Integrating Dependability and Security," in Information Assurance: Dependability and Security in Networked Systems, Y. Qian et al., Eds., Elsevier, 2008, pp. 149-70.
-
(2008)
Information Assurance: Dependability and Security in Networked Systems
, pp. 149-170
-
-
Hu, J.1
Bertok, P.2
Tari, Z.3
-
3
-
-
21644438395
-
An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls
-
Singapore, Nov. 16-19
-
X. D. Hoang and J. Hu, "An Efficient Hidden Markov Model Training Scheme for Anomaly Intrusion Detection of Server Applications Based on System Calls," IEEE Int'l. Conf. Net. '04, Singapore, Nov. 16-19, 2004, vol. 2, pp. 470-74.
-
(2004)
IEEE Int'l. Conf. Net. '04
, vol.2
, pp. 470-474
-
-
Hoang, X.D.1
Hu, J.2
-
4
-
-
84890861404
-
A Multi-Layer Model for Anomaly Intrusion Detection using Program Sequences of System Calls
-
Sydney, Australia, Sept. 28-Oct. 1
-
X. D. Hoang, J. Hu, and P. Bertok, "A Multi-Layer Model for Anomaly Intrusion Detection using Program Sequences of System Calls," Proc. 11th IEEE Int'l. Conf. Net., Sydney, Australia, Sept. 28-Oct. 1, 2003, pp. 531-36.
-
(2003)
Proc. 11th IEEE Int'l. Conf. Net
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
5
-
-
34250315640
-
An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends
-
Aug
-
A. Patcha and J. Park, "An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends," Comp. Networks vol. 51, Aug. 2007, pp. 3448-70.
-
(2007)
Comp. Networks
, vol.51
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.2
-
6
-
-
65249165338
-
-
Aug. 16, 2005, retrieved Oct. 26, 2005;
-
Sophos, "Breaking News: Worm Attacks CNN, ABC, Financial Times, and The New York Times," Aug. 16, 2005, retrieved Oct. 26, 2005; http://www.sophos.com/virusinfo/articles/breakingnews.html
-
Breaking News: Worm Attacks CNN, ABC, Financial Times, and The New York Times
-
-
-
7
-
-
84885774862
-
A Framework for Constructing Features and Models for Intrusion Detection Systems
-
Nov
-
W. Lee and S. I. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems," ACM Trans. Info. Sys. Sec. vol. 3, no. 4, Nov. 2000, pp. 227-61.
-
(2000)
ACM Trans. Info. Sys. Sec
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.I.2
-
8
-
-
0032313923
-
Intrusion Detection Using Sequences of System Calls
-
S. Forrest, S. A. Hofmeyr, and A. Somdyaji, "Intrusion Detection Using Sequences of System Calls." J. Comp. Sec., vol. 6, 1998, pp. 151-80.
-
(1998)
J. Comp. Sec
, vol.6
, pp. 151-180
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somdyaji, A.3
-
9
-
-
0032639421
-
Detecting Intrusions Using System Calls: Alternative Data Models
-
Berkeley, CA, May
-
C. Warrender, S. Forrest, and B. Perlmutter, "Detecting Intrusions Using System Calls: Alternative Data Models," Proc. 1999 IEEE Comp. Soc. Symp. Research Sec. Privacy, Berkeley, CA, May 1999, pp. 133-45.
-
(1999)
Proc. 1999 IEEE Comp. Soc. Symp. Research Sec. Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Perlmutter, B.3
-
10
-
-
34249319577
-
Intrusion Detection Based on Data Mining
-
Angers, France, Apr. 23-26
-
D. Hoang, J. Hu, and P. Bertok, "Intrusion Detection Based on Data Mining," 5th Int'l. Conf. Enterprise Info. Sys., Angers, France, vol. 3, Apr. 23-26, 2003, pp. 341-46.
-
(2003)
5th Int'l. Conf. Enterprise Info. Sys
, vol.3
, pp. 341-346
-
-
Hoang, D.1
Hu, J.2
Bertok, P.3
-
11
-
-
65249088930
-
Efficient Training for HMM-based Anomaly Detection System Using Correlation Method,
-
Honors Thesis, RMIT University
-
D. Qiu, "Efficient Training for HMM-based Anomaly Detection System Using Correlation Method," Honors Thesis, RMIT University, 2008.
-
(2008)
-
-
Qiu, D.1
-
12
-
-
0024610919
-
A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
-
L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition," Proc. IEEE, vol. 77, 1989, pp 257-86.
-
(1989)
Proc. IEEE
, vol.77
, pp. 257-286
-
-
Rabiner, L.R.1
-
13
-
-
33751579019
-
Improved Estimation of Hidden Markov Model Parameters from Multiple Observation Sequences
-
R. I. A. Davis, B. C. Lovell, and T. Caelli, "Improved Estimation of Hidden Markov Model Parameters from Multiple Observation Sequences" Proc. 16th Int'l. Conf. Pattern Recognition, vol. 2, 2002, pp. 168-71.
-
(2002)
Proc. 16th Int'l. Conf. Pattern Recognition
, vol.2
, pp. 168-171
-
-
Davis, R.I.A.1
Lovell, B.C.2
Caelli, T.3
-
14
-
-
0032205799
-
Efficient Training Algorithm for HMM's Using Incremental Estimation
-
Y. Gotoh, M. M. Hochberg, and H. F. Silverman," Efficient Training Algorithm for HMM's Using Incremental Estimation," Speech Audio Processing, vol. 6, no. 6, 1998, pp. 539-48.
-
(1998)
Speech Audio Processing
, vol.6
, Issue.6
, pp. 539-548
-
-
Gotoh, Y.1
Hochberg, M.M.2
Silverman, H.F.3
-
15
-
-
65249117593
-
-
University of New Mexico's Computer Systems Project, Oct. 24
-
University of New Mexico's Computer Systems Project, Oct. 24, 2008; http://www.cs.unm.edu/immsec/systemcalls.htm
-
(2008)
-
-
|