-
1
-
-
0029716418
-
A sense of self for Unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff, "A sense of self for Unix processes," in Proc. of the 1996 IEEE Symp. on Research in Security and Privacy, pp. 120-128, 1996.
-
(1996)
Proc. of the 1996 IEEE Symp. on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
2
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: alternative data models," in Proc. of the IEEE Computer Society Symp. on Research in Security and Privacy, pp. 133-45, 1999.
-
(1999)
Proc. of the IEEE Computer Society Symp. on Research in Security and Privacy
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
3
-
-
0024610919
-
A tutorial on HMM and selected applications in speech recognition
-
L. Rabiner, "A tutorial on HMM and selected applications in speech recognition," Proc. of the IEEE, vol. 77, no. 2, pp. 257-286, 1989.
-
(1989)
Proc. of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.1
-
4
-
-
0036928078
-
HMMs based on anomaly intrusion detection method
-
B. Gao, H.-Y. Ma, and Y.-H. Yang, "HMMs based on anomaly intrusion detection method," Proc. of 2002 Int'l Conf. on Machine Learning and Cybernetics, vol. 1, pp. 381-385, 2002.
-
(2002)
Proc. of 2002 Int'l Conf. on Machine Learning and Cybernetics
, vol.1
, pp. 381-385
-
-
Gao, B.1
Ma, H.-Y.2
Yang, Y.-H.3
-
5
-
-
84890861404
-
A multi-layer model for anomaly intrusion detection
-
X. D. Hoang, J. Hu, and P. Bertok, "A multi-layer model for anomaly intrusion detection," in IEEE Int'l Conf. on Networks, vol. 1, pp. 531-536, 2003.
-
(2003)
IEEE Int'l Conf. on Networks
, vol.1
, pp. 531-536
-
-
Hoang, X.D.1
Hu, J.2
Bertok, P.3
-
6
-
-
21644438395
-
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
-
X. Hoang and J. Hu, "An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls," in IEEE Int'l Conf. on Networks, vol. 2, pp. 470-474, 2004.
-
(2004)
IEEE Int'l Conf. on Networks
, vol.2
, pp. 470-474
-
-
Hoang, X.1
Hu, J.2
-
7
-
-
6344239144
-
Modeling program behaviors by HMMs for intrusion detection
-
W. Wang, X.-H. Guan, and X.-L. Zhang, "Modeling program behaviors by HMMs for intrusion detection," Proc. of 2004 Int'l Conf. on Machine Learning and Cybernetics, vol. 5, pp. 2830-2835, 2004.
-
(2004)
Proc. of 2004 Int'l Conf. on Machine Learning and Cybernetics
, vol.5
, pp. 2830-2835
-
-
Wang, W.1
Guan, X.-H.2
Zhang, X.-L.3
-
8
-
-
0007210317
-
Realisable classifiers: Improving operating performance on variable cost problems
-
University of Southampton, UK, pp, Sep
-
M. J. J. Scott, M. Niranjan, and R. W. Prager, "Realisable classifiers: Improving operating performance on variable cost problems," in Proc. of the 9th British Machine Vision Conference, vol. 1, (University of Southampton, UK), pp. 304-315, Sep 1998.
-
(1998)
Proc. of the 9th British Machine Vision Conference
, vol.1
, pp. 304-315
-
-
Scott, M.J.J.1
Niranjan, M.2
Prager, R.W.3
-
9
-
-
70449497481
-
-
J. Choy and S.-B. Cho, Intrusion detection by combining multiple HMMs, PRICAI 2000 Topics in Artificial Intelligence, 1886, pp. 829-829, 2000.
-
J. Choy and S.-B. Cho, "Intrusion detection by combining multiple HMMs," PRICAI 2000 Topics in Artificial Intelligence, vol. 1886, pp. 829-829, 2000.
-
-
-
-
10
-
-
33646023117
-
An introduction to ROC analysis
-
T. Fawcett, "An introduction to ROC analysis," Pattern Recogn. Lett., vol. 27, no. 8, pp. 861-874, 2006.
-
(2006)
Pattern Recogn. Lett
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
11
-
-
0000353178
-
A maximization technique occuring in the statistical analysis of probabilistic functions of Markov chains
-
L. E. Baum, G. S. Petrie, and N. Weiss, "A maximization technique occuring in the statistical analysis of probabilistic functions of Markov chains," Ann. Math. Stat., vol. 41, no. 1, pp. 164-171, 1970.
-
(1970)
Ann. Math. Stat
, vol.41
, Issue.1
, pp. 164-171
-
-
Baum, L.E.1
Petrie, G.S.2
Weiss, N.3
-
12
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D.-Y. Yeung and Y. Ding, "Host-based intrusion detection using dynamic and static behavioral models," Pattern Recognition, vol. 36, no. 1, pp. 229-243, 2003.
-
(2003)
Pattern Recognition
, vol.36
, Issue.1
, pp. 229-243
-
-
Yeung, D.-Y.1
Ding, Y.2
-
15
-
-
0036085540
-
Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
-
K. Tan and R. Maxion, ""Why 6?" Defining the operational limits of stide, an anomaly-based intrusion detector," in IEEE Symp. on Security and Privacy, pp. 188-201, 2002.
-
(2002)
IEEE Symp. on Security and Privacy
, pp. 188-201
-
-
Tan, K.1
Maxion, R.2
-
16
-
-
0037252253
-
Determining the operational limits of an anomaly-based intrusion detector
-
K. Tan and R. Maxion, "Determining the operational limits of an anomaly-based intrusion detector," IEEE J. on Selected Areas in Communications, vol. 21, no. 1, pp. 96-110, 2003.
-
(2003)
IEEE J. on Selected Areas in Communications
, vol.21
, Issue.1
, pp. 96-110
-
-
Tan, K.1
Maxion, R.2
|