-
2
-
-
0035879674
-
Intrusion detection through learning behavior model
-
DOI 10.1016/S0140-3664(00)00364-9, PII S0140366400003649
-
Balajinath, B., Raghavan, S.V.: Intrusion detection through learning behavior model. Computer Communications 24(12), 1202-1212 (2001) (Pubitemid 32610612)
-
(2001)
Computer Communications
, vol.24
, Issue.12
, pp. 1202-1212
-
-
Balajinath, B.1
Raghavan, S.V.2
-
3
-
-
12744252161
-
Identity verification through dynamic keystroke analysis
-
Bergadano, F., Gunetti, D., Picardi, C.: Identity verification through dynamic keystroke analysis. Intelligent Data Analysis 7(5), 469-496 (2003)
-
(2003)
Intelligent Data Analysis
, vol.7
, Issue.5
, pp. 469-496
-
-
Bergadano, F.1
Gunetti, D.2
Picardi, C.3
-
6
-
-
0029716418
-
A sense of self for Unix processes
-
IEEE Computer Society, Washington
-
Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for Unix processes. In: Proc. 1996 IEEE Symposium on Security and Privacy, pp. 120-128. IEEE Computer Society, Washington (1996)
-
(1996)
Proc. 1996 IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
7
-
-
77952384694
-
Principled reasoning and practical applications of alert fusion in intrusion detection systems
-
ACM, New York
-
Gu, G., Cardenas, A.A., Lee, K.: Principled reasoning and practical applications of alert fusion in intrusion detection systems. In: Proc. ASIACCS '08, pp. 136-147. ACM, New York (2008)
-
(2008)
Proc. ASIACCS '08
, pp. 136-147
-
-
Gu, G.1
Cardenas, A.A.2
Lee, K.3
-
8
-
-
84957621815
-
Intrusion Detection through Behavioral Data
-
Hand, D.J., Kok, J.N., R. Berthold, M. (eds.) IDA 1999. Springer, Heidelberg
-
Gunetti, D., Ruffo, G.: Intrusion Detection through Behavioral Data. In: Hand, D.J., Kok, J.N., R. Berthold, M. (eds.) IDA 1999. LNCS, vol. 1642, pp. 383-394. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1642
, pp. 383-394
-
-
Gunetti, D.1
Ruffo, G.2
-
9
-
-
70349791914
-
Creating User Profiles from a Command- Line Interface: A Statistical Approach
-
Houben, G.-J., McCalla, G., Pianesi, F., Zancanaro, M. (eds.) UMAP 2009. Springer, Heidelberg
-
Iglesias, J.A., Ledezma, A., Sanchis, A.: Creating User Profiles From a Command- Line Interface: A Statistical Approach. In: Houben, G.-J., McCalla, G., Pianesi, F., Zancanaro, M. (eds.) UMAP 2009. LNCS, vol. 5535, pp. 90-101. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5535
, pp. 90-101
-
-
Iglesias, J.A.1
Ledezma, A.2
Sanchis, A.3
-
12
-
-
39049118332
-
An Autonomic Intrusion Detection System Based on Behavioral Network Engineering
-
IEEE Press, Washington
-
Mazzariello, C., Oliviero, F.: An Autonomic Intrusion Detection System Based on Behavioral Network Engineering. In: Proc. INFOCOM 2006, pp. 1-2. IEEE Press, Washington (2006)
-
(2006)
Proc. INFOCOM 2006
, pp. 1-2
-
-
Mazzariello, C.1
Oliviero, F.2
-
14
-
-
12244298487
-
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
-
ACM, New York
-
Shavlik, J., Shavlik, M.: Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage. In: Proc. 10th ACM SIGKDD, pp. 276-285. ACM, New York (2004)
-
(2004)
Proc. 10th ACM SIGKDD
, pp. 276-285
-
-
Shavlik, J.1
Shavlik, M.2
-
15
-
-
0024122965
-
Haystack: An intrusion detection system
-
IEEE Press, Washington
-
Smaha, S.E.: Haystack: an intrusion detection system. In: 4th ACSAC, pp. 37-44. IEEE Press, Washington (1988)
-
(1988)
4th ACSAC
, pp. 37-44
-
-
Smaha, S.E.1
-
16
-
-
0029531733
-
The application of neural networks to UNIX computer security
-
IEEE Press, Washington
-
Tan, K.: The application of neural networks to UNIX computer security. In: IEEE International Conference on Neural Networks, Proc., vol. 1, pp. 476-481. IEEE Press, Washington (1995)
-
(1995)
IEEE International Conference on Neural Networks, Proc.
, vol.1
, pp. 476-481
-
-
Tan, K.1
-
17
-
-
69949085708
-
Automated stress detection using keystroke and linguistic features: An exploratory study
-
Vizer, L.M., Zhou, L., Sears, A.: Automated stress detection using keystroke and linguistic features: An exploratory study. IJHCS 67(10), 870-886 (2009)
-
(2009)
IJHCS
, vol.67
, Issue.10
, pp. 870-886
-
-
Vizer, L.M.1
Zhou, L.2
Sears, A.3
|