메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Intruders pattern identification

Author keywords

[No Author keywords available]

Indexed keywords

CLASSIFICATION (OF INFORMATION);

EID: 77957944036     PISSN: 10514651     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icpr.2008.4761050     Document Type: Conference Paper
Times cited : (3)

References (11)
  • 1
    • 84928016636 scopus 로고    scopus 로고
    • The base-rate fallacy and the difficulty of intrusion detection
    • S. Axelsson. The base-rate fallacy and the difficulty of intrusion detection. ACM Transactions on Information and System Security, 3(3): 186-205, 2000.
    • (2000) ACM Transactions on Information and System Security , vol.3 , Issue.3 , pp. 186-205
    • Axelsson, S.1
  • 3
    • 37249080697 scopus 로고    scopus 로고
    • Combining one class fuzzy knn's
    • Camogli, Italy, July 7-10, 2007, Proceedings, volume 4578 of Lecture Notes in Computer Science, Springer
    • V. D. Gesù and G. L. Bosco. Combining one class fuzzy knn's. In WILT 2007, Camogli, Italy, July 7-10, 2007, Proceedings, volume 4578 of Lecture Notes in Computer Science, pages 152-160. Springer, 2007.
    • (2007) WILT 2007 , pp. 152-160
    • Gesù, V.D.1    Bosco, G.L.2
  • 4
    • 33745768403 scopus 로고    scopus 로고
    • New similarity rules for mining data
    • Vietri sul Mare, Salerno, Italy, June 8-11, 2005, Proceedings, volume 3931 of Lecture Notes in Computer Science, Springer
    • V. D. Gesú and J. Friedman. New similarity rules for mining data. In WIRN/NAIS 2005, Vietri sul Mare, Salerno, Italy, June 8-11, 2005, Proceedings, volume 3931 of Lecture Notes in Computer Science, pages 179-187. Springer, 2006.
    • (2006) WIRN/NAIS 2005 , pp. 179-187
    • Gesú, V.D.1    Friedman, J.2
  • 5
    • 0027609384 scopus 로고
    • A survey of intrusion-detection techniques
    • T. Lunt. A survey of intrusion-detection techniques. Computers & Security, 12(4):405-418, 1993.
    • (1993) Computers & Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.1
  • 6
    • 0023866666 scopus 로고
    • A prototype real-time intrusion-detection expert system
    • Oakland, CA, USA, Apr 18-21, 1998, Proceedings, IEEE Computer Society Press
    • T. Lunt and R. Jagannathan. A prototype real-time intrusion-detection expert system. In IEEE Symposium on Security and Privacy, Oakland, CA, USA, Apr 18-21, 1998, Proceedings, pages 59-66. IEEE Computer Society Press, 1988.
    • (1988) IEEE Symposium on Security and Privacy , pp. 59-66
    • Lunt, T.1    Jagannathan, R.2
  • 7
    • 0036931591 scopus 로고    scopus 로고
    • Masquerade detection using truncated command lines
    • Bethesda, Maryland, USA, June 23-26, Proceedings, IEEE Computer Society Press, 2002
    • R. Maxion and T. Townsend. Masquerade detection using truncated command lines. In DSN-2002, Bethesda, Maryland, USA, June 23-26, 2002, Proceedings, pages 219-228. IEEE Computer Society Press, 2002.
    • (2002) DSN-2002 , pp. 219-228
    • Maxion, R.1    Townsend, T.2
  • 11
    • 36048968577 scopus 로고    scopus 로고
    • One-class training for masquerade detection
    • Melbourne, Florida, USA, November 19-22, Proceedings, 2003
    • K. Wang and S. Stolfo. One-class training for masquerade detection. In DMSEC'03, Melbourne, Florida, USA, November 19-22, 2003, Proceedings, pages 1019, 2003.
    • (2003) DMSEC'03 , pp. 1019
    • Wang, K.1    Stolfo, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.