메뉴 건너뛰기




Volumn , Issue , 2010, Pages 261-265

A method to evaluate Web Services Anomaly Detection using Hidden Markov Models

Author keywords

Anomaly detection; Hidden Markov models; Web services security

Indexed keywords

ANOMALY DETECTION; INTRUSION DETECTION SYSTEMS; SECURITY CHALLENGES; SECURITY STANDARDS; WEB SERVICES SECURITY; WEB SYSTEM;

EID: 79953898229     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCAIE.2010.5735086     Document Type: Conference Paper
Times cited : (11)

References (14)
  • 1
    • 79953848024 scopus 로고    scopus 로고
    • A distributed intrusion detection system for web services by anomaly and misuse detection approaches
    • University of Isfahan, Isfahan, Iran, Oct. 7-8 (in Persian) 2009
    • M.S.A. Najjar and M. Abdollahi Azgomi, "A Distributed Intrusion Detection System for Web Services by Anomaly and Misuse Detection Approaches, " Proc. of the 6th International ISC Conference on Information Security and Cryptology (ISCISC'09), University of Isfahan, Isfahan, Iran, Oct. 7-8 (2009) (in Persian) 2009.
    • (2009) Proc. of the 6th International ISC Conference on Information Security and Cryptology (ISCISC'09)
    • Najjar, M.S.A.1    Azgomi, M.A.2
  • 2
    • 57849130705 scopus 로고    scopus 로고
    • Anomaly-based network intrusion detection: Techniques, system and challenges
    • P.G-Teodoro, J.D-Verdejo, G.M-Fernandez, and E.Vazquez, "Anomaly-based network Intrusion Detection: Techniques, system and challenges, " Comp.r & Sec., pp. 18-28, 2009.
    • (2009) Comp.r & Sec. , pp. 18-28
    • G-Teodoro, P.1    D-Verdejo, J.2    M-Fernandez, G.3    Vazquez, E.4
  • 3
    • 79953876540 scopus 로고    scopus 로고
    • A new technique for anomaly detection in web services using hidden markov models
    • Niroo Research Institute, Tehran, Iran, Feb. 20-22 (in Persian
    • M.S.A. Najjar and M. Abdollahi Azgomi, "A New Technique for Anomaly Detection in Web Services using Hidden Markov Models, " Proc. of the 15th Annual National CSI Computer Conference (CSICC'10), Niroo Research Institute, Tehran, Iran, Feb. 20-22 (2010) (in Persian).
    • (2010) Proc. of the 15th Annual National CSI Computer Conference (CSICC'10)
    • Najjar, M.S.A.1    Azgomi, M.A.2
  • 5
    • 1542494731 scopus 로고    scopus 로고
    • Security, URL
    • Web Services Security, URL:http://www.docs.oasis-open.org/wss.
    • Web Services
  • 9
    • 0024610919 scopus 로고
    • A tutorial on hidden markov models and selected applications in speech recognition
    • February
    • L. R. Rabiner, "A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition", Proc. IEEE, vol. 77, no. 2, 587-286, February, 1989.
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 286-587
    • Rabiner, L.R.1
  • 12
    • 79953896355 scopus 로고    scopus 로고
    • NET, URL
    • Using SOAP Extensions in ASP.NET, URL: http://msdn.microsoft.com/fa-ir/ magazine/cc164007(en-us).aspx.
    • Using SOAP Extensions in ASP
  • 13
    • 0002629270 scopus 로고
    • Maximum likelihood from incomplete data via the EM algorithm
    • A.P. Dempster, N.M. Laird, and D.B. Robin, "Maximum likelihood from incomplete data via the EM algorithm". J. Roy. Stat. Soc, vol.39, no. 1, pp. 1-38, 1977.
    • (1977) J. Roy. Stat. Soc. , vol.39 , Issue.1 , pp. 1-38
    • Dempster, A.P.1    Laird, N.M.2    Robin, D.B.3
  • 14
    • 52549127071 scopus 로고    scopus 로고
    • ROC Curve, lift chart and calibration plot
    • Miha Vuk, Toma z Curk, "ROC Curve, Lift Chart and Calibration Plot", Metodolo ški zvezki, Vol. 3, No. 1, pp. 89-108, 2006.
    • (2006) Metodolo Ški Zvezki , vol.3 , Issue.1 , pp. 89-108
    • Vuk, M.1    Curk, T.Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.