메뉴 건너뛰기




Volumn 176 AISC, Issue VOL. 1, 2012, Pages 55-60

An integrated intrusion detection system for credit card fraud detection

Author keywords

Anomaly detection; Hidden Markov Model; Intrusion detection; Misuse detection

Indexed keywords

CRIME; DECISION MAKING; HIDDEN MARKOV MODELS; INFORMATION TECHNOLOGY; INTRUSION DETECTION; SECURITY SYSTEMS;

EID: 84868306754     PISSN: 21945357     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-31513-8_6     Document Type: Conference Paper
Times cited : (5)

References (15)
  • 3
    • 68049121093 scopus 로고    scopus 로고
    • Anomaly detection: A survey
    • July doi:10.1145/1541880.1541882
    • Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3) (July 2009), doi:10.1145/1541880.1541882
    • (2009) ACM Comput. Surv. , vol.41 , Issue.3
    • Chandola, V.1    Banerjee, A.2    Kumar, V.3
  • 4
    • 0024610919 scopus 로고
    • A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition
    • Rabiner, L.R.: A Tutorial on Hidden Markov Models and Selected Applications in Speech Recognition. Proc. IEEE 77(2), 257-286 (1989)
    • (1989) Proc. IEEE , vol.77 , Issue.2 , pp. 257-286
    • Rabiner, L.R.1
  • 9
    • 35048885009 scopus 로고    scopus 로고
    • Anomalous Payload-Based Network Intrusion Detection
    • Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. Springer, Heidelberg
    • Wang, K., Stolfo, S.J.: Anomalous Payload-Based Network Intrusion Detection. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 203-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3224 , pp. 203-222
    • Wang, K.1    Stolfo, S.J.2
  • 14
    • 84890861404 scopus 로고    scopus 로고
    • A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls
    • Hoang, X.D., Hu, J., Bertok, P.: A Multi-layer Model for Anomaly Intrusion Detection Using Program Sequences of System Calls. In: Proc. 11th IEEE Int'l Conf. Networks, pp. 531-536 (2003)
    • (2003) Proc. 11th IEEE Int'l Conf. Networks , pp. 531-536
    • Hoang, X.D.1    Hu, J.2    Bertok, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.