-
3
-
-
68049121093
-
Anomaly detection: A survey
-
article: 15, July
-
V. Chandola, A. Banerjee, V. Kumar, "Anomaly detection: A survey," ACM Computing Surveys, vol. 41(3), article: 15, July 2009.
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.3
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
4
-
-
0002028280
-
A pattern matching model for misuse intrusion detection
-
Baltimore, MD
-
S. Kumar, and E. H. Spafford, "A pattern matching model for misuse intrusion detection," In Proceedings of the National Computer Security Conference, Baltimore, MD, 1994, pp. 11-21.
-
(1994)
Proceedings of the National Computer Security Conference
, pp. 11-21
-
-
Kumar, S.1
Spafford, E.H.2
-
5
-
-
0023294428
-
An intrusion detection model
-
D. E. Denning, "An Intrusion Detection Model," IEEE Transactions on Software Engineering, SE, vol. 13(2), 1987, pp. 222-232.
-
(1987)
IEEE Transactions on Software Engineering, SE
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
6
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis and implications
-
S. Forrest, P. D'haeseleer, and P. Helam, "An immunological approach to change detection: Algorithms, analysis and implications". In Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society, vol. 110, 1996.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy, IEEE Computer Society
, vol.110
-
-
Forrest, S.1
D'haeseleer, P.2
Helam, P.3
-
8
-
-
84871985541
-
Trace analysis for fault detection for application server
-
edited by S. Hariri, and P. Parashar, CRC Press
-
Guofei Jiang, Haifeng Chen, Cristian Ungureanu and Kenji Yoshihara, "Trace analysis for fault detection for application server", Handbook of Automatic Computing: Concepts, Infrastructures, and Applications, edited by S. Hariri, and P. Parashar, CRC Press, 2007.
-
(2007)
Handbook of Automatic Computing: Concepts, Infrastructures, and Applications
-
-
Jiang, G.1
Chen, H.2
Ungureanu, C.3
Yoshihara, K.4
-
9
-
-
0032639421
-
Detecting intrusions using system calls: Alternate data models
-
C. Warrender, S. Forrest, and B. Pearlmutter, "Detecting intrusions using system calls: Alternate data models," In Proceedings of the IEEE ISRSP. IEEE Computer Society, 1999, pp. 133 - 145.
-
(1999)
Proceedings of the IEEE ISRSP. IEEE Computer Society
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
10
-
-
65249107163
-
A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection
-
J. Hu, Q. Dong, X. Yu, and H. H. Chen, "A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection," IEEE Netw. vol. 23(1), 2009, pp. 42 - 47.
-
(2009)
IEEE Netw.
, vol.23
, Issue.1
, pp. 42-47
-
-
Hu, J.1
Dong, Q.2
Yu, X.3
Chen, H.H.4
-
12
-
-
0029716418
-
A sense of self for unix processes
-
S. Forrest, S. A. Hofmeyr, A. Somayaji. and T. A. Longstaff, "A sense of self for unix processes," In Proceedings of the IEEE ISRSP, 1996, pp. 120 - 128.
-
(1996)
Proceedings of the IEEE ISRSP
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
13
-
-
0009900351
-
Anomaly detection over noisy data using learned probability distributions
-
Morgan Kaufmann Publishers Inc.
-
E. Eskin, "Anomaly detection over noisy data using learned probability distributions," In Proceedings of the 17th International Conference on Machine Learning. Morgan Kaufmann Publishers Inc., 2000, pp. 255-262.
-
(2000)
Proceedings of the 17th International Conference on Machine Learning
, pp. 255-262
-
-
Eskin, E.1
-
16
-
-
34547714108
-
Bayesian learning network approach to cybercrime detection
-
Liverpool, United Kingdom
-
N. Abouzakhar, A. Gani, G. Manson, M. Abutbel, and D. King, "Bayesian learning network approach to cybercrime detection," In Proceedings of the 2003 Post Graduate Networking Conference, Liverpool, United Kingdom, 2003.
-
Proceedings of the 2003 Post Graduate Networking Conference
, vol.2003
-
-
Abouzakhar, N.1
Gani, A.2
Manson, G.3
Abutbel, M.4
King, D.5
-
17
-
-
70349681015
-
Robust anomaly detection using support vector machines
-
Morgan Kaufmann Publishers Inc.
-
W. Hu, Y. Liao, and V. R. Vemuri, "Robust anomaly detection using support vector machines," In Proceedings of the International Conference on Machine Learning. Morgan Kaufmann Publishers Inc., 2003, pp. 282-289.
-
(2003)
Proceedings of the International Conference on Machine Learning.
, pp. 282-289
-
-
Hu, W.1
Liao, Y.2
Vemuri, V.R.3
-
19
-
-
84872003877
-
An intrusion detection approach based on understandable neural network trees
-
Q. Xu, W. Pei, and Q. Zhao, "An intrusion detection approach based on understandable neural network trees," Journal of Electronics, 2007, pp. 574 - 579.
-
(2007)
Journal of Electronics
, pp. 574-579
-
-
Xu, Q.1
Pei, W.2
Zhao, Q.3
-
20
-
-
70449111492
-
Using rough set and support vector machine for network intrusion detection system
-
R. C. Chen, K. F. Cheng, Y. H. Chen, C. F., Hsieh, "Using Rough Set and Support Vector Machine for Network Intrusion Detection System," In proceedings of the First Asian Conference on Intelligent Information and Database Systems, 2009, pp. 465 - 470.
-
(2009)
Proceedings of the First Asian Conference on Intelligent Information and Database Systems
, pp. 465-470
-
-
Chen, R.C.1
Cheng, K.F.2
Chen, Y.H.3
Hsieh, C.F.4
-
22
-
-
85022919385
-
Class-based n-gram models of natural language
-
P. F. Brown, V. J. Della Pietra, P. V. deSouza, J. C. Lai, and R. L. Mercer, "Class-based n-gram models of natural language", Computational Linguistics, vol. 18, pp. 467-479, 1992.
-
(1992)
Computational Linguistics
, vol.18
, pp. 467-479
-
-
Brown, P.F.1
Della Pietra, V.J.2
Desouza, P.V.3
Lai, J.C.4
Mercer, R.L.5
-
24
-
-
51849138775
-
The LTTng tracer: A low impact performance and behavior monitor for GNU/Linux
-
Ottawa, Canada, July 19-22
-
M. Desnoyers, and M. R. Degenais, "The LTTng tracer: A low impact performance and behavior monitor for GNU/Linux," In Proceedings of Ottawa Linux Symposium, Ottawa, Canada, July 19-22, 2006.
-
(2006)
Proceedings of Ottawa Linux Symposium
-
-
Desnoyers, M.1
Degenais, M.R.2
-
27
-
-
0000353178
-
A maximization technique occurring in the statistical analysis of probabilistic functions of markov chains
-
February
-
Leonard E. Baum, Ted Petrie, George Soules and Norman Weiss, "A Maximization Technique Occurring in the Statistical Analysis of Probabilistic Functions of Markov Chains", The Annals of Mathematical Statistics, vol. 41(1), February, 1970, pp. 164 - 171.
-
(1970)
The Annals of Mathematical Statistics
, vol.41
, Issue.1
, pp. 164-171
-
-
Baum, L.E.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
29
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, CA, USA, May 6-8
-
S. Forrest, S. A. Hofmeyr, A. Somayaji and T. A. Longstaff, "A sense of self for Unix processes," In Proceedings of IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 6-8, 1996, pp. 120-128.
-
(1996)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
30
-
-
84882800335
-
Simple, state-based approaches to program-based anomaly detection
-
August
-
C. C. Michael and A. Ghosh, "Simple, state-based approaches to program-based anomaly detection," ACM Transaction on Information and System Security (TIISSEC), vol. 5(3), pp. 203 - 237, August 2002.
-
(2002)
ACM Transaction on Information and System Security (TIISSEC)
, vol.5
, Issue.3
, pp. 203-237
-
-
Michael, C.C.1
Ghosh, A.2
|