|
Volumn , Issue , 2003, Pages 116-121
|
Hidden processes: The implication for intrusion detection
|
Author keywords
Computer architecture; Computer crime; Internet; Intrusion detection; Kernel; Operating systems; Security; Software engineering; Software systems
|
Indexed keywords
COMPUTER ARCHITECTURE;
COMPUTER CRIME;
CYBERNETICS;
INTERNET;
INTRUSION DETECTION;
MERCURY (METAL);
NETWORK ARCHITECTURE;
SOFTWARE ENGINEERING;
TRANSFER FUNCTIONS;
COMPUTING ARCHITECTURE;
INTRUSION DETECTION SYSTEMS;
KERNEL;
NETWORK CONNECTION;
OPERATING SYSTEM FUNCTIONS;
REPORTING FUNCTIONS;
SECURITY;
SOFTWARE SYSTEMS;
COMPUTER OPERATING SYSTEMS;
|
EID: 84946403333
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/SMCSIA.2003.1232409 Document Type: Conference Paper |
Times cited : (22)
|
References (23)
|