메뉴 건너뛰기




Volumn , Issue , 2003, Pages 45-52

Detecting insider threats by monitoring system call activity

Author keywords

Companies; Computer science; Computer security; Computerized monitoring; Data mining; File systems; Intrusion detection; System testing; Telecommunication traffic; Watches

Indexed keywords

COMPUTER SCIENCE; CYBERNETICS; DATA MINING; FILE ORGANIZATION; INDUSTRY; INTRUSION DETECTION; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC; WATCHES;

EID: 84946410215     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SMCSIA.2003.1232400     Document Type: Conference Paper
Times cited : (92)

References (12)
  • 1
    • 0003516333 scopus 로고    scopus 로고
    • Technical Report. Department of Computer Engineering, Chalmers University of Technology, Sweden, March
    • S. Axelsson. Intrusion Detection Systems: A Survey and Taxonomy. Technical Report. Department of Computer Engineering, Chalmers University of Technology, Sweden, March 2000.
    • (2000) Intrusion Detection Systems: A Survey and Taxonomy
    • Axelsson, S.1
  • 3
    • 0030677523 scopus 로고    scopus 로고
    • Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach
    • Oakland, CA, USA, May
    • C. Ko, M. Ruschitzka, and K. Levitt. Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. In Proceedings of the 1997 IEEE Symposium on Security and Privacy, Vol. ix, pp. 175-187, Oakland, CA, USA, May 1997.
    • (1997) Proceedings of the 1997 IEEE Symposium on Security and Privacy , vol.9 , pp. 175-187
    • Ko, C.1    Ruschitzka, M.2    Levitt, K.3
  • 7
    • 0034455983 scopus 로고    scopus 로고
    • Adaptive Intrusion Detection: A Data Mining Approach
    • W. Lee, S. J. Stolfo. Adaptive Intrusion Detection: A Data Mining Approach. In Artificial Intelligence Review, 14:533-567, 2001
    • (2001) Artificial Intelligence Review , vol.14 , pp. 533-567
    • Lee, W.1    Stolfo, S.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.