메뉴 건너뛰기




Volumn 1485, Issue , 1998, Pages 1-15

Fixed vs. Variable-length patterns for detecting suspicious process behavior

Author keywords

[No Author keywords available]

Indexed keywords

INTRUSION DETECTION; SECURITY OF DATA;

EID: 84958752009     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0055852     Document Type: Conference Paper
Times cited : (21)

References (10)
  • 5
    • 0031233430 scopus 로고    scopus 로고
    • Intrusion Detection via System Call Traces
    • Kosoresow, A.P., Hofmeyr, S.A.: Intrusion Detection via System Call Traces. IEEE Software 14(5) (1997) 35-42.
    • (1997) IEEE Software , vol.14 , Issue.5 , pp. 35-42
    • Kosoresow, A.P.1    Hofmeyr, S.A.2
  • 8
    • 0024984441 scopus 로고
    • Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns
    • IEEE Computer Society Press, Los Alamitos, CA
    • Teng, H.S., Chen, K., Lu, S. C-Y: Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns. In: Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society Press, Los Alamitos, CA (1990) 278-284.
    • (1990) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 278-284
    • Teng, H.S.1    Chen, K.2    Lu, S.C.3
  • 9
    • 2542563730 scopus 로고    scopus 로고
    • A Workbench for Intrusion Detection Systems
    • IBM Research Division, Zurich Research Laboratory, 8803 Rfischlikon, Switzerland
    • Debar, H., Dacier, M., Wespi, A., Lampart, S.: A Workbench for Intrusion Detection Systems. IBM Research Report RZ 2998, IBM Research Division, Zurich Research Laboratory, 8803 Rfischlikon, Switzerland (1998).
    • (1998) IBM Research Report RZ 2998
    • Debar, H.1    Dacier, M.2    Wespi, A.3    Lampart, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.