메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 982-987

User profiling for computer security

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION REVOLUTION; INTRUSION DETECTION SYSTEMS (IDS); USER PROFILING;

EID: 8744287319     PISSN: 07431619     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (20)
  • 1
    • 0037986866 scopus 로고
    • Detecting unusual program behavior using the statistical components of the Next-Generation Intrusion Detection Expert System (NIDES)
    • SRI-CSL-95-06, May
    • D. Anderson, T.G. Lunt, H. Javitz, A. Tamaru, and A. Valdes, "Detecting Unusual Program Behavior using the Statistical Components of the Next-Generation Intrusion Detection Expert System (NIDES)," Computer Science Laboratory, SRI-CSL-95-06, May 1995.
    • (1995) Computer Science Laboratory
    • Anderson, D.1    Lunt, T.G.2    Javitz, H.3    Tamaru, A.4    Valdes, A.5
  • 4
    • 0023294428 scopus 로고
    • An intrusion detection model
    • D. Denning, "An Intrusion Detection Model," IEEE Trans. on Software Engineering, Vol. 13, No. 2, pp. 222-232, 1987.
    • (1987) IEEE Trans. on Software Engineering , vol.13 , Issue.2 , pp. 222-232
    • Denning, D.1
  • 6
    • 0013420742 scopus 로고
    • Using UNIX: Collected traces of 168 users
    • Dept. of Computer Science, University of Calgary, Calgary, Canada
    • S. Greenberg, "Using UNIX: Collected Traces of 168 Users," Research Report 88-333-45, Dept. of Computer Science, University of Calgary, Calgary, Canada, 1988.
    • (1988) Research Report 88-333-45
    • Greenberg, S.1
  • 9
    • 84885774862 scopus 로고    scopus 로고
    • A framework for constructing features and models for intrusion detection systems
    • W. Lee and S.J. Stolfo, "A Framework for Constructing Features and Models for Intrusion Detection Systems," ACM Trans. on Information and System Security, Vol. 3, No. 4, 2000.
    • (2000) ACM Trans. on Information and System Security , vol.3 , Issue.4
    • Lee, W.1    Stolfo, S.J.2
  • 11
    • 0043037134 scopus 로고    scopus 로고
    • Modeling and simulation for network vulnerability assessment
    • Fort Lee, VA, October 9-11
    • D. Pepyne, W. Gong, and Y. Ho, "Modeling and Simulation for Network Vulnerability Assessment," presented at the 40th U.S. Army Ops. Research Symposium (AORS), Fort Lee, VA, October 9-11, 2001.
    • (2001) 40th U.S. Army Ops. Research Symposium (AORS)
    • Pepyne, D.1    Gong, W.2    Ho, Y.3
  • 14
    • 8744303430 scopus 로고    scopus 로고
    • Learning temporal regularities of user behavior for anomaly detection
    • St. Petersburg, Russia
    • A. Seleznyov, O. Mazhelis, and S. Puuronen, "Learning Temporal Regularities of User Behavior for Anomaly Detection," International Workshop MMM-ACNS, St. Petersburg, Russia, 2001.
    • (2001) International Workshop MMM-ACNS
    • Seleznyov, A.1    Mazhelis, O.2    Puuronen, S.3
  • 17
    • 8744245872 scopus 로고    scopus 로고
    • Stop thieves from stealing you
    • October
    • "Stop Thieves from Stealing You," Consumer Reports, pp. 12-17, October 2003.
    • (2003) Consumer Reports , pp. 12-17
  • 19
    • 8644270792 scopus 로고    scopus 로고
    • Monitoring and early warning for internet worms
    • University of Massachusetts
    • C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and Early Warning for Internet Worms," University of Massachusetts, Elec. and Comp. Eng. Tech. Rpt TR-CSE-03-01, 2003.
    • (2003) Elec. and Comp. Eng. Tech. Rpt , vol.TR-CSE-03-01
    • Zou, C.1    Gao, L.2    Gong, W.3    Towsley, D.4
  • 20
    • 0038349210 scopus 로고    scopus 로고
    • Code red worm propagation modeling and analysis
    • Washington D.C., November
    • C. Zou, W. Gong, and D. Towsley, "Code Red Worm Propagation Modeling and Analysis," Proceedings of CCS'02, Washington D.C., November, 2002.
    • (2002) Proceedings of CCS'02
    • Zou, C.1    Gong, W.2    Towsley, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.