Journal of Guangdong University of Technology ›› 2005, Vol. 22 ›› Issue (3): 48-52.
• Comprehensive Studies • Previous Articles Next Articles
[1] Wenke Lee,Salvatore J Stolfo.Learning patterns from unix process execution traces for intrusion detection. In AAAI Workshop on AI Approaches to Fraud Detection and Risk Management[C], AAAI Press . 1997[2] William W,Cohen.Fast effective rule induction. In Machine Learning: Proceeding of the Twelfth International Conference . 1995[3] Warrender C,Forrest S,Pearlmutter B.Detecting intrusion using system calls: alternative data modles. Proceedings of 1999 IEEE Symposium on Computer Security and Privacy . 1999[4] Hofmeyr S A,Foreest S,Somayaji A.Intrusion detection using sequences of system Calls. Journal of Computer Security . 1998[5] Sung-Bae Cho,Hyuk-Jang Park.Efficient anomaly detection by modeling privilege flows using hidden Markov model. Computer & Science . 2003[6] Foreest S,Hofmeyr S A,Somayaji A.A sense of self for unix process. Proceedings of 1996 IEEE Symposium on Computer Security and Privacy . 1996[7] Ghosh A K,Schwartzbard A,Shatz A M.Learning program behavior profiles for intrusion detection. Proceedings of 1st USENIX Workshop on Intrusion Detection and Network Monitoring . 1999 |
No related articles found! |
|