Multi-stage Attack Detection Algorithm Based on Hidden Markov Model
暂无分享,去创建一个
[1] Tadeusz Pietraszek,et al. Data mining and machine learning - Towards reducing false positives in intrusion detection , 2005, Inf. Secur. Tech. Rep..
[2] Stephanie Forrest,et al. Coverage and Generalization in an Artificial Immune System , 2002, GECCO.
[3] Su Jin-shu. Research on Intention Recognition Based on HMM , 2007 .
[4] Steven J. Templeton,et al. A requires/provides model for computer attacks , 2001, NSPW '00.
[5] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[6] Ulf Lindqvist,et al. Detecting computer and network misuse through the production-based expert system toolset (P-BEST) , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[7] Yan Puliu. Network Intrusion Detection System Based on CPN and Mobile Agent , 2003 .
[8] Zhong Anming,et al. Study on the applications of hidden Markov models to computer intrusion detection , 2004, Fifth World Congress on Intelligent Control and Automation (IEEE Cat. No.04EX788).