Classification of anomalous traces of privileged and parallel programs by neural networks
暂无分享,去创建一个
[1] Andrew P. Bradley,et al. The use of the area under the ROC curve in the evaluation of machine learning algorithms , 1997, Pattern Recognit..
[2] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[3] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[4] William W. Cohen. Fast Effective Rule Induction , 1995, ICML.
[5] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[6] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[7] Stephanie Forrest,et al. Automated response using system-call delays , 2000 .
[8] Zhen Liu,et al. A comparison of input representations in neural networks: a case study in intrusion detection , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[9] Simon Haykin,et al. Neural Networks: A Comprehensive Foundation , 1998 .
[10] David A. Wagner,et al. Intrusion detection via static analysis , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[11] Daniel Pierre Bovet,et al. Understanding the Linux Kernel , 2000 .
[12] Jorma Laaksonen,et al. LVQ_PAK: The Learning Vector Quantization Program Package , 1996 .