A Host-Based Intrusion Detection System
暂无分享,去创建一个
Sateesh K. Peddoju | Prachi Deshpande | Subhash Chander Sharma | S. K. Peddoju | S. Sharma | Prachi Deshpande
[1] Sateesh K. Peddoju,et al. DEPLOYING A PRIVATE CLOUD? GO THROUGH THE ERRORS FIRST , 2013 .
[2] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[3] Tao Chen,et al. A new data normalization method for unsupervised anomaly intrusion detection , 2009, Journal of Zhejiang University SCIENCE C.
[4] Philip K. Chan,et al. Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .
[5] Dave Cliff,et al. A financial brokerage model for cloud computing , 2011, Journal of Cloud Computing: Advances, Systems and Applications.
[6] Santosh Biswas,et al. An Active Host-Based Intrusion Detection System for ARP-Related Attacks and its Verification , 2013, ArXiv.
[7] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[8] Frank Doelitzscher,et al. An agent based business aware incident detection system for cloud environments , 2012, Journal of Cloud Computing: Advances, Systems and Applications.
[9] Sateesh K. Peddoju,et al. HIDS: A host based intrusion detection system for cloud computing environment , 2014, International Journal of System Assurance Engineering and Management.
[10] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[11] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[12] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[13] V. Rao Vemuri,et al. Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Cosine Metric , 2006 .
[14] Philip K. Chan,et al. Learning Useful System Call Attributes for Anomaly Detection , 2005, FLAIRS Conference.
[15] Terry R. Payne,et al. Experience with Rule Induction and k-Nearest Neighbor Methods for Interface Agents that Learn , 1997, IEEE Trans. Knowl. Data Eng..
[16] L Vokorokos,et al. Host-based intrusion detection system , 2010, 2010 IEEE 14th International Conference on Intelligent Engineering Systems.
[17] Simone A. Ludwig,et al. Immune network algorithm applied to the optimization of composite SaaS in cloud computing , 2015, 2015 IEEE Congress on Evolutionary Computation (CEC).
[18] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[19] Charu C. Aggarwal,et al. A Survey of Text Classification Algorithms , 2012, Mining Text Data.
[20] Marc Dacier,et al. Intrusion Detection Using Variable-Length Audit Trail Patterns , 2000, Recent Advances in Intrusion Detection.
[21] Kyaw Thet Khaing,et al. Important Roles Of Data Mining Techniques For Anomaly Intrusion Detection System , 2013 .