Case-based reasoning for intrusion detection
暂无分享,去创建一个
Josef Pieprzyk | Reihaneh Safavi-Naini | Mansour Esmaili | Bala Balachandran | J. Pieprzyk | R. Safavi-Naini | M. Esmaili | B. Balachandran
[1] Phillip A. Porras,et al. STAT -- A State Transition Analysis Tool For Intrusion Detection , 1993 .
[2] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[3] Koral Ilgun,et al. USTAT: a real-time intrusion detection system for UNIX , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[4] Gunar E. Liepins,et al. Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[5] Sandeep Kumar,et al. Classification and detection of computer intrusions , 1996 .
[6] Bruce G. Buchanan,et al. The MYCIN Experiments of the Stanford Heuristic Programming Project , 1985 .
[7] Janet L. Kolodner,et al. Case-Based Reasoning , 1989, IJCAI 1989.
[8] Lotfi A. Zadeh,et al. Fuzzy Sets , 1996, Inf. Control..