Probabilistic Inference Strategy in Distributed Intrusion Detection Systems
暂无分享,去创建一个
Jun Zhang | Bernd J. Krämer | Jianguo Ding | Shihao Xu | Yingcai Bai | Hansheng Chen | B. Krämer | Jianguo Ding | Shihao Xu | Yingcai Bai | Hansheng Chen | Jun Zhang
[1] Wenke Lee,et al. A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems , 1999 .
[2] Makoto Matsumoto,et al. Twisted GFSR generators , 1992, TOMC.
[3] Uri Blumenthal,et al. Classification and computation of dependencies for distributed management , 2000, Proceedings ISCC 2000. Fifth IEEE Symposium on Computers and Communications.
[4] Anup K. Ghosh,et al. Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[5] Karl N. Levitt,et al. Execution monitoring of security-critical programs in distributed systems: a specification-based approach , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[6] David J. Spiegelhalter,et al. Probabilistic Networks and Expert Systems , 1999, Information Science and Statistics.
[7] Marc Dacier,et al. Mining intrusion detection alarms for actionable knowledge , 2002, KDD.
[8] Manish Gupta,et al. Discovering Dynamic Dependencies in Enterprise Environments for Problem Determination , 2003, DSOM.
[9] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[10] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[11] Judea Pearl,et al. Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.
[12] Mischa Schwartz,et al. Schemes for fault identification in communication networks , 1995, TNET.
[13] Robert P. Goldman,et al. A Semantics for Probabilistic Quantifier-Free First-Order Languages, with Particular Application to Story Understanding , 1989, IJCAI.
[14] Makoto Matsumoto,et al. Twisted GFSR generators II , 1994, TOMC.
[15] J. Pearl. Causality: Models, Reasoning and Inference , 2000 .
[16] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[17] Salvatore J. Stolfo,et al. A coding approach to event correlation , 1995, Integrated Network Management.
[18] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[19] Saurabh Bagchi,et al. Dependency Analysis in Distributed Systems using Fault Injection: Application to Problem Determination in an e-commerce Environment , 2001, DSOM.
[20] James P. Titus,et al. Security and Privacy , 1967, 2022 IEEE Future Networks World Forum (FNWF).
[21] Hui-Qiang Wang,et al. Intrusion detection based on hidden Markov model , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).