Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models
暂无分享,去创建一个
[1] Carla E. Brodley,et al. Machine learning techniques for the computer security domain of anomaly detection , 2000 .
[2] Lain L. MacDonald,et al. Hidden Markov and Other Models for Discrete- valued Time Series , 1997 .
[3] Kymie M. C. Tan,et al. Determining the operational limits of an anomaly-based intrusion detector , 2003, IEEE J. Sel. Areas Commun..
[4] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[5] Rayford B. Vaughn,et al. Integrating Intelligent Anomaly Detection Agents into Distributed Monitoring Systems , 2006 .
[6] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[7] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[8] Vera M. Kettnaker. Time-dependent HMMs for visual intrusion detection , 2003, 2003 Conference on Computer Vision and Pattern Recognition Workshop.
[9] Rayford B. Vaughn,et al. Fuzzy cognitive maps for decision support in an intelligent intrusion detection system , 2001, Proceedings Joint 9th IFSA World Congress and 20th NAFIPS International Conference (Cat. No. 01TH8569).
[10] Zhen Liu,et al. Lightweight monitoring of MPI programs in real time , 2005, Concurr. Comput. Pract. Exp..
[11] Susan M. Bridges,et al. Incremental Estimation of Discrete Hidden Markov Models Based on a New Backward Procedure , 2005, AAAI.
[12] Joachim M. Buhmann,et al. Topology Free Hidden Markov Models: Application to Background Modeling , 2001, ICCV.
[13] Robert K. Cunningham,et al. Evaluating Intrusion Detection Systems Without Attacking Your Friends: The 1998 DARPA Intrusion Detection Evaluation , 1999 .
[14] Terran Lane,et al. Hidden Markov Models for Human/Computer Interface Modeling , 1999 .
[15] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.