Intrusion Detection using Hidden Markov Model
暂无分享,去创建一个
[1] Adel Nadjaran Toosi,et al. A Novel Soft Computing Model Using Adaptive Neuro-Fuzzy Inference System for Intrusion Detection , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.
[2] Teresa F. Lunt,et al. A survey of intrusion detection techniques , 1993, Comput. Secur..
[3] Sung-Bae Cho,et al. Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Trans. Syst. Man Cybern. Part B.
[4] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[5] Jun-jie Wang,et al. Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.
[6] Farzad Sabahi,et al. Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[7] Joel-Ahmed M. Mondol. Cloud security solutions using FPGA , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[8] Irfan Gul,et al. Distributed Cloud Intrusion Detection Model , 2011 .
[9] S. T. Sarasamma,et al. Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[10] Christopher Leckie,et al. A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..
[11] Sung-Bae Cho,et al. Incorporating soft computing techniques into a probabilistic intrusion detection system , 2002, IEEE Trans. Syst. Man Cybern. Part C.
[12] Yun Yang,et al. Security architecture and key technologies for power cloud computing , 2011, Proceedings 2011 International Conference on Transportation, Mechanical, and Electrical Engineering (TMEE).
[13] Debin Gao,et al. Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance , 2009, IEEE Transactions on Dependable and Secure Computing.
[14] Shubhangi L. Vaikole,et al. Intrusion Detection System in Cloud Computing Environment , 2012 .
[15] John Zic,et al. Accountability as a Service for the Cloud , 2010, 2010 IEEE International Conference on Services Computing.
[16] Navdeep Singh,et al. A Survey of Intrusion Detection Techniques , 2013 .
[17] Cong Wang,et al. Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.
[18] Abdelwahab Hamou-Lhadj,et al. An improved Hidden Markov Model for anomaly detection using frequent common patterns , 2012, 2012 IEEE International Conference on Communications (ICC).
[19] Sung-Bae Cho,et al. Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[20] S Ramgovind,et al. The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.