Detecting Anomalous User Behaviors in Workflow-Driven Web Applications
暂无分享,去创建一个
Xiaowei Li | Yuan Xue | Bradley Malin | B. Malin | Xiaowei Li | Yuan Xue
[1] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[2] Grzegorz Lewandowski,et al. Enforcing Request Integrity in Web Applications , 2010, DBSec.
[3] Zhendong Su,et al. Static detection of cross-site scripting vulnerabilities , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[4] Christopher Krügel,et al. A multi-model approach to the detection of web-based attacks , 2005, Comput. Networks.
[5] Xiaowei Li,et al. Towards understanding the usage pattern of web-based electronic medical record systems , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[6] Christopher Krügel,et al. Toward Automated Detection of Logic Vulnerabilities in Web Applications , 2010, USENIX Security Symposium.
[7] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[8] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[9] Alex Waibel,et al. Readings in speech recognition , 1990 .
[10] George S. Avrunin,et al. Experience modeling and analyzing medical processes: UMass/baystate medical safety project overview , 2010, IHI.
[11] Bradley Malin,et al. Learning relational policies from electronic health record access logs , 2011, J. Biomed. Informatics.
[12] Dawn Xiaodong Song,et al. Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense , 2009, NDSS.
[13] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[14] Christopher Krügel,et al. Preventing Cross Site Request Forgery Attacks , 2006, 2006 Securecomm and Workshops.
[15] Dennis J. Turner,et al. Symantec Internet Security Threat Report Trends for July 04-December 04 , 2005 .
[16] Giovanni Vigna,et al. Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications , 2007, RAID.
[17] Giovanni Vigna,et al. Multi-module vulnerability analysis of web-based applications , 2007, CCS '07.
[18] Alex Pentland,et al. Action Reaction Learning: Automatic Visual Analysis and Synthesis of Interactive Behaviour , 1999, ICVS.
[19] Christopher Krügel,et al. Pixy: a static analysis tool for detecting Web application vulnerabilities , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[20] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[21] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[22] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..