Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems
暂无分享,去创建一个
[1] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[2] L. Rabiner,et al. An introduction to hidden Markov models , 1986, IEEE ASSP Magazine.
[3] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .
[4] Ajith Abraham,et al. Intrusion Detection Using Ensemble of Soft Computing Paradigms , 2003 .
[5] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[6] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[7] Sung-Bae Cho,et al. Anomaly Detection of Computer Usage Using Artificial Intelligence Techniques , 2000, PRICAI Workshops.
[8] Gunar E. Liepins,et al. Detection of anomalous computer session activity , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[9] Eugene H. Spafford,et al. Generation of Application Level Audit Data via Library Interposition , 1998 .
[10] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[11] Fabio Roli,et al. Ensemble learning for Intrusion Detection in Computer Networks , 2002 .
[12] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[13] Yuxin Ding,et al. Host-based intrusion detection using dynamic and static behavioral models , 2003, Pattern Recognit..