A Method for Anomaly Detection of User Behaviors Based on Machine Learning
暂无分享,去创建一个
[1] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[2] Lei,et al. A Novel Approach for Redirecting Module in Honeypot Systems , 2005 .
[3] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[4] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] TERRAN LANE,et al. Temporal sequence learning and data reduction for anomaly detection , 1999, TSEC.
[6] Lian Yi. Anomaly Detection of User Behaviors Based on Profile Mining , 2002 .
[7] Wang Guo-yin. Audit data analyzing approach for security audit system , 2005 .
[8] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[9] Sun Hong. An Improved Anomaly Detection Model for IDS , 2003 .
[10] Carla E. Brodley,et al. Machine learning techniques for the computer security domain of anomaly detection , 2000 .
[11] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .