Study on the applications of hidden Markov models to computer intrusion detection
暂无分享,去创建一个
[1] Jr. G. Forney,et al. The viterbi algorithm , 1973 .
[2] Biing-Hwang Juang,et al. The segmental K-means algorithm for estimating parameters of hidden Markov models , 1990, IEEE Trans. Acoust. Speech Signal Process..
[3] Nong Ye,et al. First‐order versus high‐order stochastic models for computer intrusion detection , 2002 .
[4] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[5] J. Movellan. Tutorial on Hidden Markov Models , 2006 .
[6] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[7] Qiang Chen,et al. Probabilistic techniques for intrusion detection based on computer audit data , 2001, IEEE Trans. Syst. Man Cybern. Part A.
[8] Shi Xiao. The Learning Algorithm of the Second Order HMM and Its Relationship with the First Order HMM , 2001 .
[9] Yiguo Qiao,et al. Anomaly intrusion detection method based on HMM , 2002 .