Efficient deterministic method for detecting new U2R attacks
暂无分享,去创建一个
[1] Salvatore J. Stolfo,et al. A framework for constructing features and models for intrusion detection systems , 2000, TSEC.
[2] Robert K. Cunningham,et al. Detecting Low-Profile Probes and Novel Denial-of-Service Attacks , 2001 .
[3] LeeWenke,et al. A framework for constructing features and models for intrusion detection systems , 2000 .
[4] Rachid Beghdad. Modelling and solving the intrusion detection problem in computer networks , 2004, Comput. Secur..
[5] N. Ye,et al. A Scalable Clustering Technique for Intrusion Signature Recognition , 2001 .
[6] Ronald L. Rivest,et al. Introduction to Algorithms, Second Edition , 2001 .
[7] Philip K. Chan,et al. Detecting novel attacks by identifying anomalous network packet headers , 2001 .
[8] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[9] Clifford Stein,et al. Introduction to Algorithms, 2nd edition. , 2001 .