A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security
暂无分享,去创建一个
[1] David G. Stork,et al. Pattern Classification , 1973 .
[2] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[3] Alfonso Valdes,et al. Next-generation Intrusion Detection Expert System (NIDES)A Summary , 1997 .
[4] Matthias Schonlau,et al. Detecting masquerades in intrusion detection based on unpopular commands , 2000, Inf. Process. Lett..
[5] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[6] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[7] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[8] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[9] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.