Masquerade Attack Detection Using a Search-Behavior Modeling Approach
暂无分享,去创建一个
[1] Brian D. Davison,et al. Toward an Adaptive Command Line Interface , 1997, HCI.
[2] Ricardo A. Baeza-Yates,et al. Modeling user search behavior , 2005, Third Latin American Web Congress (LA-WEB'2005).
[3] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[4] R. A. Maxion,et al. Investigating a Possible Flaw in a Masquerade Detection System , 2004 .
[5] Deanna D. Caputo,et al. An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract) , 2008, RAID.
[6] Salvatore J. Stolfo,et al. One-Class Training for Masquerade Detection , 2003 .
[7] Marcus A. Maloof,et al. elicit: A System for Detecting Insiders Who Violate Need-to-Know , 2007, RAID.
[8] H. S. Teng,et al. Adaptive real-time anomaly detection using inductively generated sequential patterns , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Kazuhiko Kato,et al. Anomaly Detection Using Layered Networks Based on Eigen Co-occurrence Matrix , 2004, RAID.
[10] Salvatore J. Stolfo,et al. Baiting Inside Attackers Using Decoy Documents , 2009, SecureComm.
[11] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[12] Boleslaw K. Szymanski,et al. Intrusion detection: a bioinformatics approach , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[13] Torsten Suel,et al. Modeling and predicting user behavior in sponsored search , 2009, KDD.
[14] Roy A. Maxion,et al. Masquerade detection using enriched command lines , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[15] Mizuki Oka,et al. Eigen Co-occurrence Matrix Method for Masquerade Detection , 2004 .
[16] Roy A. Maxion,et al. Masquerade detection using truncated command lines , 2002, Proceedings International Conference on Dependable Systems and Networks.
[17] A. Karr,et al. Computer Intrusion: Detecting Masquerades , 2001 .
[18] Brian D. Davison,et al. Predicting Sequences of User Actions , 1998 .
[19] Kwong H. Yung,et al. Using Self-Consistent Naive-Bayes to Detect Masquerades , 2004, PAKDD.
[20] T. Lane,et al. Sequence Matching and Learning in Anomaly Detection for Computer Security , 1997 .
[21] Boleslaw K. Szymanski,et al. Recursive data mining for masquerade detection and author identification , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[22] Roy A. Maxion,et al. Masquerade detection augmented with error analysis , 2004, IEEE Transactions on Reliability.
[23] Mark T. Keane,et al. Modeling user behavior using a search-engine , 2007, IUI '07.