共 17 条
[1]
BRUGGER ST, 2004, THESIS U CALIFORNIA
[2]
Chandola V., 2010, P ACM 6 ANN WORKSH C
[3]
A sense of self for unix processes
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:120-128
[4]
Haines J. W., 2000, P INT S REC ADV INTR, P162
[5]
A statistically based system for prioritizing information exploration under uncertainty
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS,
1997, 27 (04)
:449-466
[6]
Hofmeyr S. A., 1998, Journal of Computer Security, V6, P151
[7]
Lee W., 2000, ACM Transactions on Information and Systems Security, V3, P227, DOI 10.1145/382912.382914
[8]
Information-theoretic measures for anomaly detection
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:130-143
[9]
Lee W, 1998, PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, P79
[10]
LEE W, 1997, P AAAI97 WORKSH AI M, P50