共 14 条
[1]
[Anonymous], 2011, CYBERSECURITY WATCH
[2]
Ben Salem M, 2008, ADV INFORM SECUR, V39, P69
[3]
Chen L., 2006, THE SEVENTH INTERNAT
[4]
Cloud Security Alliance, 2010, TOP THREATS TO CLOUD
[5]
Greenberg S., 1998, RESEARCH REPORT
[6]
Jian Zhou, 2008, 2008 IEEE Conference on Soft Computing in Industrial Applications. SMCia/08, P113, DOI 10.1109/SMCIA.2008.5045945
[7]
Lane Terran, 1997, AAAI WORKSHOP AI APP, P43
[8]
Latendresse M., 2005, LNCS, V3548, P141
[9]
Masquerade detection using enriched command lines
[J].
2003 INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS,
2003,
:5-14
[10]
Masquerade detection using truncated command lines
[J].
INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS,
2002,
:219-228