共 7 条
- [1] Cai Zhong-min, 2002, Journal of System Simulation, V14, P377
- [2] FEI Y, 2005, WUHAN U J NATURAL SC, V23, P169
- [3] FEI Y, 2004, P 5 WORLD C INT CONT, V5, P4362
- [4] Anomaly detection using call stack information [J]. 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 62 - 75
- [5] A sense of self for unix processes [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 120 - 128
- [6] Ko C., 1994, Proceedings. 10th Annual Computer Security Applications Conference (Cat. No.94TH8032), P134, DOI 10.1109/CSAC.1994.367313
- [7] A fast automaton-based method for detecting anomalous program behaviors [J]. 2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, : 144 - 155