共 7 条
[1]
Cai Zhong-min, 2002, Journal of System Simulation, V14, P377
[2]
FEI Y, 2005, WUHAN U J NATURAL SC, V23, P169
[3]
FEI Y, 2004, P 5 WORLD C INT CONT, V5, P4362
[4]
Anomaly detection using call stack information
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:62-75
[5]
A sense of self for unix processes
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:120-128
[6]
Ko C., 1994, Proceedings. 10th Annual Computer Security Applications Conference (Cat. No.94TH8032), P134, DOI 10.1109/CSAC.1994.367313
[7]
A fast automaton-based method for detecting anomalous program behaviors
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:144-155