共 50 条
[31]
Intrusion detection model of host system call sequence based on neighbor algorithm
[J].
ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS,
2005,
:519-522
[32]
Host-Based Data Exfiltration Detection via System Call Sequences
[J].
PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION WARFARE AND SECURITY,
2011,
:134-142
[33]
Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns
[J].
11TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS (SIN 2018),
2018,
[34]
Host-based IDS: A review and open issues of an anomaly detection system in IoT
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2022, 133
:95-113
[35]
Research on Intrusion Detection System Based on Host Information Recognition
[J].
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MECHANICAL ENGINEERING (EMIM 2017),
2017, 76
:481-483
[36]
Intrusion Detection System Based on data mining for Host Log
[J].
2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC),
2017,
:1742-1746
[37]
Multivariate Linear Regression Model for Host Based Intrusion Detection
[J].
COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 3,
2015, 33
[38]
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices
[J].
PROCEEDINGS OF THE 2019 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS '19),
2019,
:479-484
[39]
A Host-based Anomaly Detection Approach by Representing System Calls as States of Kernel Modules
[J].
2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE),
2013,
:431-440
[40]
Intrusion detection system evaluation model based on model checking
[J].
PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016),
2016, 73
:723-727