共 20 条
[11]
Learning classifiers for misuse and anomaly detection using a bag of system calls representation
[J].
PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP,
2005,
:118-125
[12]
Lee W., 1998, Usenix Security
[13]
Merkel D., 2014, Linux J, V239, P2
[14]
Murtaza SS, 2013, PROC INT SYMP SOFTW, P431, DOI 10.1109/ISSRE.2013.6698896
[16]
Oracle Corporation, 2015, MYSQLSL LOAD EM CLIE
[17]
Petazzoni J., 2013, CONTAINERS DOCKER SE
[18]
Modeling program behaviors by hidden Markov models for intrusion detection
[J].
PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7,
2004,
:2830-2835
[19]
Detecting intrusions using system calls: Alternative data models
[J].
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
1999,
:133-145