共 9 条
[1]
A sense of self for unix processes
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:120-128
[2]
Hofmeyr S. A., 1998, Journal of Computer Security, V6, P151
[3]
A data mining framework for building intrusion detection models
[J].
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
1999,
:120-132
[4]
A new intrusion detection method based on Fuzzy HMM
[J].
ICIEA 2008: 3RD IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, PROCEEDINGS, VOLS 1-3,
2008,
:36-39
[5]
Raman C, 2005, LECT NOTES COMPUT SC, V3816, P389, DOI 10.1007/11604655_44
[7]
Somayaji A, 2000, USENIX ASSOCIATION PROCEEDINGS OF THE NINTH USENIX SECURITY SYMPOSIUM, P185
[8]
XU X, 2007, P 4 INT S NEUR NETW, P455
[9]
Zhang GL, 2005, LECT NOTES ARTIF INT, V3584, P483