共 33 条
[1]
Tian X. G.(2008)Intrusion detection based on system calls and homogeneous Markov chains Journal of Systems Engineering and Electronics 19 598-605
[2]
Duan M. Y.(2008)Anomaly detection of user behavior based on shell commands and homogeneous Markov chains Chinese Journal of Electronics 17 231-236
[3]
Sun C. L.(2005)Intrusion detection using an ensemble of intelligent paradigms Journal of Network and Computer Applications 28 167-182
[4]
Li W. F.(2004)A clustering-based anomaly intrusion detector for a host computer IEICE Transactions on Information and Systems. E (Norwalk, Conn.) 87-D 2086-2094
[5]
Tian X. G.(2002)An anomaly intrusion detection method based on HMM Electronics Letters 38 663-664
[6]
Duan M. Y.(2003)An empirical study of two approaches to sequence learning for anomaly detection Machine Learning 51 73-107
[7]
Li W. F.(1999)Intrusion detection using sequences of system calls Journal of Computer Security 6 151-180
[8]
Sun C. L.(2002)Multivariate statistical analysis of audit trails for host-based intrusion detection IEEE Transactions on Computers 51 810-820
[9]
Mukkamala S.(2002)Intrusion detection techniques and approaches Computer Communications 25 1356-1365
[10]
Sung A. H.(2006)A method for anomaly detection of user behaviors based on machine learning The Journal of China Universities of Post and Telecommunications 13 61-65