共 50 条
- [2] Markov chains in network intrusion detection [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 432 - 433
- [3] Markov chains, classifiers, and intrusion detection [J]. 14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 206 - 219
- [4] An Intrusion detection system for network storage based on system calls [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 544 - +
- [5] LLE on system calls for host based intrusion detection [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 609 - 612
- [6] Detection engine based on host system calls for distributed intrusion detection system [J]. ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 3441 - 3444
- [7] An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls [J]. 2004 12TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, VOLS 1 AND 2 , PROCEEDINGS: UNITY IN DIVERSITY, 2004, : 470 - 474
- [8] Network intrusion detection based on system calls and data mining [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
- [9] Evading System-Calls Based Intrusion Detection Systems [J]. NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 200 - 216
- [10] Bypassing system calls-based intrusion detection systems [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):