共 50 条
- [21] Research of IOT Intrusion Detection System Based on Hidden Markov Model [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2011, : 151 - 155
- [22] Research of IOT Intrusion Detection System Based on Hidden Markov Model [J]. INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2949 - 2952
- [23] Intrusion detection based on Hidden Markov Model [J]. 2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 3115 - 3118
- [24] Hidden Markov model based intrusion detection [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 169 - 170
- [25] Applying mining fuzzy association rules to intrusion detection based on sequences of system calls [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 826 - 835
- [26] Modeling system calls for intrusion detection with dynamic window sizes [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 165 - 175
- [27] Mobile agent based intrusion detection system adopting Hidden Markov Model [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 122 - 130
- [28] An anomaly intrusion detection Based on Hidden Markov model System Call Sequenc [J]. ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 609 - +
- [29] Multi-Layer Hidden Markov Model Based Intrusion Detection System [J]. MACHINE LEARNING AND KNOWLEDGE EXTRACTION, 2019, 1 (01): : 265 - 286
- [30] A Fingerprinting System Calls Approach for Intrusion Detection in a Cloud Environment [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL ASPECTS OF SOCIAL NETWORKS (CASON), 2012, : 309 - 314