A variable-length model for masquerade detection (vol 85, pg 2470, 2012)

被引:0
|
作者
Xiao, Xi [1 ,2 ]
Tian, Xinguang [3 ]
Zhai, Qibin [2 ]
Xia, Shutao [1 ]
机构
[1] Tsinghua Univ, Grad Sch Shenzhen, Shenzhen 518055, Peoples R China
[2] Chinese Acad Sci, Grad Univ, State Key Lab Informat Secur, Beijing 100049, Peoples R China
[3] Chinese Acad Sci, Inst Comp Technol, Key Lab Network Sci & Technol, Beijing 100190, Peoples R China
关键词
D O I
10.1016/j.jss.2012.11.008
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:868 / 868
页数:1
相关论文
共 50 条
  • [1] A variable-length model for masquerade detection
    Xiao, Xi
    Tian, Xinguang
    Zhai, Qibin
    Xi, Shutao
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (11) : 2470 - 2478
  • [2] Model for Detection of Masquerade Attacks Based on Variable-Length Sequences
    Barseghyan, Ghazaros
    Yuan, Yuyu
    Anakpa, Manawa
    [J]. IEEE ACCESS, 2020, 8 : 210140 - 210157
  • [3] Variable-length sequence model for attribute detection in the image
    Li, Xin
    Gu, Jiaming
    Lu, Xiaoyuan
    Ning, Yan
    Zhang, Liang
    Shen, Peiyi
    Gu, Chaochen
    [J]. JOURNAL OF COMPUTATIONAL METHODS IN SCIENCES AND ENGINEERING, 2023, 23 (04) : 1913 - 1927
  • [4] Variable-length signatures for intrusion detection
    Li, Zhuowei
    Das, Amitabha
    Zhou, Jianying
    Patra, Jagdish C.
    [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2008, 23 (03): : 183 - 191
  • [5] Engineering ecosystems and synthetic ecologies (vol 8, pg 2470, 2012)
    Mee, Michael T.
    Wang, Harris H.
    [J]. MOLECULAR BIOSYSTEMS, 2012, 8 (12) : 3345 - 3345
  • [6] Duplicate Address Detection process with variable-length prefix
    Song, Guangjia
    Ji, Zhenzhou
    [J]. ENERGY SCIENCE AND APPLIED TECHNOLOGY, 2016, : 497 - 501
  • [7] Intrusion detection model based on variable-length character patterns and its simulating analysis
    Ge, Fang-Bin
    Yang, Lin
    Wang, Jian-Xin
    Zang, Lei
    [J]. Xitong Fangzhen Xuebao / Journal of System Simulation, 2008, 20 (22): : 6118 - 6121
  • [8] EFFECT OF CAPTURE ON THROUGHPUT OF VARIABLE-LENGTH PACKET ALOHA SYSTEMS (VOL 17, PG 836, 1994)
    ROBERTSON, RC
    HA, TT
    [J]. COMPUTER COMMUNICATIONS, 1995, 18 (03) : 220 - 220
  • [9] On error detection and error synchronization of reversible variable-length codes
    Lin, CW
    Wu, JL
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2005, 53 (05) : 826 - 832
  • [10] Intrusion detection using variable-length audit trail patterns
    Wespi, A
    Dacier, M
    Debar, H
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, PROCEEDINGS, 2000, 1907 : 110 - 129