共 50 条
- [21] An intrusion detection model based on the maximum likelihood short system call sequence INTELLIGENT COMPUTING IN SIGNAL PROCESSING AND PATTERN RECOGNITION, 2006, 345 : 709 - 714
- [22] Intrusion detection model of host system call sequence based on neighbor algorithm ISTM/2005: 6TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-9, CONFERENCE PROCEEDINGS, 2005, : 519 - 522
- [25] Type checking for software system specifications in real-time process algebra DCABES 2004, PROCEEDINGS, VOLS, 1 AND 2, 2004, : 1077 - 1083
- [26] Anomaly detection based on system call classification Ruan Jian Xue Bao/Journal of Software, 2004, 15 (03): : 391 - 403
- [27] Deriving software process simulation model from SPEM-based software process model 14TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2007, : 382 - +
- [28] Detecting Software Theft via System Call Based Birthmarks 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 149 - +
- [29] A software birthmark based on system call and program data dependence 2014 11TH WEB INFORMATION SYSTEM AND APPLICATION CONFERENCE (WISA), 2014, : 105 - 108
- [30] Reconfigurable Network Protocol Model Based on Process Algebra 2014 SEVENTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2014), VOL 2, 2014,