Intrusion and misuse detection in large-scale systems

被引:64
|
作者
Erbacher, RF [1 ]
Walker, KL
Frincke, DA
机构
[1] SUNY Albany, Albany, NY 12222 USA
[2] Univ Idaho, Moscow, ID 83843 USA
关键词
D O I
10.1109/38.974517
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:38 / 47
页数:10
相关论文
共 50 条
  • [31] NEW APPROACH TO FAILURE-DETECTION IN LARGE-SCALE SYSTEMS
    SINGH, MG
    HASSAN, MF
    CHEN, YL
    LI, DS
    PAN, QR
    [J]. IEE PROCEEDINGS-D CONTROL THEORY AND APPLICATIONS, 1983, 130 (05): : 243 - 249
  • [32] Detection and Localization of Load Redistribution Attacks on Large-scale Systems
    Pinceti, Andrea
    Sankar, Lalitha
    Kosut, Oliver
    [J]. JOURNAL OF MODERN POWER SYSTEMS AND CLEAN ENERGY, 2022, 10 (02) : 361 - 370
  • [33] Robust Symbol Detection in Large-Scale Overloaded NOMA Systems
    Iimori H.
    De Abreu G.T.F.
    Hara T.
    Ishibashi K.
    Stoica R.-A.
    Gonzalez G. D.
    Gonsa O.
    [J]. Iimori, Hiroki (h.iimori@ieee.org), 1600, Institute of Electrical and Electronics Engineers Inc. (02): : 512 - 533
  • [34] Connecting the dots: anomaly and discontinuity detection in large-scale systems
    Malik, Haroon
    Davis, Ian J.
    Godfrey, Michael W.
    Neuse, Douglas
    Manskovskii, Serge
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2016, 7 (04) : 509 - 522
  • [35] OAMP for Low Complexity Detection in Large-Scale LDS Systems
    Wen, Haifeng
    Luo, Qu
    Yua, Weijie
    Liu, Zilong
    Xiao, Pei
    [J]. 2022 10TH INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS (IWSDA), 2022, : 151 - 155
  • [36] Connecting the dots: anomaly and discontinuity detection in large-scale systems
    Haroon Malik
    Ian J. Davis
    Michael W. Godfrey
    Douglas Neuse
    Serge Manskovskii
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2016, 7 : 509 - 522
  • [37] Large-scale detection of repetitions
    Smyth, W. F.
    [J]. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES, 2014, 372 (2016):
  • [38] Visualization in detection of intrusions and misuse in large scale networks
    Erbacher, RF
    Frincke, D
    [J]. 2000 IEEE INTERNATIONAL CONFERENCE ON INFORMATION VISUALISATION, PROCEEDINGS, 2000, : 294 - 299
  • [39] CRYPTOREX: Large-scale Analysis of Cryptographic Misuse in IoT Devices
    Zhang, Li
    Chen, Jiongyi
    Diao, Wenrui
    Guo, Shanqing
    Weng, Jian
    Zhang, Kehuan
    [J]. PROCEEDINGS OF THE 22ND INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, 2019, : 151 - 164
  • [40] Large-scale eHealth Systems
    Hypponen, Hannele
    Viitanen, Johanna
    Reponen, Jarmo
    Doupi, Persephone
    Jormanainen, Vesa
    Laaveri, Tinja
    Vanska, Jukka
    Winblad, Ilkka
    Hamalainen, Paivi
    [J]. PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON EHEALTH, TELEMEDICINE, AND SOCIAL MEDICINE (ETELEMED 2011), 2011, : 89 - 95