共 50 条
- [22] Anomaly Based Host Intrusion Detection System Using Semantic Based System Call Patterns [J]. PROCEEDINGS OF 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2015,
- [23] Hidden Markov Anomaly Detection [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 37, 2015, 37 : 1833 - 1842
- [24] Hidden semi-Markov model for anomaly detection [J]. APPLIED MATHEMATICS AND COMPUTATION, 2008, 205 (02) : 562 - 567
- [25] ADAPTIVE ANOMALY DETECTION USING A HIDDEN MARKOV MODEL [J]. PROCEEDINGS OF THE ASME INTERNATIONAL MANUFACTURING SCIENCE AND ENGINEERING CONFERENCE 2010, VOL 2, 2011, : 599 - 606
- [26] Efficacy of Hidden Markov Models over neural networks in anomaly intrusion detection [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 1, REGULAR PAPERS/PANELS, PROCEEDINGS, 2006, : 325 - +
- [27] A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection [J]. PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 : 372 - 380
- [28] Multi-stage intrusion detection system using Hidden Markov Model algorithm [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 72 - 77
- [29] An Intrusion Detection Based on Markov Model [J]. COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 988 - 993