共 50 条
- [1] Anomaly detection in computer security and an application to file system accesses [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, 3488 : 14 - 28
- [2] Anomaly detection survey for information security [J]. SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, : 251 - +
- [3] IMPORTANCE OF EVENT LOG MANAGEMENT TO ENSURE INFORMATION SYSTEM SECURITY [J]. METALURGIA INTERNATIONAL, 2013, 18 (02): : 144 - 149
- [4] Anomaly detection with high deviations for system security [J]. 11TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2005, : 200 - 207
- [5] The Algorithm of Information System Anomaly Detection [J]. 2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 653 - 657
- [7] Selection of information security systems to ensure economic security [J]. DILEMAS CONTEMPORANEOS-EDUCACION POLITICA Y VALORES, 2019, 6
- [8] A Lightweight Anomaly Detection System for Information Appliances [J]. PROCEEDINGS OF THE 12TH IEEE INTERNATIONAL SYMPOSIUM ON OBJECT/COMPONENT/SERVICE-ORIENTED REAL-TIME DISTRIBUTED COMPUTING, 2009, : 257 - +
- [9] Research on the Security Protection Mechanism of Computer File Management Information System [J]. PROCEEDINGS OF THE 2017 4TH INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT AND COMPUTING TECHNOLOGY (ICEMCT 2017), 2017, 101 : 1006 - 1009
- [10] Proposal of the security information sharing system with RDF site summary [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: SYSTEMICS AND INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 41 - 46