共 50 条
- [41] Enhancing the accuracy of network-based intrusion detection with host-based context DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2005, 3548 : 206 - 221
- [42] A network audit system for host-based intrusion detection (NASHID) in linux 16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 178 - 187
- [43] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices Mobile Networks and Applications, 2020, 25 : 164 - 172
- [44] An Autonomous Host-Based Intrusion Detection System for Android Mobile Devices MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 164 - 172
- [45] Generating Host-Based Data from Network Traces for Intrusion Detection 2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 268 - 273
- [46] Applying host-based intrusion detection to critical communication infrastructure components 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2003, : 452 - 457
- [49] Intelligent Host-based Stepping Stone Detection Approach WCECS 2009: WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, VOLS I AND II, 2009, : 815 - 820
- [50] A Trace Abstraction Approach for Host-based Anomaly Detection 2015 IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE FOR SECURITY AND DEFENSE APPLICATIONS (CISDA), 2015, : 170 - 177