共 50 条
- [3] Anomaly detection in computer security and an application to file system accesses [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2005, 3488 : 14 - 28
- [4] Building Robust Temporal User Profiles for Anomaly Detection in File System Accesses [J]. 2016 14TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2016,
- [5] Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses [J]. PROCEEDINGS OF THE SEVENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY'17), 2017, : 3 - 14
- [7] Hiding data accesses in steganographic file system [J]. 20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 572 - 583
- [8] Mitigating data fragmentation for small file accesses [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2003, E86D (06): : 1126 - 1133
- [9] A Sound Framework for Dynamic Prevention of Local File Inclusion [J]. 2015 7TH CONFERENCE ON INFORMATION AND KNOWLEDGE TECHNOLOGY (IKT), 2015,
- [10] AN OPTIMISTIC ALGORITHM FOR CONCURRENT ACCESSES TO A SINGLE REPLICATED FILE [J]. IFIP TRANSACTIONS A-COMPUTER SCIENCE AND TECHNOLOGY, 1992, 12 : 365 - 371