共 3 条
- [1] An adaptive real-time intrusion detection system using sequences of system call. Lu K N,Chen Z H,Jin Z G,et al. In: Proceedings of IEEE Conference on Electrical and Computer Engineering ( IEEE CCECE 2003) . 2003
- [2] Determining the operational limits of an anomaly-based intrusion detector. Tan K M C,Maxion R A. IEEE Journal on Selected Areas in Communications . 2003
- [3] Trends in academic research: vulnerabilities analysis and intrusion detection. Matt B. Computers and Security . 2002