共 9 条
- [1] Anomaly intrusion detection method based on HMM. Y Qiao, X W Xin, Y Bin et al. Electronics Letters . 2002
- [2] An Intrusion-Detection Model. D. E. Denning. IEEE Transactions on Software Engineering . 1987
- [3] AsenseofselfforU nixprocesses. SForrest,SAHofmeyr,ASomayajietal. Procofthe1996IEEESymponSecurityandPrivacy . 1996
- [4] Modeling system calls for intrusion detection with dynamic window sizes. E Eskin,L Wenke,S J Stolfo. . 2001
- [5] Markov chains, classifiers, and intrusion detection A. S Jha, K Tan, R Maxion. . 2001
- [6] A Markov chain model of temporal behavior for anomal detection. N Ye. . 2000
- [7] Detecting intrusion using system calls: Alternative data models. C Warrender,S Forrest,B Pearlmutter. Proc of the 1999 IEEE Symposium on Security and Privacy . 1999
- [8] A tutorial on hidden Markov models and selected applications in speech recognition. L.R.Rabiner. Proceedings of the IEEE . 1989
- [9] IDES :Aprogressre port. TFLunt,ATamaru,FGilham,etal. ProcofAnnualComputerSecurityApplicationsConf . 1990