共 13 条
[1]
[Anonymous], P 11 EUR C MACH LEAR
[2]
[Anonymous], THESIS COLUMBIA U
[3]
Cohen W. W., 1995, P 12 INT C MACH LEAR, P115, DOI DOI 10.1016/B978-1-55860-377-6.50023-2
[4]
A sense of self for unix processes
[J].
1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
1996,
:120-128
[5]
Ghosh AK, 1999, PROCEEDINGS OF THE WORKSHOP ON INTRUSION DETECTION AND NETWORK MONITORING (ID '99), P51
[6]
JAVITZ H, 1991, P IEEE S SEC PRIV, P1991
[7]
Kubat M, 1997, P 14 INT C MACH LEAR, P821
[8]
Lane T., 1998, Proceedings Fourth International Conference on Knowledge Discovery and Data Mining, P259
[9]
Information-theoretic measures for anomaly detection
[J].
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2001,
:130-143
[10]
Benchmarking anomaly-based detection systems
[J].
DSN 2000: INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, PROCEEDINGS,
2000,
:623-630