Author:
Dash Subrat Kumar,Reddy Krupa Sagar,Pujari Arun K.
Publisher
Springer Berlin Heidelberg
Reference16 articles.
1. Chinchani, R., Muthukrishnan, A., Chandrasekaran, M., Upadhyaya, S.: RACOON: Rapidly generating user command data for anomaly detection from customizable templates. In: 20th Annual Computer Security Applications Conference (ACSAC), Tucson, AZ (December 2004)
2. Cohen, P., Heeringa, B., Adams, N.M.: An unsupervised algorithm for segmenting categorical timeseries into episodes. In: Proceedings of the ESF Exploratory Workshop on Pattern Detection and Discovery, London, UK, pp. 49–62 (September 2002)
3. Coull, S., Branch, J., Szymanski, B., Breimer, E.: Intrusion detection: A bioinformatics approach. In: 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 8-12 (2003)
4. Davison, B.D., Hirsh, H.: Predicting sequences of user actions. Predicting the Future: AI Approaches to Time-Series Problems. AAAI Technical Report WS-98-07. AAAI Press, Menlo Park (1998)
5. Greenberg, S.: Using Unix: Collected traces of 168 users. Technical Report 88/333/45, Department of Computer Science, University of Calgary, Canada (1988)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献