Author:
Yamauchi Toshihiro,Hara Takayuki,Taniguchi Hideo
Publisher
Springer Science and Business Media LLC
Subject
Hardware and Architecture,Information Systems,Theoretical Computer Science,Software
Reference17 articles.
1. CERT/CC Statistics 1988–2005: http://www.cert.org/stats/
2. Wagner D, Dean D (2001) Intrusion detection via static analysis. In: Proceedings of the 2001 IEEE symposium on security and privacy, pp 156–168
3. Hofmeyr SA, Forrest S, Somayaji A (1998) Intrusion detection using sequences of system calls. J Comput Secur 6(3), 151–180
4. Sekar R, Bendre M, Bollineni P, Dhurjati D (2001) A fast automaton-based method for detecting anomalous program behaviors. In: Proceedings of IEEE symposium on security and privacy, pp 144–155
5. Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38–47
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Plate;Proceedings of the 31st Annual ACM Symposium on Applied Computing;2016-04-04