Author:
Dass Mayukh,Cannady James,Potter Walter D.
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Raytheom, The Insider Threat, White Paper of SilentRunner, Inc. published in 01/09/02.
2. Lane, T and Brodley C E, Temporal Sequence Learning and Data Reduction for Anomaly Detection, In ACM Transaction on Information and System Security, Vol. 2, No. 3, August 1999.
3. Lee, W, Stolfo S and Mok K, Adaptive Intrusion Detection: A Data Mining Approach, In Artificial Intelligence Review, Kluwer Academic Publishers, 14(6): 533–567, December 2000.
4. Denning D E, An Intrusion-Detection Model, In IEEE Transaction on Software Engineering, Vol. Se-13, No. 2, February 1987, 222–232.
5. Dasgupta D., Gonzalez F., K. Yallapu, Gomez, J., Yarramsettii, R., Dunlap, G. and Greveas, M., CIDS: An Agent-based Intrusion Detection System, In CS Technical Report No. CS-02-001., Feb, 2002.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献