Author:
Wu Han-Ching,Huang Shou-Hsuan Stephen
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference17 articles.
1. Blum A., Song D., & Venkataraman, S. (2004). Detection of interactive stepping stones: Algorithms and confidence bounds. In Proceedings of the seventh international symposium on recent advances in intrusion detection (RAID’04) (pp. 258–277). Springer LNCS 3224.
2. Cannady, J. (1998). Artificial neural networks for misuse detection. In Proceedings, national information systems security conference (NISSC’98) (pp. 443–456). Arlington, VA.
3. Debar, H., Becker, M., & Siboni, D. (1992). A neural network component for an intrusion detection system. In IEEE computer society symposium on research in security and privacy (pp. 240–250).
4. Donoho, D., Flesia, A. G., Shankar, U., Paxson, V., Coit, J., & Staniford, S. (2002). Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In Fifth international symposium on recent advances in intrusion detection, Lecture notes in computer science 2516, New York, Springer.
5. Ghosh, A., Schwartzbard, A., & Shatz, M. (1999). Learning program behavior profiles for intrusion detection. In Proceedings of the first USENIX workshop on intrusion detection and network monitoring, Santa Clara, CA.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献