Author:
XIAO Xi,XIA Shu-tao,TIAN Xin-guang,ZHAI Qi-bin
Subject
Computer Networks and Communications,Information Systems,Signal Processing
Reference18 articles.
1. Processing of massive audit data streams for real-time anomaly intrusion detection;Wang;Computer Communications,2008
2. Masquerade detection based on shell commands and multiple behavior pattern mining;Tian;Chinese Journal of Computers,2010
3. Adaptive Naive Bayes method for masquerade detection;Dash;Security and Communication Networks,2011
4. Anomaly detection using layered networks based on eigen co-occurrence matrix;Oka,2004
5. Machine learning techniques for the computer security domain of anomaly detection. Doctoral Dissertation;Lane,2000
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. About the System of Profiling User Actions Based on the Behavior Model;2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus);2021-01-26
2. Detecting Mobile Malware with TMSVM;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2015