Author:
Perdisci Roberto,Ariu Davide,Fogla Prahlad,Giacinto Giorgio,Lee Wenke
Subject
Computer Networks and Communications
Reference37 articles.
1. The shellcode generation;Arce;IEEE Security and Privacy,2004
2. S. Axelsson, The base-rate fallacy and its implications for the difficulty of intrusion detection, in: CCS’99: Proceedings of the Sixth ACM Conference on Computer and Communications Security, 1999, pp. 1–7.
3. The use of the area under the roc curve in the evaluation of machine learning algorithms;Bradley;Pattern Recognition,1997
4. Person identification using multiple cues;Brunelli;IEEE Transaction on Pattern Analysis and Machine Intelligence,1995
5. R. Chinchani, E.V.D. Berg, A fast static analysis approach to detect exploit code inside network flows, in: Recent Advances in Intrusion Detection (RAID), 2005.
Cited by
158 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献