Author:
Whalen Sean,Boggs Nathaniel,Stolfo Salvatore J.
Reference24 articles.
1. H. Kisker, P. Matzke, S. Ried, and M. Lisserman, "Forrsights: The Software Market In Transformation, 2011 And Beyond," tech. rep., Forrester Research, 2011.
2. DARPA, "I2O Mission-Oriented Resilient Clouds," tech. rep., 2011.
3. K. Wang, J. J. Parekh, and S. J. Stolfo, "Anagram: A Content Anomaly Detector Resistant to Mimicry Attack," in Proceedings of the 9th Symposium on Recent Advances in Intrusion Detection, pp. 226--248, 2006.
4. P. Fogla and W. Lee, "Evading Network Anomaly Detection Systems: Formal Reasoning and Practical Techniques," in Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 59--68, 2006.
5. A. Shiravi, H. Shiravi, M. Tavallee, and A. A. Ghorbani, "Towards Developing a Systematic Approach To Generate Benchmark Datasets for Intrusion Detection," Computers & Security, vol. 31, no. 3, pp. 357--374, 2012.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献