共 50 条
- [1] Using Information Theory to Measure Call Site Information of System Call in Anomaly Detection 2013 15TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT), 2013, : 6 - 10
- [2] Anomaly detection method based on HMMs using system call and call stack information COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 315 - 321
- [3] Anomaly detection using call stack information 2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2003, : 62 - 75
- [4] Anomaly detection based on system call classification Ruan Jian Xue Bao/Journal of Software, 2004, 15 (03): : 391 - 403
- [5] Development of Scalable On-Line Anomaly Detection System for Autonomous and Adaptive Manufacturing Processes APPLIED SCIENCES-BASEL, 2019, 9 (21):
- [6] The Algorithm of Information System Anomaly Detection 2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 653 - 657
- [7] Selecting and Improving System Call Models for Anomaly Detection DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, PROCEEDINGS, 2009, 5587 : 206 - 223
- [8] Anomaly detection and event mining in cold forming manufacturing processes The International Journal of Advanced Manufacturing Technology, 2021, 115 : 837 - 852
- [9] Anomaly detection and event mining in cold forming manufacturing processes INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2021, 115 (03): : 837 - 852
- [10] Research on Markov chain model for system call anomaly detection PROCEEDINGS OF THE 8TH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1-3, 2005, : 328 - 333