Protocol-based classification for intrusion detection

被引:0
|
作者
Yu, Kun-Ming [1 ]
Wu, Ming-Feng [2 ]
Wong, W.-T. [2 ]
机构
[1] Department of Computer Science and Information Engineering, Chung Hua University, No. 707, Sec. 2, WuFu Road, HsinChu, Taiwan
[2] Department of Information Management, Chung Hua University, No. 707, Sec. 2, WuFu Road, HsinChu, Taiwan
来源
关键词
13;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:135 / 141
相关论文
共 50 条
  • [1] Protocol-based classification for intrusion detection
    Yu, Kun-Ming
    Wu, Ming-Feng
    Wong, Wai-Tak
    WSEAS: ADVANCES ON APPLIED COMPUTER AND APPLIED COMPUTATIONAL SCIENCE, 2008, : 749 - +
  • [2] Protocol-based classification for intrusion detection
    Yu, Kun-Ming
    Wu, Ming-Feng
    Wong, Wai-Tak
    RECENT ADVANCES IN SYSTEMS, COMMUNICATIONS AND COMPUTERS, 2008, : 29 - +
  • [3] A Protocol-based Intrusion Detection System using Dual Autoencoders
    Huang, Yu-Lun
    Hung, Ching-Yu
    Hu, Hsiao-Te
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 749 - 758
  • [4] Intrusion detection using protocol-based non-conformance to trusted behaviors
    Ramakrishnan, Vikram
    Kumar, R. Anil
    John, Sherin
    2007 INTEGRATED COMMUNICATIONS, NAVIGATION AND SURVEILLANCE CONFERENCE, 2007, : 220 - +
  • [5] Intrusion Detection System Based on Classification
    Gong Shang-fu
    Zhao Chun-lan
    2012 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT CONTROL, AUTOMATIC DETECTION AND HIGH-END EQUIPMENT (ICADE), 2012, : 78 - 83
  • [6] G-IDCS: Graph-Based Intrusion Detection and Classification System for CAN Protocol
    Park, Sung Bum
    Jo, Hyo Jin
    Lee, Dong Hoon
    IEEE ACCESS, 2023, 11 : 39213 - 39227
  • [7] Stress Classification Model Using Speech: An Ambulatory Protocol-Based Database Study
    Eleonora Prado, Lara
    Hongn, Andrea
    Pelle, Patricia
    Paula Bonomini, Maria
    ARTIFICIAL INTELLIGENCE FOR NEUROSCIENCE AND EMOTIONAL SYSTEMS, PT I, IWINAC 2024, 2024, 14674 : 245 - 252
  • [8] Protocol based foresight anomaly intrusion detection system
    Tsai, MK
    Lin, SC
    Tseng, SS
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 493 - 500
  • [9] Enabling protocol-based medical critiquing
    Sips, Robert-Jan
    Braun, Loes
    Roos, Nico
    UBIQUITY: TECHNOLOGIES FOR BETTER HEALTH IN AGING SOCIETIES, 2006, 124 : 471 - 476
  • [10] Protocol-Based Smart Contract Generation
    Falcao, Afonso
    Mordido, Andreia
    Vasconcelos, Vasco T.
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2022 INTERNATIONAL WORKSHOPS, 2023, 13412 : 555 - 582