Intrusion detection method based on hierarchical hidden Markov model and variable-length semantic pattern

被引:0
|
作者
Duan, Xue-Tao [1 ]
Jia, Chun-Fu [1 ,2 ]
Liu, Chun-Bo [1 ]
机构
[1] College of Information Technological Science, Nankai University, Tianjin 300071, China
[2] National Computer Virus Emergency Response Center, Tianjin 300457, China
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:109 / 114
相关论文
共 50 条
  • [41] Variable space hidden Markov model for topic detection and analysis
    Zeng, Jianping
    Zhang, Shiyong
    KNOWLEDGE-BASED SYSTEMS, 2007, 20 (07) : 607 - 613
  • [42] Fault Pattern Recognition Based on Hidden Markov Model
    刘鑫
    贾云献
    范智滕
    田霞
    张英波
    JournalofDonghuaUniversity(EnglishEdition), 2016, 33 (02) : 280 - 283
  • [43] Fight Detection Based On Hidden Markov Model
    Liu, Dejian
    Wu, Jinyong
    Wang, Yike
    Wang, Jun
    Gong, Zhuo
    2012 IEEE FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2012, : 658 - 661
  • [44] Detection of Violence Based on Hidden Markov Model
    Lu Hui-qing
    Zhu Weinan
    Zhou Yuchao
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 4651 - 4655
  • [45] Semantic event detection in sports video using Hidden Markov Model
    Kim, CS
    Bae, TM
    Choo, JH
    Jin, SH
    Ro, YM
    CISST '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON IMAGING SCIENCE, SYSTEMS, AND TECHNOLOGY, 2004, : 585 - 591
  • [46] Predicting the Semantic Related words based on Hidden Markov Model
    Yang, Fuping
    Gu, Huafeng
    Proceedings of the 2016 4th International Conference on Machinery, Materials and Information Technology Applications, 2016, 71 : 865 - 871
  • [47] Variable-length sequential dynamic features-based malware detection
    Du D.
    Li G.
    Ma Y.
    Du, Donggao (dudonggao@126.com), 1600, Inst. of Scientific and Technical Information of China (22): : 362 - 367
  • [48] Malware Detection Using Hidden Markov Model based on Markov Blanket Feature Selection Method
    Pechaz, Bassir
    Jahan, Majid Vafaie
    Jalali, Mehrdad
    SECOND INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK 2015), 2015, : 558 - 563
  • [49] Control theoretic approach to intrusion detection using a distributed hidden Markov model
    Khanna, Rahul
    Liu, Huaping
    IEEE WIRELESS COMMUNICATIONS, 2008, 15 (04) : 24 - 33
  • [50] Variable-length sequential dynamic features-based malware detection
    杜冬高
    Li Gaochao
    Ma Yan
    HighTechnologyLetters, 2016, 22 (04) : 362 - 367