共 50 条
- [21] Integrating Intelligent Anomaly Detection Agents into Distributed Monitoring Systems JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (01): : 60 - 77
- [22] Intelligent systems for sitting posture monitoring and anomaly detection: an overview Journal of NeuroEngineering and Rehabilitation, 21
- [23] Anomaly detection of program behaviors based on system calls and homogeneous Markov chain models Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (09): : 1538 - 1544
- [24] Security Testing for Operating System and Its System Calls SECURITY TECHNOLOGY, PROCEEDINGS, 2009, 58 : 116 - 123
- [25] Hierarchical Attention-Based Anomaly Detection Model for Embedded Operating Systems 2018 IEEE 24TH INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS (RTCSA), 2018, : 225 - 231
- [26] Evading System-Calls Based Intrusion Detection Systems NETWORK AND SYSTEM SECURITY, (NSS 2016), 2016, 9955 : 200 - 216
- [27] Investigating Intrusion Detection Systems That Use Trails of System calls PROCEEDINGS OF THE 2008 INTERNATIONAL SYMPOSIUM ON PERFORMANCE EVALUATION OF COMPUTER AND TELECOMMUNICATION SYSTEMS, 2008, : 377 - 384
- [28] Bypassing system calls-based intrusion detection systems CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (16):
- [29] Process Monitoring System Based On Anomaly Detection Statistics Algorithm APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 408 - 411
- [30] A Prototype System for Urban Water Consumption Monitoring and Anomaly Detection 2022 IEEE 18TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, ICCP, 2022, : 17 - 23