共 50 条
- [32] LogSpy: System Log Anomaly Detection for Distributed Systems 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER ENGINEERING (ICAICE 2020), 2020, : 347 - 352
- [33] Anomaly Detection in a Logistic Operating System Using the Mahalanobis-Taguchi Method APPLIED SCIENCES-BASEL, 2020, 10 (12):
- [34] A multi-layer model for anomaly intrusion detection using program sequences of system calls ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, 2003, : 531 - 536
- [35] A Host-based Anomaly Detection Approach by Representing System Calls as States of Kernel Modules 2013 IEEE 24TH INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE), 2013, : 431 - 440
- [36] Monitoring Smartphones for Anomaly Detection MOBILE NETWORKS & APPLICATIONS, 2009, 14 (01): : 92 - 106
- [37] Anomaly Detection in Embedded Systems using Simultaneous Power and Temperature Monitoring 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 115 - 119
- [38] Monitoring Smartphones for Anomaly Detection Mobile Networks and Applications, 2009, 14 : 92 - 106
- [40] Anomaly Detection with Machine Learning Models Using API Calls INFORMATION TECHNOLOGIES AND THEIR APPLICATIONS, PT II, ITTA 2024, 2025, 2226 : 298 - 309