ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
A multi-layer model for anomaly intrusion detection using program sequences of system calls
The 11th IEEE International Conference on Networks, 2003. ICON2003.
◽
10.1109/icon.2003.1266245
◽
2004
◽
Cited By ~ 8
Author(s):
Xuan Dau Hoang
◽
Jiankun Hu
◽
P. Bertok
Keyword(s):
Intrusion Detection
◽
Layer Model
◽
System Calls
◽
Anomaly Intrusion Detection
Download Full-text
Related Documents
Cited By
References
Survey on HMM based anomaly intrusion detection using system calls
2010 5th International Conference on Computer Science & Education
◽
10.1109/iccse.2010.5593839
◽
2010
◽
Cited By ~ 10
Author(s):
Panhong Wang
◽
Liang Shi
◽
Beizhan Wang
◽
Yuanqin Wu
◽
Yangbin Liu
Keyword(s):
Intrusion Detection
◽
System Calls
◽
Anomaly Intrusion Detection
Download Full-text
Study on HMM Based Anomaly Intrusion Detection Using System Calls
Proceedings of the 2nd International Conference on Electronic and Mechanical Engineering and Information Technology (2012)
◽
10.2991/emeit.2012.27
◽
2012
◽
Cited By ~ 2
Author(s):
Shang-zhe SHI
◽
Mei-feng SUN
Keyword(s):
Intrusion Detection
◽
System Calls
◽
Anomaly Intrusion Detection
Download Full-text
An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls
Proceedings 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat No 04EX955) ICON-04
◽
10.1109/icon.2004.1409210
◽
2005
◽
Cited By ~ 38
Author(s):
X.A. Hoang
◽
J. Hu
Keyword(s):
Intrusion Detection
◽
Markov Model
◽
Hidden Markov Model
◽
Hidden Markov
◽
Training Scheme
◽
System Calls
◽
Model Training
◽
Anomaly Intrusion Detection
Download Full-text
Anomaly intrusion detection based on genetic optimization and fuzzy rules mining
Journal of Computer Applications
◽
10.3724/sp.j.1087.2009.02227
◽
2009
◽
Vol 29
(8)
◽
pp. 2227-2229
Author(s):
Dong-sheng XU
◽
Xiao-yan AI
◽
Shi-liang YAN
Keyword(s):
Intrusion Detection
◽
Fuzzy Rules
◽
Genetic Optimization
◽
Anomaly Intrusion Detection
Download Full-text
The Influence of Salp Swarm Algorithm-Based Feature Selection on Network Anomaly Intrusion Detection
IEEE Access
◽
10.1109/access.2021.3102095
◽
2021
◽
pp. 1-1
Author(s):
Alanoud Alsaleh
◽
Wojdan Binsaeedan
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Salp Swarm Algorithm
◽
Swarm Algorithm
◽
Anomaly Intrusion Detection
Download Full-text
Unsupervised Anomaly Intrusion Detection via Localized Bayesian Feature Selection
2011 IEEE 11th International Conference on Data Mining
◽
10.1109/icdm.2011.152
◽
2011
◽
Cited By ~ 24
Author(s):
Wentao Fan
◽
Nizar Bouguila
◽
Djemel Ziou
Keyword(s):
Feature Selection
◽
Intrusion Detection
◽
Anomaly Intrusion Detection
Download Full-text
A Fraud Detection System Based on Anomaly Intrusion Detection Systems for E-Commerce Applications
Computer and Information Science
◽
10.5539/cis.v7n2p117
◽
2014
◽
Vol 7
(2)
◽
Cited By ~ 4
Author(s):
Daniel Massa
◽
Raul Valverde
Keyword(s):
Intrusion Detection
◽
Detection System
◽
Fraud Detection
◽
Intrusion Detection Systems
◽
Detection Systems
◽
Anomaly Intrusion Detection
Download Full-text
Host-Based Intrusion Detection System with System Calls
ACM Computing Surveys
◽
10.1145/3214304
◽
2019
◽
Vol 51
(5)
◽
pp. 1-36
◽
Cited By ~ 19
Author(s):
Ming Liu
◽
Zhi Xue
◽
Xianghua Xu
◽
Changmin Zhong
◽
Jinjun Chen
Keyword(s):
Intrusion Detection
◽
Intrusion Detection System
◽
Detection System
◽
System Calls
Download Full-text
Using Naive Bayes with AdaBoost to Enhance Network Anomaly Intrusion Detection
2010 Third International Conference on Intelligent Networks and Intelligent Systems
◽
10.1109/icinis.2010.133
◽
2010
◽
Cited By ~ 6
Author(s):
Wei Li
◽
QingXia Li
Keyword(s):
Intrusion Detection
◽
Naive Bayes
◽
Naïve Bayes
◽
Anomaly Intrusion Detection
Download Full-text
Anomaly intrusion detection method for vehicular networks based on survival analysis
Vehicular Communications
◽
10.1016/j.vehcom.2018.09.004
◽
2018
◽
Vol 14
◽
pp. 52-63
◽
Cited By ~ 10
Author(s):
Mee Lan Han
◽
Byung Il Kwak
◽
Huy Kang Kim
Keyword(s):
Survival Analysis
◽
Intrusion Detection
◽
Vehicular Networks
◽
Detection Method
◽
Anomaly Intrusion Detection
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close