Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/646647.699202guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior

Published: 16 September 1998 Publication History
  • Get Citation Alerts
  • Abstract

    No abstract available.

    Cited By

    View all
    • (2021)Living-Off-The-Land Command Detection Using Active LearningProceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3471621.3471858(442-455)Online publication date: 6-Oct-2021
    • (2009)Anomaly detectionACM Computing Surveys10.1145/1541880.154188241:3(1-58)Online publication date: 30-Jul-2009
    • (2004)Basic Concepts and Taxonomy of Dependable and Secure ComputingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2004.21:1(11-33)Online publication date: 1-Jan-2004
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    ESORICS '98: Proceedings of the 5th European Symposium on Research in Computer Security
    September 1998
    365 pages

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 16 September 1998

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2021)Living-Off-The-Land Command Detection Using Active LearningProceedings of the 24th International Symposium on Research in Attacks, Intrusions and Defenses10.1145/3471621.3471858(442-455)Online publication date: 6-Oct-2021
    • (2009)Anomaly detectionACM Computing Surveys10.1145/1541880.154188241:3(1-58)Online publication date: 30-Jul-2009
    • (2004)Basic Concepts and Taxonomy of Dependable and Secure ComputingIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2004.21:1(11-33)Online publication date: 1-Jan-2004
    • (2001)Characterizing the behavior of a program using multiple-length N-gramsProceedings of the 2000 workshop on New security paradigms10.1145/366173.366197(101-110)Online publication date: 20-Feb-2001

    View Options

    View options

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media