Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/647593.728880guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Learning Program Behavior Profiles for Intrusion Detection

Published: 09 April 1999 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
April 1999
137 pages
ISBN:1880446375

Publisher

USENIX Association

United States

Publication History

Published: 09 April 1999

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)SifterProceedings of the 28th Annual International Conference on Mobile Computing And Networking10.1145/3495243.3560548(623-635)Online publication date: 14-Oct-2022
  • (2021)Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc NetworksInternational Journal of Systems and Software Security and Protection10.4018/IJSSSP.202107010212:2(11-32)Online publication date: 1-Jul-2021
  • (2018)Host-Based Intrusion Detection System with System CallsACM Computing Surveys10.1145/321430451:5(1-36)Online publication date: 19-Nov-2018
  • (2018)A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic DataProceedings of the 2018 10th International Conference on Machine Learning and Computing10.1145/3195106.3195117(26-30)Online publication date: 26-Feb-2018
  • (2018)Quantifying the security effectiveness of firewalls and DMZsProceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security10.1145/3190619.3190639(1-11)Online publication date: 10-Apr-2018
  • (2015)URL query string anomaly sensor designed with the bidimensional Haar wavelet transformInternational Journal of Information Security10.1007/s10207-015-0276-y14:6(561-581)Online publication date: 1-Nov-2015
  • (2014)A malicious behavior analysis based Cyber-I birthJournal of Intelligent Manufacturing10.1007/s10845-012-0681-225:1(147-155)Online publication date: 1-Feb-2014
  • (2013)A close look on n-grams in intrusion detectionProceedings of the 2013 ACM workshop on Artificial intelligence and security10.1145/2517312.2517316(67-76)Online publication date: 4-Nov-2013
  • (2012)On the pattern recognition and classification of stochastically episodic eventsTransactions on Compuational Collective Intelligence VI10.1007/978-3-642-29356-6_1(1-35)Online publication date: 1-Jan-2012
  • (2011)Specification-based intrusion detection system for WiBroProceedings of the 5th international conference on Convergence and hybrid information technology10.5555/2045005.2045066(445-455)Online publication date: 22-Sep-2011
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media