Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/784589.784654guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Intrusion Detection Applying Machine Learning to Solaris Audit Data

Published: 07 December 1998 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2018)PAREEKSHAProceedings of the First International Conference on Data Science, E-learning and Information Systems10.1145/3279996.3280032(1-6)Online publication date: 1-Oct-2018
  • (2018)Performance comparison of intrusion detection systems and application of machine learning to Snort systemFuture Generation Computer Systems10.1016/j.future.2017.10.01680:C(157-170)Online publication date: 1-Mar-2018
  • (2016)A novel isolation-based outlier detection methodProceedings of the 14th Pacific Rim International Conference on Trends in Artificial Intelligence10.1007/978-3-319-42911-3_37(446-456)Online publication date: 22-Aug-2016
  • Show More Cited By

Index Terms

  1. Intrusion Detection Applying Machine Learning to Solaris Audit Data
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Guide Proceedings
      ACSAC '98: Proceedings of the 14th Annual Computer Security Applications Conference
      December 1998
      ISBN:0818687894

      Publisher

      IEEE Computer Society

      United States

      Publication History

      Published: 07 December 1998

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 01 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)PAREEKSHAProceedings of the First International Conference on Data Science, E-learning and Information Systems10.1145/3279996.3280032(1-6)Online publication date: 1-Oct-2018
      • (2018)Performance comparison of intrusion detection systems and application of machine learning to Snort systemFuture Generation Computer Systems10.1016/j.future.2017.10.01680:C(157-170)Online publication date: 1-Mar-2018
      • (2016)A novel isolation-based outlier detection methodProceedings of the 14th Pacific Rim International Conference on Trends in Artificial Intelligence10.1007/978-3-319-42911-3_37(446-456)Online publication date: 22-Aug-2016
      • (2015)A Formal Framework for Program Anomaly DetectionProceedings of the 18th International Symposium on Research in Attacks, Intrusions, and Defenses - Volume 940410.1007/978-3-319-26362-5_13(270-292)Online publication date: 2-Nov-2015
      • (2009)Employing artificial immunology and approximate reasoning models for enhanced network intrusion detectionWSEAS Transactions on Information Science and Applications10.5555/1512690.15126956:2(190-200)Online publication date: 1-Feb-2009
      • (2009)Anomaly detectionACM Computing Surveys10.1145/1541880.154188241:3(1-58)Online publication date: 30-Jul-2009
      • (2004)An new intrusion detection method based on linear predictionProceedings of the 3rd international conference on Information security10.1145/1046290.1046323(160-165)Online publication date: 14-Nov-2004
      • (2004)User re-authentication via mouse movementsProceedings of the 2004 ACM workshop on Visualization and data mining for computer security10.1145/1029208.1029210(1-8)Online publication date: 29-Oct-2004
      • (2002)Simple, state-based approaches to program-based anomaly detectionACM Transactions on Information and System Security10.1145/545186.5451875:3(203-237)Online publication date: 1-Aug-2002
      • (1999)Learning program behavior profiles for intrusion detectionProceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring - Volume 110.5555/1267880.1267886(6-6)Online publication date: 9-Apr-1999
      • Show More Cited By

      View Options

      View options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media