Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/784589.784655guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Detecting Anomalous and Unknown Intrusions Against Programs

Published: 07 December 1998 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2017)Long-Span Program Behavior Modeling and Attack DetectionACM Transactions on Privacy and Security10.1145/310576120:4(1-28)Online publication date: 20-Sep-2017
  • (2017)Towards Effective Trust-Based Packet Filtering in Collaborative Network EnvironmentsIEEE Transactions on Network and Service Management10.1109/TNSM.2017.266489314:1(233-245)Online publication date: 1-Mar-2017
  • (2017)Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problemKnowledge-Based Systems10.1016/j.knosys.2017.03.012126:C(113-126)Online publication date: 15-Jun-2017
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ACSAC '98: Proceedings of the 14th Annual Computer Security Applications Conference
December 1998
ISBN:0818687894

Publisher

IEEE Computer Society

United States

Publication History

Published: 07 December 1998

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2017)Long-Span Program Behavior Modeling and Attack DetectionACM Transactions on Privacy and Security10.1145/310576120:4(1-28)Online publication date: 20-Sep-2017
  • (2017)Towards Effective Trust-Based Packet Filtering in Collaborative Network EnvironmentsIEEE Transactions on Network and Service Management10.1109/TNSM.2017.266489314:1(233-245)Online publication date: 1-Mar-2017
  • (2017)Ramp loss K-Support Vector Classification-Regression; a robust and sparse multi-class approach to the intrusion detection problemKnowledge-Based Systems10.1016/j.knosys.2017.03.012126:C(113-126)Online publication date: 15-Jun-2017
  • (2017)A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacksJournal of Network and Computer Applications10.1016/j.jnca.2016.11.01278:C(162-169)Online publication date: 15-Jan-2017
  • (2017)Enhancing collaborative intrusion detection networks against insider attacks using supervised intrusion sensitivity-based trust management modelJournal of Network and Computer Applications10.1016/j.jnca.2016.09.01477:C(135-145)Online publication date: 1-Jan-2017
  • (2016)MVPSysComputers and Security10.1016/j.cose.2016.04.00760:C(177-192)Online publication date: 1-Jul-2016
  • (2016)HexPADSProceedings of the 8th International Symposium on Engineering Secure Software and Systems - Volume 963910.1007/978-3-319-30806-7_9(138-154)Online publication date: 6-Apr-2016
  • (2015)A Dynamic Approach to Detect Anomalous Queries on Relational DatabasesProceedings of the 5th ACM Conference on Data and Application Security and Privacy10.1145/2699026.2699120(245-252)Online publication date: 2-Mar-2015
  • (2015)A nature-inspired approach to speed up optimum-path forest clustering and its application to intrusion detection in computer networksInformation Sciences: an International Journal10.1016/j.ins.2014.09.025294:C(95-108)Online publication date: 10-Feb-2015
  • (2015)Design of intelligent KNN-based alarm filter using knowledge-based alert verification in intrusion detectionSecurity and Communication Networks10.1002/sec.13078:18(3883-3895)Online publication date: 1-Dec-2015
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media