First‐order versus high‐order stochastic models for computer intrusion detection
- 29 May 2002
- journal article
- Published by Wiley in Quality and Reliability Engineering International
- Vol. 18 (3), 243-250
- https://doi.org/10.1002/qre.478
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- Detecting intrusions using system calls: alternative data modelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- A neural network component for an intrusion detection systemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Modeling system calls for intrusion detection with dynamic window sizesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A process control approach to cyber attack detectionCommunications of the ACM, 2001
- Probabilistic techniques for intrusion detection based on computer audit dataIEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2001
- An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systemsQuality and Reliability Engineering International, 2001
- Fixed- vs. variable-length patterns for detecting suspicious process behaviorJournal of Computer Security, 2000
- Towards a taxonomy of intrusion-detection systemsComputer Networks, 1999
- Stochastic Modeling of Scientific DataPublished by Springer Science and Business Media LLC ,1995
- The Relative Operating Characteristic in PsychologyScience, 1973