咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 1 篇 信息与通信工程
    • 1 篇 计算机科学与技术...
    • 1 篇 网络空间安全

主题

  • 3 篇 system calls
  • 2 篇 intrusion detect...
  • 1 篇 zero-day attacks
  • 1 篇 virtual machine ...
  • 1 篇 unidentified seq...
  • 1 篇 ransomware
  • 1 篇 classification m...
  • 1 篇 network security
  • 1 篇 second-order sto...

机构

  • 1 篇 school of inform...
  • 1 篇 information&comp...
  • 1 篇 department of co...
  • 1 篇 school of logist...

作者

  • 1 篇 farag azzedin
  • 1 篇 吴裕树
  • 1 篇 杨勇
  • 1 篇 zhang xiaoqiang ...
  • 1 篇 husam suwad
  • 1 篇 md mahfuzur rahm...
  • 1 篇 刘玉树
  • 1 篇 彭新光

语言

  • 3 篇 英文
检索条件"主题词=System calls"
3 条 记 录,以下是1-10 订阅
排序:
Classification Model with High Deviation for Intrusion Detection on system Call Traces
收藏 引用
Journal of Beijing Institute of Technology 2005年 第3期14卷 260-263页
作者: 彭新光 刘玉树 吴裕树 杨勇 School of Information Science and Technology Beijing Institute of Technology Beijing100081 China Department of Computer Science and Technology Taiyuan University of Technology Taiyuan030024 China
A new classification model for host intrusion detection based on the unidentified short sequences and RIPPER algorithm is proposed. The concepts of different short sequences on the system call traces are strictly defi... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
An Asset-Based Approach to Mitigate Zero-Day Ransomware Attacks
收藏 引用
Computers, Materials & Continua 2022年 第11期73卷 3003-3020页
作者: Farag Azzedin Husam Suwad Md Mahfuzur Rahman Information&Computer Science Department KFUPMDhahranKSA
This article presents an asset-based security system where security practitioners build their systems based on information they own and not solicited by observing attackers’*** security solutions rely on information ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
INTRUSION DETECTION BASED ON THE SECOND-ORDER STOCHASTIC MODEL
收藏 引用
Journal of Electronics(China) 2007年 第5期24卷 679-685页
作者: Zhang Xiaoqiang Zhu Zhongliang Fan Pingzhi School of Logistics Southwest Jiaotong University Chengdu 610031 China
This paper presents a new method based on a second-order stochastic model for computer intrusion *** results show that the performance of the second-order stochastic model is better than that of a first-order stochast... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论