1 |
A. Ghosh and A. Schwartzbard. 'A study in detection'. In proceedings of the Eighth USENIX security Symposium, 1999
|
2 |
T. lane and C. E. Brodley. 'Detecting abnormal:Machine learning in computer security', Technical Report TR-ECE 97-1, Prudue University, West Lafayette, IN, 1997
|
3 |
Jai Sundar B. Spafford E, 'Software Agents for Intrusion Detection,' Technical Report, Purdue University, Department of Computer Science, 1997
|
4 |
Crosbie M, Spafford E, 'Defending a Computer System using Autonomous Agents,' Technical Report, Purdue University, Department of Computer Science, 1996
|
5 |
Wenke Lee, Salvatore J.Stolfo, Philip k.Chan, 'Real Time Data Mining-based Intrusion Detection'. In proceedings of IEEE symposium on research in security and privacy, 2000
|
6 |
은유진, 박정호, '침입 탐지 기술 분류 및 기술적 구성요소', 정보보호센터 정보보호 뉴스 1998.7 통권 13호
|
7 |
T. Lane and C. E. Brodley. "Temporal sequence learning and data reduction dor anomaly detection“. In Processsing of the fifth ACM Conference on Computer and Communications Security, pages 150-158, 1998
|
8 |
W.Lee, S.J.Stolfo, and K.Mok, 'A Data Mining Framework for Building Intrusion Detection Models', 1999 IEEE Symposium on security and Privacy, 1999
|
9 |
W. Lee, S. J. Stolfo. 'Data mining approaches for intrusion detection'. In Proceding of the 1998 USENIX security Symposium, 1998
|
10 |
편석범,정종근, 이윤배, '데이터 마이닝 기법을 적용한 최적 침입 탐지 모듈 설계', 1999. 춘계정보과학회 논문집
|
11 |
T. Fawcett and F. Provost. 'Adaptive fraud detection Data Mining and Knowledge Discovery'. 1:291-316, 1997
|
12 |
Sandeep Kumar, gene Spafford. “A Pattern Matching Model for Misuse Intrusion Detection”, Proceedings of the 17th National Computer Security Conference, October 1994
|
13 |
편석범, 정종근, 이윤배, '패턴 추출 에이전를 이용한 분산 침입 탐지 시스템 모델 설계 및 성능평가', 2000,12 대한전자공학회 논문지(TE권)
|