1 |
Marco Pagni, 'Introduction to Patterns, Profiles and Hidden Markov Models', Swiss Institute of Bioinformatics(SIB), August 30, 2002
|
2 |
Christopher M. Bishop, 'Neural Networks for Pattern Recognition', Oxford Press, pp.429-433, 1995
|
3 |
Wenke Lee, Salvatore J. Stolfo, Philip K. Chan, Eleazar Eskin, Wei Fan, Matthew Miller, Shlomo Hershkop, and Junxin Zhang, 'Real Time Data Mining -based Intrusion Detection', Proceedings of DISCEX II. June 2001
|
4 |
http://www.archives.gov/research_room/genealogy/census/soundex.html
|
5 |
http://cs.unm.edu/~immsec/data/syn-thsm.html
|
6 |
Jack Marin, Daniel Ragsdale, and John Shurdu, 'A Hybrid Approach to the Profile Creation and Intrusion Detection', Proceedings of DARPA Information Survivability Conference and Exposition, IEEE, pp.69-76, 2001
|
7 |
Nong Ye, and Xiangyang Li, 'A Scalable Clustering Technique for Intrusion Signature Recognition', Proceedings of 2001 IEEE Workshop on Information Assurance and Security, pp. 1-4, 2001
|
8 |
김미혜, '퍼지적분을 이용한 침입탐지시스템 평가방법', 정보보호학회논문지, 제14권 제2호, 2004년 2월
|
9 |
L. Portnoy, E. Eskin, S. Stolfo, 'Intrusion detection with unlabeled data using clustering', In ACM Workshop on Data Mining Applied to Security, 2001
|
10 |
James A. Freeman and David M. Skapura, 'Neural Networks : Algorithms, Applications, and Programming Techniques', p89-123, Addison Wesley, 1992
|
11 |
황현욱, 김민수, 노봉남, '감사로그 상관관계를 통한 호스트기반의 침입탐지시스템', 정보보호학회논문지, 제13권 제3호, 2003년 6월
|
12 |
유은진, 전문석, '비정상적인 컴퓨터 행위 방지를 위한 실시간 침입 탐지 병렬 시스템에 관한 연구', 통신정보보호학회지 제5권 제2호, 1995년 6월
|
13 |
Christina Warrender, Stephanie Forrest, Barak Pearlmutter, 'Detecting Intrusion Using System Calls : Alternative Data Models', In 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society, pp. 133-145, 1999
|