1 |
H.S. Vaccaro and G.E. Liepins, 'Detection of anomalous computer session activity,' Proc. IEEE Symp. on Research in Security and Privacy, pp. 280-289, 1989
DOI
|
2 |
C. Warrender, S. Forrest and B. Pearlmutter, 'Detecting intrusion using calls: Alternative data models,' IEEE Symposium on Security and Privacy, May 1999
DOI
|
3 |
최종호, 조성배, '은닉 마르코프 모델에 기반한 정상행위의 순서적 이벤트 모델링을 통한 침입탐지 시스템', 정보과학회, pp 306-308, 1999
과학기술학회마을
|
4 |
B.A. Kuperman and Eugene H. Spafford. 'Generation of application level audit data via library interposition,' CERIAS TR 99-11, COAST Laboratory, Purdue University, West Lafaytte, IN, October 1998
|
5 |
T. F. Lunt, 'A survey of intrusion detection techniques,' Computer & Security, vol. 12, no. 4, June 1993
DOI
ScienceOn
|
6 |
H.S. Javitz and A. Valdes, 'The SRI IDES statistical anomaly detector,' NIDES Technical Report, 1994
|
7 |
J. Hochberg, et al, 'Nadir: An automated system for detecting network intrusion and misuse,' Computers & Security, vol. 12, no. 3, pp. 235-248, 1993
DOI
ScienceOn
|
8 |
K.E. Price, 'Hostbased misuse detection and conventional operating system's audit data collection,' M.S. Dissertaion, Purdue University, Purdue, IN, December 1997
|
9 |
H. Debar, M. Becker and D. Siboni, 'A neural network component for an intrusion detection system,' Proc. 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 240-250, Oakland, CA, May 1992
DOI
|
10 |
L.R. Rabiner, 'A tutorial on hidden Markov models and selected applications in speech recognition,' Proc. of the IEEE, vol. 77, no. 2, 1989
DOI
ScienceOn
|
11 |
S. Axelsson, 'Research in Intrusion-Detection Systems: A Survey,' Chalmers University of Technology, 1999
|
12 |
CERTCC-KR, 한국정보보호진흥원, http://www.certcc.or.kr/
|
13 |
L.R. Rabiner and B.H. Juang, 'An introduction to hidden Markov models,' IEEE ASSP Magazine, 1986
|