[PDF][PDF] An application of machine learning to anomaly detection

T Lane, CE Brodley - Proceedings of the 20th national information …, 1997 - cerias.purdue.edu
The anomaly detection problem has been widely studied in the computer security literature.
In this paper we present a machine learning approach to anomaly detection. Our system …

[PS][PS] Agent Tcl: A flexible and secure mobile-agent system

RS Gray - 1997 - usenix.org
An information agent manages all or a portion of a user's information space. The electronic
resources in this space are often distributed across a network and can contain tremendous …

[PDF][PDF] Sequence matching and learning in anomaly detection for computer security

T Lane, CE Brodley - AAAI Workshop: AI Approaches to Fraud …, 1997 - cdn.aaai.org
Two problems of importance in computer security are to 1) detect the presence of an intruder
masquerading as the valid user and 2) detect the perpetration of abusive actions on the part …

[图书][B] Sistemas operativos

W Stallings, LJ Aguilar, JM Dodero, E Torres, MK Mora - 1997 - dspace.scz.ucb.edu.bo
Contenido Page 1 Contenido PRÓLOGO CAPÍTULO 1 INTRODUCCIÓN A LOS SISTEMAS
INFORMÁTICOS............ 1 1. 1. Elementos básicos …

[PDF][PDF] Lightweight intrusion detection for networked operating systems

S Hofmeyr, S Forrest, A Sornayaji - Journal of Computer Security, 1997 - cs.carleton.ca
We describe a method for intrusion detection at the level of privileged processes. We
present evidence that short sequences of system calls executed by running processes are a …

[引用][C] An Application of Machine Learning to

A Detection, T Lane, CE Brodley - 1997