On the Detection of Anomalous System Call Arguments
- 1 January 2003
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Mimicry attacks on host-based intrusion detection systemsPublished by Association for Computing Machinery (ACM) ,2002
- Undermining an Anomaly-Based Intrusion Detection System Using Common ExploitsPublished by Springer Nature ,2002
- Learning Fingerprints for a Database Intrusion Detection SystemPublished by Springer Nature ,2002
- RemusACM Transactions on Information and System Security, 2002
- STATL: An attack language for state-based intrusion detectionJournal of Computer Security, 2002
- Mining in a data-flow environmentPublished by Association for Computing Machinery (ACM) ,1999
- Detecting Anomalous and Unknown Intrusions against Programs in Real-Time.Published by Defense Technical Information Center (DTIC) ,1997
- Inducing probabilistic grammars by Bayesian model mergingPublished by Springer Nature ,1994
- An Intrusion-Detection ModelIEEE Transactions on Software Engineering, 1987