Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

ADFA-LD

biblio

Visible to the public A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns

Submitted by BrandonB on Thu, 04/30/2015 - 1:23pm
  • high-level programming languages
  • UNM data sets
  • system calls
  • semantic structure
  • security of data
  • Registers
  • program anomaly behaviour
  • operating systems (computers)
  • modern operating system
  • Logic gates
  • KDD98 data sets
  • Intrusion Detection
  • host-based IDS
  • host-based anomaly intrusion detection system design
  • ADFA-LD
  • high level languages
  • Gaussian processes
  • false alarm rates
  • discontiguous system call patterns
  • Cryptography
  • contiguous system call patterns
  • contemporary hacking methods
  • computer security
  • computer architecture
  • Complexity theory
  • Clocks
  • Anomaly Detection
biblio

Visible to the public A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguousand Discontiguous System Call Patterns

Submitted by BrandonB on Tue, 04/28/2015 - 1:06pm
  • high-level programming languages
  • UNM data sets
  • system calls
  • semantic structure
  • security of data
  • Registers
  • program anomaly behaviour
  • operating systems (computers)
  • modern operating system
  • Logic gates
  • KDD98 data sets
  • Intrusion Detection
  • host-based IDS
  • host-based anomaly intrusion detection system design
  • ADFA-LD
  • high level languages
  • Gaussian processes
  • false alarm rates
  • discontiguous system call patterns
  • Cryptography
  • contiguous system call patterns
  • contemporary hacking methods
  • computer security
  • computer architecture
  • Complexity theory
  • Clocks
  • Anomaly Detection

Terms of Use  |  ©2023. CPS-VO