[1]
|
A tfidfvectorizer and singular value decomposition based host intrusion detection system framework for detecting anomalous system processes
Computers & Security,
2021
DOI:10.1016/j.cose.2020.102084
|
|
|
[2]
|
procmonML: Generating evasion resilient host-based behavioral analytics from tree ensembles
Computers & Security,
2020
DOI:10.1016/j.cose.2020.102002
|
|
|
[3]
|
Comprehensive Review of Cybercrime Detection Techniques
IEEE Access,
2020
DOI:10.1109/ACCESS.2020.3011259
|
|
|
[4]
|
Sequence Covering for Efficient Host-Based Intrusion Detection
IEEE Transactions on Information Forensics and Security,
2019
DOI:10.1109/TIFS.2018.2868614
|
|
|
[5]
|
A Lightweight Perceptron-Based Intrusion Detection System for Fog Computing
Applied Sciences,
2019
DOI:10.3390/app9010178
|
|
|
[6]
|
SON KULLANICILAR İÇİN ANOMALİ SALDIRI TESPİT SİSTEMLERİ
Eskişehir Osmangazi Üniversitesi Mühendislik ve Mimarlık Fakültesi Dergisi,
2019
DOI:10.31796/ogummf.560747
|
|
|
[7]
|
EagleEye: A Novel Visual Anomaly Detection Method
2018 16th Annual Conference on Privacy, Security and Trust (PST),
2018
DOI:10.1109/PST.2018.8514179
|
|
|
[8]
|
Ensemble classifier for misuse detection using N-gram feature vectors through operating system call traces
International Journal of Hybrid Intelligent Systems,
2017
DOI:10.3233/HIS-170247
|
|
|
[9]
|
Host based intrusion detection system using frequency analysis of n-gram terms
TENCON 2017 - 2017 IEEE Region 10 Conference,
2017
DOI:10.1109/TENCON.2017.8228190
|
|
|