Back to Results
First PageMeta Content
Computer vision / Anomaly detection / Intrusion detection system / Misuse detection / Synthetic data / Feature / Receiver operating characteristic / Statistics / Data security / Data mining


Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation Dae-Ki Kang1 , Doug Fuller2 , and Vasant Honavar1 1 Artificial Intelligence Lab, Department of Computer Science, Iowa State Universi
Add to Reading List

Document Date: 2005-08-08 19:37:58


Open Document

File Size: 127,94 KB

Share Result on Facebook
UPDATE