Appliance of Independent Component Analysis to System Intrusion Analysis
不正侵入分析への独立成分解析の適用
Publisher site
{{ this.onShowPLink() }}
Copy service
{{ this.onShowCLink("http://jdream3.com/copy/?sid=JGLOBAL&noSystem=1&documentNoArray=04A0674640©=1") }}
Volume:
124
Issue:
9
Page:
1907-1913
Publication year:
Sep. 01, 2004
JST Material Number:
S0810A
ISSN:
0385-4221
Document type:
Article
Article type:
原著論文
Country of issue:
Japan (JPN)
Language:
JAPANESE (JA)
Thesaurus term:
Thesaurus term/Semi thesaurus term Keywords indexed to the article. All keywords is available on JDreamIII(charged). On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
To see more with JDream III (charged).
{{ this.onShowAbsJLink("http://jdream3.com/lp/jglobal/index.html?docNo=04A0674640&from=J-GLOBAL&jstjournalNo=S0810A") }}
JST classification (1):
JST classification
Category name(code) classified by JST.
(2) R. P. Lippmann, D. J. Fried, I. Graf, J. W. Haines, K. R. Kendall, D. McClung, D. Weber, S. E. Webster, D. Wyschogrod, R. K. Cunningham, and M. A. Zissman : “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-line Intrusion Detection Evaluation”, Proc. of the DARPA Information Survivability Conference & Exposition, Vol. II, No. II (1998)
(3) W. Lee, S. J. Stolfo, and K. W. Mok : “A Data Mining Framework for Building Intrusion Detection Models”, IEEE Symp. Security & Privacy (1999)
(4) J. B. D. Cabrera, B. Ravichandran, and R. K. Mehra : “Statistical Traffic Modeling for Network Intrusion Detection”, 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (2000)