Now showing items 1-2 of 2
Learning rules from system call arguments and sequences for anomaly detection
Many approaches have been suggested and various systems have been modeled to detect intrusions from anomalous behavior of systems calls as a result of an attack. Though these techniques have been shown to be quite effective, ...
A representation scheme for finite length strings
This study is an attempt to create a canonical representation scheme for finite length strings to simplify the study of the theory behind different classes of patterns and to ease the understanding of the underlying ...