作者: Steven A. Hofmeyr , Stephanie Forrest , Anil Somayaji
DOI: 10.3233/JCS-980109
关键词:
摘要: … work in intrusion detection. Section 3 describes our method of anomaly intrusion detection: … behavior, and then we define three ways of detecting anomalies. We then use the method to …