A methodology to detect intrusion using system call base on discriminant analysis /
57
Main Authors: | , , |
---|---|
Format: | |
Language: | eng |
Published: |
Skudai : Universiti Teknologi Malaysia,
2003
|
Subjects: |
_version_ | 1826409017659883520 |
---|---|
author | 395913 Dahliyusmanto Dahlan Abdul Hanan Abdullah International Symposium on Information Technology (2003 : Kuala Lumpur) |
author_facet | 395913 Dahliyusmanto Dahlan Abdul Hanan Abdullah International Symposium on Information Technology (2003 : Kuala Lumpur) |
author_sort | 395913 Dahliyusmanto Dahlan |
collection | OCEAN |
description | 57 |
first_indexed | 2024-03-05T01:39:17Z |
format | |
id | KOHA-OAI-TEST:263310 |
institution | Universiti Teknologi Malaysia - OCEAN |
language | eng |
last_indexed | 2024-03-05T01:39:17Z |
publishDate | 2003 |
publisher | Skudai : Universiti Teknologi Malaysia, |
record_format | dspace |
spelling | KOHA-OAI-TEST:2633102020-12-19T17:08:22ZA methodology to detect intrusion using system call base on discriminant analysis / 395913 Dahliyusmanto Dahlan Abdul Hanan Abdullah International Symposium on Information Technology (2003 : Kuala Lumpur) Skudai : Universiti Teknologi Malaysia,2003eng575859PSZJBLComputer securityComputers |
spellingShingle | Computer security Computers 395913 Dahliyusmanto Dahlan Abdul Hanan Abdullah International Symposium on Information Technology (2003 : Kuala Lumpur) A methodology to detect intrusion using system call base on discriminant analysis / |
title | A methodology to detect intrusion using system call base on discriminant analysis / |
title_full | A methodology to detect intrusion using system call base on discriminant analysis / |
title_fullStr | A methodology to detect intrusion using system call base on discriminant analysis / |
title_full_unstemmed | A methodology to detect intrusion using system call base on discriminant analysis / |
title_short | A methodology to detect intrusion using system call base on discriminant analysis / |
title_sort | methodology to detect intrusion using system call base on discriminant analysis |
topic | Computer security Computers |
work_keys_str_mv | AT 395913dahliyusmantodahlan amethodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis AT abdulhananabdullah amethodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis AT internationalsymposiumoninformationtechnology2003kualalumpur amethodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis AT 395913dahliyusmantodahlan methodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis AT abdulhananabdullah methodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis AT internationalsymposiumoninformationtechnology2003kualalumpur methodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis |