A methodology to detect intrusion using system call base on discriminant analysis /

57

Bibliographic Details
Main Authors: 395913 Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Symposium on Information Technology (2003 : Kuala Lumpur)
Format:
Language:eng
Published: Skudai : Universiti Teknologi Malaysia, 2003
Subjects:
_version_ 1826409017659883520
author 395913 Dahliyusmanto Dahlan
Abdul Hanan Abdullah
International Symposium on Information Technology (2003 : Kuala Lumpur)
author_facet 395913 Dahliyusmanto Dahlan
Abdul Hanan Abdullah
International Symposium on Information Technology (2003 : Kuala Lumpur)
author_sort 395913 Dahliyusmanto Dahlan
collection OCEAN
description 57
first_indexed 2024-03-05T01:39:17Z
format
id KOHA-OAI-TEST:263310
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T01:39:17Z
publishDate 2003
publisher Skudai : Universiti Teknologi Malaysia,
record_format dspace
spelling KOHA-OAI-TEST:2633102020-12-19T17:08:22ZA methodology to detect intrusion using system call base on discriminant analysis / 395913 Dahliyusmanto Dahlan Abdul Hanan Abdullah International Symposium on Information Technology (2003 : Kuala Lumpur) Skudai : Universiti Teknologi Malaysia,2003eng575859PSZJBLComputer securityComputers
spellingShingle Computer security
Computers
395913 Dahliyusmanto Dahlan
Abdul Hanan Abdullah
International Symposium on Information Technology (2003 : Kuala Lumpur)
A methodology to detect intrusion using system call base on discriminant analysis /
title A methodology to detect intrusion using system call base on discriminant analysis /
title_full A methodology to detect intrusion using system call base on discriminant analysis /
title_fullStr A methodology to detect intrusion using system call base on discriminant analysis /
title_full_unstemmed A methodology to detect intrusion using system call base on discriminant analysis /
title_short A methodology to detect intrusion using system call base on discriminant analysis /
title_sort methodology to detect intrusion using system call base on discriminant analysis
topic Computer security
Computers
work_keys_str_mv AT 395913dahliyusmantodahlan amethodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis
AT abdulhananabdullah amethodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis
AT internationalsymposiumoninformationtechnology2003kualalumpur amethodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis
AT 395913dahliyusmantodahlan methodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis
AT abdulhananabdullah methodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis
AT internationalsymposiumoninformationtechnology2003kualalumpur methodologytodetectintrusionusingsystemcallbaseondiscriminantanalysis