Author/Authors :
Dit-Yan Yeung، نويسنده , , Yuxin Ding، نويسنده ,
Keywords :
System call , anomaly detection , Hidden Markov model , Data mining , Intrusion detection , Pro/ling , maximum likelihood , Minimumcross entropy , Shell command , Computer security