Xuetao Duan

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
The signature database of intrusion detection system is usually built by the short sequences of system call. The real-time efficiency and accuracy of intrusion detection is greatly influenced by the scale of signature database and the approach of intrusion data analysis. In this paper, a typical set method is provided to compress the normal signature(More)
  • 1