A Fast Host-Based Intrusion Detection System Using Rough Set Theory. Rawat, S., Gulati, V. P., & Pujari, A. K. In Transactions on Rough Sets IV. August, 2005. Paper bibtex @incollection{rawat_fast_2005,
title = {A {Fast} {Host}-{Based} {Intrusion} {Detection} {System} {Using} {Rough} {Set} {Theory}},
url = {http://link.springer.com/chapter/10.1007/11574798_8},
booktitle = {Transactions on {Rough} {Sets} {IV}},
author = {Rawat, Sanjay and Gulati, Ved Prakash and Pujari, Arun K.},
month = aug,
year = {2005},
keywords = {anomaly, data mining, intrusion detection, system call-based anomaly detection, type\_backup, type\_journal},
}
Downloads: 0
{"_id":"s6K8STPjhAmjrekn8","bibbaseid":"rawat-gulati-pujari-afasthostbasedintrusiondetectionsystemusingroughsettheory-2005","author_short":["Rawat, S.","Gulati, V. P.","Pujari, A. K."],"bibdata":{"bibtype":"incollection","type":"incollection","title":"A Fast Host-Based Intrusion Detection System Using Rough Set Theory","url":"http://link.springer.com/chapter/10.1007/11574798_8","booktitle":"Transactions on Rough Sets IV","author":[{"propositions":[],"lastnames":["Rawat"],"firstnames":["Sanjay"],"suffixes":[]},{"propositions":[],"lastnames":["Gulati"],"firstnames":["Ved","Prakash"],"suffixes":[]},{"propositions":[],"lastnames":["Pujari"],"firstnames":["Arun","K."],"suffixes":[]}],"month":"August","year":"2005","keywords":"anomaly, data mining, intrusion detection, system call-based anomaly detection, type_backup, type_journal","bibtex":"@incollection{rawat_fast_2005,\n\ttitle = {A {Fast} {Host}-{Based} {Intrusion} {Detection} {System} {Using} {Rough} {Set} {Theory}},\n\turl = {http://link.springer.com/chapter/10.1007/11574798_8},\n\tbooktitle = {Transactions on {Rough} {Sets} {IV}},\n\tauthor = {Rawat, Sanjay and Gulati, Ved Prakash and Pujari, Arun K.},\n\tmonth = aug,\n\tyear = {2005},\n\tkeywords = {anomaly, data mining, intrusion detection, system call-based anomaly detection, type\\_backup, type\\_journal},\n}\n\n","author_short":["Rawat, S.","Gulati, V. P.","Pujari, A. K."],"key":"rawat_fast_2005","id":"rawat_fast_2005","bibbaseid":"rawat-gulati-pujari-afasthostbasedintrusiondetectionsystemusingroughsettheory-2005","role":"author","urls":{"Paper":"http://link.springer.com/chapter/10.1007/11574798_8"},"keyword":["anomaly","data mining","intrusion detection","system call-based anomaly detection","type_backup","type_journal"],"metadata":{"authorlinks":{}}},"bibtype":"incollection","biburl":"https://download.vusec.net/papers/zotero.php?tag=&full=1&format=bibtex&sort=date","dataSources":["DYdgdiJcjtYguaarA","LY5xkJFgS2sBQ9umB","cEmMXPermWEFsgmMR","kyF5HcxRfsLAWtEGF"],"keywords":["anomaly","data mining","intrusion detection","system call-based anomaly detection","type_backup","type_journal"],"search_terms":["fast","host","based","intrusion","detection","system","using","rough","set","theory","rawat","gulati","pujari"],"title":"A Fast Host-Based Intrusion Detection System Using Rough Set Theory","year":2005}