@article{CHEB_2021_22_5_a30,
author = {V. L. Tokarev},
title = {Hidden markov models in the problem of detecting attacks on computer networks},
journal = {\v{C}eby\v{s}evskij sbornik},
pages = {391--399},
year = {2021},
volume = {22},
number = {5},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/CHEB_2021_22_5_a30/}
}
V. L. Tokarev. Hidden markov models in the problem of detecting attacks on computer networks. Čebyševskij sbornik, Tome 22 (2021) no. 5, pp. 391-399. http://geodesic.mathdoc.fr/item/CHEB_2021_22_5_a30/
[1] Bazrafshan Z., Hashemi H., Fard S.M.H. and Hamzeh A., “A Survey on Heuristic Malware Detection Techniques”, The 5th Conference on Information and Knowledge Technology (IKT 2013) (Shiraz, 28-30 May 2013), 113–120 | DOI
[2] O.I. Shelukhin, D.Zh. Sakalema, A.S. Filinova, Obnaruzhenie vtorzhenii v kompyuternye seti (setevye anomalii), Goryachaya liniya - Telekom, M., 2013, 220 pp.
[3] Biryukov A.A., Informatsionnaya bezopasnost: zaschita i napadenie, DMK Press, M., 2012, 474 pp.
[4] Kris Kasperski, Kompyuternye virusy iznutri i snaruzhi, Piter, SbP., 2006, 526 pp.
[5] Tokarev V.L., Sychugov A.A., “Obnaruzhenie vredonosnogo programmnogo obespecheniya s ispolzovaniem immunnykh detektorov”, Izvestiya Tulskogo gosudarstvennogo universiteta. Tekhnicheskie nauki, 2017, no. 10, 216–230
[6] Alqurashi S. and Batarfi O., “A Comparison of Malware Detection Techniques Based on Hidden Markov Model”, Journal of Information Security, 7 (2016), 215–223 | DOI
[7] Frazzoli Emilio, “Intro to Hidden Markov Models the Baum-Welch Algorithm”, Aeronautics and Astronautics, Massachusetts Institute of Technology, 2013