Voir la notice de l'article provenant de la source Math-Net.Ru
@article{CHEB_2021_22_5_a30, author = {V. L. Tokarev}, title = {Hidden markov models in the problem of detecting attacks on computer networks}, journal = {\v{C}eby\v{s}evskij sbornik}, pages = {391--399}, publisher = {mathdoc}, volume = {22}, number = {5}, year = {2021}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/CHEB_2021_22_5_a30/} }
V. L. Tokarev. Hidden markov models in the problem of detecting attacks on computer networks. Čebyševskij sbornik, Tome 22 (2021) no. 5, pp. 391-399. http://geodesic.mathdoc.fr/item/CHEB_2021_22_5_a30/
[1] Bazrafshan Z., Hashemi H., Fard S.M.H. and Hamzeh A., “A Survey on Heuristic Malware Detection Techniques”, The 5th Conference on Information and Knowledge Technology (IKT 2013) (Shiraz, 28-30 May 2013), 113–120 | DOI
[2] O.I. Shelukhin, D.Zh. Sakalema, A.S. Filinova, Obnaruzhenie vtorzhenii v kompyuternye seti (setevye anomalii), Goryachaya liniya - Telekom, M., 2013, 220 pp.
[3] Biryukov A.A., Informatsionnaya bezopasnost: zaschita i napadenie, DMK Press, M., 2012, 474 pp.
[4] Kris Kasperski, Kompyuternye virusy iznutri i snaruzhi, Piter, SbP., 2006, 526 pp.
[5] Tokarev V.L., Sychugov A.A., “Obnaruzhenie vredonosnogo programmnogo obespecheniya s ispolzovaniem immunnykh detektorov”, Izvestiya Tulskogo gosudarstvennogo universiteta. Tekhnicheskie nauki, 2017, no. 10, 216–230
[6] Alqurashi S. and Batarfi O., “A Comparison of Malware Detection Techniques Based on Hidden Markov Model”, Journal of Information Security, 7 (2016), 215–223 | DOI
[7] Frazzoli Emilio, “Intro to Hidden Markov Models the Baum-Welch Algorithm”, Aeronautics and Astronautics, Massachusetts Institute of Technology, 2013