![Information technology management / Software / Computer security / Computer network security / Anomaly detection / Data mining / Intrusion detection system / Windows Registry / Malware / System software / Data security / Antivirus software Information technology management / Software / Computer security / Computer network security / Anomaly detection / Data mining / Intrusion detection system / Windows Registry / Malware / System software / Data security / Antivirus software](https://www.pdfsearch.io/img/74f63ee4fdcfd42e55b896938959df92.jpg) Date: 2006-10-19 19:27:44Information technology management Software Computer security Computer network security Anomaly detection Data mining Intrusion detection system Windows Registry Malware System software Data security Antivirus software | | A Comparative Evaluation of Two Algorithms for Windows Registry Anomaly Detection Salvatore J. Stolfo, Frank Apap, Eleazar Eskin, Katherine Heller, Shlomo Hershkop, Andrew Honig, and Krysta Svore {sal,fapap,eeskin,hellerAdd to Reading ListSource URL: www.gatsby.ucl.ac.ukDownload Document from Source Website File Size: 252,75 KBShare Document on Facebook
|