共 50 条
- [1] Distributed intrusion detection system based on fuzzy rules DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2006, 2006, 6241
- [3] An Intrusion Detection Approach Based on System Call Sequences and Rules Extraction 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 14 - 17
- [4] Improving Intrusion Detection System Based on Snort Rules for Network Probe Attack Detection 2014 2ND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2014,
- [5] Detection model of network abnormity based on fuzzy association rules for intrusion detection system ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS, 2003, : 4858 - 4861
- [6] A Novel Hierarchical Intrusion Detection System based on Decision Tree and Rules-based Models 2019 15TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (DCOSS), 2019, : 228 - 233
- [8] Research of Intrusion Detection Technology Based on Association Rules FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
- [9] Applying mining fuzzy association rules to intrusion detection based on sequences of system calls NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 826 - 835
- [10] Comparison of the Intrusion Detection System Rules in Relation with the SCADA Systems SOFTWARE ENGINEERING PERSPECTIVES AND APPLICATION IN INTELLIGENT SYSTEMS, VOL 2, 2016, 465 : 159 - 169