共 50 条
- [1] Mining Association Rules for Intrusion Detection FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 644 - +
- [2] Application of fuzzy association rules in intrusion detection 2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL IV, 2010, : 211 - 214
- [3] The Application of Association Rules to SVM Intrusion Detection 2011 INTERNATIONAL CONFERENCE ON FUTURE SOFTWARE ENGINEERING AND MULTIMEDIA ENGINEERING (FSME 2011), 2011, 7 : 45 - 49
- [5] Research of Intrusion Detection Technology Based on Association Rules FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
- [6] Intrusion Detection Based on Immune Principles and Fuzzy Association Rules INTELLIGENCE COMPUTATION AND EVOLUTIONARY COMPUTATION, 2013, 180 : 31 - 35
- [7] Hybrid Approach for Intrusion Detection using Fuzzy Association Rules 2018 2ND CYBER SECURITY IN NETWORKING CONFERENCE (CSNET), 2018,
- [8] Application of Association Rules Based on CF Gene in Intrusion Detection MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 2603 - 2606