共 7 条
[1]
[Anonymous], LECT NOTES COMPUTER
[2]
Gupta Kapil Kumar, 2010, LAYERED APPROACH USI, V7
[3]
Lappas T, DATA MINING TECHNIQU
[4]
A data mining framework for building intrusion detection models
[J].
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
1999,
:120-132
[5]
Lee W., MINING DATA FLOW ENV
[6]
Tavallaee M., 2009, DETAILED ANAL KDD CU
[7]
VedaKReSIT Anshu, INTRUSION DETECTION