共 50 条
[21]
Anomaly intrusion detection based on clustering a data stream
[J].
INFORMATION SECURITY, PROCEEDINGS,
2006, 4176
:415-426
[23]
A clustering algorithm for intrusion detection
[J].
DATA MINING, INTRUSION DETECTION, INFORMATION ASSURANCE, AND DATA NETWORKS SECURITY 2005,
2005, 5812
:31-38
[24]
Go With the Flow: Clustering Dynamically-Defined NetFlow Features for Network Intrusion Detection with DYNIDS
[J].
2020 IEEE 19TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA),
2020,
[26]
A Clustering-Based Method for Intrusion Detection in Web Servers
[J].
2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT),
2013,
[27]
The Research of Intrusion Detection Algorithms Based on the Clustering of Information Entropy
[J].
2011 INTERNATIONAL CONFERENCE OF ENVIRONMENTAL SCIENCE AND ENGINEERING, VOL 12, PT B,
2012, 12
:1329-1334
[28]
Feature Grouping for Intrusion Detection System Based on Hierarchical Clustering
[J].
AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS,
2014, 8708
:270-+
[29]
Clustering based on swarm intelligence with application to anomaly intrusion detection
[J].
Proceedings of the 11th Joint International Computer Conference,
2005,
:488-491
[30]
Clustering for Intrusion Detection: Network Scans as a Case of Study
[J].
INTERNATIONAL JOINT CONFERENCE CISIS'12 - ICEUTE'12 - SOCO'12 SPECIAL SESSIONS,
2013, 189
:33-+