共 9 条
[1]
ALMAMORY SO, 2008 INT JOINT C NEU, P3564
[2]
Intrusion scenarios detection based on data mining
[J].
PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7,
2008,
:1293-1297
[3]
Han J., Data Mining: Concepts and Techniques
[4]
A novel network Intrusion Detection System(NIDS) based on signatures search of data mining
[J].
FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS,
2007,
:10-+
[5]
Two formal analyses of attack graphs
[J].
15TH IEEE COMPUTER SECURITY FOUNDATION WORKSHOP, PROCEEDINGS,
2002,
:49-63
[6]
*KDD, 1999, 3 INT KNOWL DISC DAT
[7]
A data mining framework for building intrusion detection models
[J].
PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
1999,
:120-132
[8]
Liu Kai-yu, 2007, Journal of Natural Science of Hunan Normal University, V30, P6
[9]
WANG Q, 2005, SPIE C DAT MIN INTR