共 50 条
[41]
Design of data mining-based intrusion detection system
[J].
ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2,
2005,
:93-95
[42]
Data Mining for Network Intrusion Detection System in Real Time
[J].
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY,
2006, 6 (2B)
:173-177
[43]
Network intrusion detection based on system calls and data mining
[J].
FRONTIERS OF COMPUTER SCIENCE IN CHINA,
2010, 4 (04)
:522-528
[44]
Hybrid intrusion detection method to increase anomaly detection by using data mining techniques
[J].
International Journal of Database Theory and Application,
2016, 9 (12)
:231-240
[45]
Network intrusion detection based on system calls and data mining
[J].
Frontiers of Computer Science in China,
2010, 4
:522-528
[46]
Anomaly Intrusion Detection Based Upon Data Mining Techniques and Fuzzy Logic
[J].
PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC),
2012,
:514-517
[48]
Intrusion Detection Based on Data Mining
[J].
EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS,
2009,
:696-701
[49]
A Study of Intrusion Detection in Data Mining
[J].
WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III,
2011,
:1889-1894
[50]
Study of data mining in intrusion detection
[J].
Moshi Shibie yu Rengong Zhineng/Pattern Recognition and Artificial Intelligence,
2008, 21 (04)
:520-526