共 50 条
[21]
A Model of Intrusion Detection Based on Data Mining in Campus Network
[J].
NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION,
2010,
:317-+
[22]
Network intrusion detection based on system calls and data mining
[J].
FRONTIERS OF COMPUTER SCIENCE IN CHINA,
2010, 4 (04)
:522-528
[23]
Network intrusion detection based on system calls and data mining
[J].
Frontiers of Computer Science in China,
2010, 4
:522-528
[24]
Research on Immune based Adaptive Intrusion Detection System Model
[J].
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS,
2009,
:488-491
[25]
The Research on the Application of Association Rules Mining Algorithm in Network Intrusion Detection
[J].
PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II,
2009,
:849-+
[27]
Cyber intrusion detection through association rule mining on multi-source logs
[J].
Applied Intelligence,
2021, 51
:4043-4057
[28]
Realization of Intrusion Detection System based on the Improved Data Mining Technology
[J].
PROCEEDINGS OF THE 2013 8TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2013),
2013,
:982-987
[29]
Data mining for intrusion detection
[J].
2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE,
2001,
:E7-E12
[30]
A New Data-Mining Based Approach for Network Intrusion Detection
[J].
2009 7TH ANNUAL COMMUNICATION NETWORKS AND SERVICES RESEARCH CONFERENCE,
2009,
:372-377