共 50 条
[32]
Integrating Intrusion Detection System and Data Mining
[J].
INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS,
2008,
:256-259
[33]
Detection model of network abnormity based on fuzzy association rules for intrusion detection system
[J].
ISTM/2003: 5TH INTERNATIONAL SYMPOSIUM ON TEST AND MEASUREMENT, VOLS 1-6, CONFERENCE PROCEEDINGS,
2003,
:4858-4861
[34]
A model for mobile agent based intrusion detection system
[J].
ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 2,
2005,
:569-574
[35]
Association rule mining in DoS attack detection and defense in the application of network
[J].
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, INFORMATION AND MEDICINE (EMIM 2015),
2015, 8
:445-449
[36]
A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol
[J].
ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY,
2021,
[37]
Research on the data-mining-based intrusion detection technology
[J].
2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 1,
2008,
:515-518