共 50 条
[41]
Design of Intrusion Detection Model Based on Data Mining Technology
[J].
2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE),
2012,
:571-574
[42]
Design of a distributed intrusion detection system based on independent agents
[J].
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTELLIGENT SENSING AND INFORMATION PROCESSING,
2004,
:254-257
[43]
Design of Intrusion Detection System Based on Data Mining Algorithm
[J].
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS,
2009,
:370-373
[44]
Design of data mining-based intrusion detection system
[J].
ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2,
2005,
:93-95
[45]
Design of the Computer Intrusion Detection System
[J].
PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL,
2015, 125
:747-751
[46]
An Enhanced Intrusion Detection System Based on Clustering
[J].
PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, VOL 2,
2018, 564
:37-45
[47]
State analysis based on the agreement of the Intrusion Detection System Model
[J].
ICMS2010: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION, VOL 6: MODELLING & SIMULATION INDUSTRIAL ENGINEERING & MANAGEMENT,
2010,
:177-180
[48]
Research on Immune based Adaptive Intrusion Detection System Model
[J].
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS,
2009,
:488-491
[49]
Intrusion Detection Model Based on Hierarchical Fuzzy Inference System
[J].
ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 2, PROCEEDINGS: IMAGE ANALYSIS, INFORMATION AND SIGNAL PROCESSING,
2009,
:144-+
[50]
Research on Intrusion Detection System Model Based on Data Mining
[J].
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012),
2012,
:113-116