共 50 条
[21]
Intrusion detection using data mining
[J].
Puthran, Shubha (shubha.puthran@nmims.edu),
1600, Inderscience Publishers (09)
:292-306
[22]
Adaptive intrusion detection with data mining
[J].
2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS,
2003,
:3097-3103
[23]
A Study of Intrusion Detection in Data Mining
[J].
WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III,
2011,
:1889-1894
[24]
Overview of Data Mining Based Adaptive Intrusion Detection Techniques
[J].
2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2,
2010,
:702-706
[26]
Design of Intrusion Detection Model Based on Data Mining Technology
[J].
2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE),
2012,
:571-574
[27]
An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques
[J].
2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS),
2012,
:13-17
[28]
Design of Intrusion Detection System Based on Data Mining Algorithm
[J].
PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS,
2009,
:370-373
[29]
Research on Intrusion Detection System Model Based on Data Mining
[J].
2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012),
2012,
:113-116
[30]
Framework of intrusion detection based on distributed data mining approach
[J].
Wuhan Daxue Xuebao (Lixue Ban)/Journal of Wuhan University (Natural Science Edition),
2002, 48 (01)