共 50 条
[31]
A novel adaptive intrusion detection system based on data mining
[J].
PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9,
2005,
:2390-2395
[32]
Research and Design on Intrusion Detection System Based on Data Mining
[J].
INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014),
2014,
:188-194
[33]
Real time data mining-based intrusion detection
[J].
DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS,
2001,
:89-100
[35]
Intrusion Detection System Based on data mining for Host Log
[J].
2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC),
2017,
:1742-1746
[36]
Data Mining Based Network Intrusion Detection System: A Survey
[J].
NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING,
2010,
:501-505
[37]
A Model of Intrusion Detection Based on Data Mining in Campus Network
[J].
NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION,
2010,
:317-+
[38]
Design of data mining-based intrusion detection system
[J].
ICEMI 2005: Conference Proceedings of the Seventh International Conference on Electronic Measurement & Instruments, Vol 2,
2005,
:93-95
[39]
Research on a Network Intrusion Detection System Based on Data Mining
[J].
2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012),
2013, 38
:204-209
[40]
Network intrusion detection based on system calls and data mining
[J].
FRONTIERS OF COMPUTER SCIENCE IN CHINA,
2010, 4 (04)
:522-528