共 50 条
- [41] Hybrid Multithreaded Pattern Matching Algorithm for Intrusion Detections Systems JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2011, 6 (06): : 512 - 521
- [42] The model and algorithm of automatic data-mining of network intrusion, characteristics PROCEEDINGS OF THE 4TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-4, 2002, : 2701 - 2704
- [43] Application of Data Mining Techniques in Intrusion Detection CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
- [44] Combined data mining approach for intrusion detection SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
- [45] Intrusion detection using data mining techniques Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
- [46] Advanced Clustering Based Intrusion Detection (ACID) Algorithm ADVANCES IN COMPUTING AND COMMUNICATIONS, PT III, 2011, 192 : 35 - 43
- [47] Integrating Intrusion Detection System and Data Mining INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
- [48] Applying Data Mining Techniques to Intrusion Detection 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 800 - 801
- [49] Application of Data Mining to Network Intrusion Detection: Classifier Selection Model CHALLENGES FOR NEXT GENERATION NETWORK OPERATIONS AND SERVICE MANAGEMENT, PROCEEDINGS, 2008, 5297 : 399 - 408
- [50] An Overview of Intrusion Detection Based on Data Mining Techniques 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629