共 7 条
[1]
Bridges Susan M., 2000, C ONNATIONAL INF SYS
[2]
Chan K. C. C., 1997, Proceedings of the Sixth International Conference on Information and Knowledge Management. CIKM'97, P209, DOI 10.1145/266714.266898
[4]
Applying data mining of fuzzy association rules to network intrusion detection
[J].
2006 IEEE INFORMATION ASSURANCE WORKSHOP,
2006,
:100-+
[5]
Faraoun K., 2006, INT J COMPUTATIONAL, V3, P79
[6]
Herrera F., 2005, INT J COMPUTATIONAL, V1, P59
[7]
Srikant R., 1996, SIGMOD Record, V25, P1, DOI 10.1145/235968.233311