共 50 条
- [1] Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING & SECURITY [ICCCS-2012], 2012, 1 : 996 - 1003
- [2] ENSEMBLE TECHNIQUE FOR INTRUDER DETECTION IN NETWORK TRAFFIC [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2019, 13 (03): : 1 - 8
- [3] Data Analysis to Uncover Intruder Attacks using Data Mining Techniques [J]. 2017 5TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOIC7), 2017,
- [4] MINING NETWORK TRAFFIC DATA [J]. 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND INTELLIGENT SYSTEMS, PROCEEDINGS, VOL 1, 2009, : 1 - 2
- [5] Data mining network traffic [J]. 2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 170 - +
- [6] The Key Techniques of the Network Anomaly Detection Based on Data Mining [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 1896 - 1899
- [7] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES [J]. JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131
- [8] Intelligent Network Intrusion Detection System using Data Mining Techniques [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 329 - 333
- [9] Network Intrusion Detection System Using various data mining techniques [J]. 2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
- [10] Approach Research on the Techniques for Network Intrusion Detection Based on Data Mining [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND ENGINEERING INNOVATION, 2015, 12 : 2133 - 2136