共 50 条
- [21] Data mining-based integrated network traffic visualization framework for threat detection [J]. NEURAL COMPUTING & APPLICATIONS, 2015, 26 (01): : 117 - 130
- [24] Data mining based wireless network traffic forecasting [J]. 2012 10TH INTERNATIONAL SYMPOSIUM ON ELECTRONICS AND TELECOMMUNICATIONS, 2012, : 115 - 118
- [25] Sequential Data Mining of Network Traffic in URL Logs [J]. ARTIFICIAL INTELLIGENCEAND SOFT COMPUTING, PT I, 2019, 11508 : 125 - 130
- [26] Fusion of Multiple Data Mining Techniques for Effective Network Intrusion Detection - A Contemporary Approach [J]. PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 178 - 182
- [27] Intrusion detection using data mining techniques [J]. Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
- [28] Application of Data Mining Techniques in Intrusion Detection [J]. CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
- [29] Research on Principle Techniques for Network Intrusion Detection based on Data Mining and Analysis Approach [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 513 - 517
- [30] A Comparison of Data Mining Techniques for Intrusion Detection [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2012, : 41 - 44