共 50 条
- [31] A Rule Based Intrusion Detection System to Identify Vindictive Web Spider 2016 INTERNATIONAL CONFERENCE ON COMPUTING, ANALYTICS AND SECURITY TRENDS (CAST), 2016, : 271 - 275
- [32] Intrusion detection system based on new association rule mining model 2005 IEEE INTERNATIONAL CONFERENCE ON GRANULAR COMPUTING, VOLS 1 AND 2, 2005, : 512 - 515
- [33] Research of Dynamic Adjustment Algorithm of Matching Rule Database of Network Intrusion Detection 2011 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND MULTIMEDIA COMMUNICATION, 2011, : 131 - 134
- [34] Intrusion detection and foundation of rule reservoir ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 1864 - 1866
- [35] Research in Intrusion Detection System Based on Mobile Agent INFORMATION COMPUTING AND APPLICATIONS, 2011, 7030 : 233 - 240
- [36] A Conceptual Framework for Automated Rule Generation in Provenance-based Intrusion Detection Systems 2022 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2022, : 627 - 630
- [37] Research on Intrusion Detection System based on pattern recognition NCM 2008 : 4TH INTERNATIONAL CONFERENCE ON NETWORKED COMPUTING AND ADVANCED INFORMATION MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 609 - 612
- [38] RESEARCH OF A HYBRID DISTRIBUTED NETWORK INTRUSION DETECTION SYSTEM CIICT 2008: PROCEEDINGS OF CHINA-IRELAND INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATIONS TECHNOLOGIES 2008, 2008, : 301 - 305
- [39] Research and Design of Intrusion Detection System in Computer Network PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE AND TECHNOLOGY EDUCATION (ICSSTE 2015), 2015, 18 : 390 - 392
- [40] The Research of Intrusion Detection System in Cloud Computing Environment ADVANCES IN MULTIMEDIA, SOFTWARE ENGINEERING AND COMPUTING, VOL 1, 2011, 128 : 45 - 49