共 50 条
- [1] An efficient framework for intrusion detection based on data mining [J]. 2005 ICSC CONGRESS ON COMPUTATIONAL INTELLIGENCE METHODS AND APPLICATIONS (CIMA 2005), 2005, : 55 - 58
- [2] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques [J]. 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
- [3] Distributed Intrusion Detection Based on Outlier Mining [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 343 - 348
- [4] Intrusion Detection Based on Data Mining [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
- [5] Intrusion detection based on data mining [J]. COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 724 - 729
- [6] Combined data mining approach for intrusion detection [J]. SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
- [8] Adaptive Intrusion Detection: A Data Mining Approach [J]. Artificial Intelligence Review, 2000, 14 : 533 - 567
- [9] Data mining framework for building intrusion detection models [J]. Proc IEEE Comput Soc Symp Res Secur Privacy, (120-132):
- [10] A data mining framework for building intrusion detection models [J]. PROCEEDINGS OF THE 1999 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 1999, : 120 - 132