Data mining framework for building intrusion detection models

被引:0
|
作者
Columbia Univ, New York, United States [1 ]
机构
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
下载
收藏
相关论文
共 50 条
  • [21] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [22] Combined data mining approach for intrusion detection
    Zurutuza, U.
    Uribeetxeberria, R.
    Azketa, E.
    Gil, G.
    Lizarraga, J.
    Fernandez, M.
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 67 - 73
  • [23] A data mining based intrusion detection model
    Sun, JH
    Jin, H
    Chen, H
    Han, ZF
    Zou, DQ
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING, 2003, 2690 : 677 - 684
  • [24] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [25] Application of Data Mining Techniques in Intrusion Detection
    Li Min
    CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
  • [26] A Comparison of Data Mining Techniques for Intrusion Detection
    Naidu, R. China Appala
    Avadhani, P. S.
    2012 IEEE INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2012, : 41 - 44
  • [27] Adaptive intrusion detection: A data mining approach
    Lee, WK
    Stolfo, SJ
    Mok, KW
    ARTIFICIAL INTELLIGENCE REVIEW, 2000, 14 (06) : 533 - 567
  • [28] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [29] Intrusion Detection Using Data Mining with Correlation
    Singh, Varsha
    Puthran, Shubha
    Tiwari, Avanish
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 620 - 625
  • [30] Adaptive Intrusion Detection: A Data Mining Approach
    Wenke Lee
    Salvatore J. Stolfo
    Kui W. Mok
    Artificial Intelligence Review, 2000, 14 : 533 - 567