共 50 条
- [1] Application of Data Mining Techniques in Intrusion Detection [J]. CALL OF PAPER PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, 2008, : 1273 - 1277
- [2] Intrusion detection using data mining techniques [J]. Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
- [3] Applying Data Mining Techniques to Intrusion Detection [J]. 2015 12TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY - NEW GENERATIONS, 2015, : 800 - 801
- [4] Data warehousing and data mining techniques for intrusion detection systems [J]. Distributed and Parallel Databases, 2006, 20 : 149 - 166
- [6] Combination of Data Mining Techniques for Intrusion Detection System [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
- [7] Classification of Intrusion Detection Using Data Mining Techniques [J]. PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 753 - 764
- [8] An Overview of Intrusion Detection Based on Data Mining Techniques [J]. 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
- [9] Data mining for intrusion detection: Techniques, applications and systems [J]. 20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 877 - 877
- [10] Integrating data mining techniques with intrusion detection methods [J]. RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 33 - 46