共 50 条
- [1] A Network Intrusion Detection Algorithm Based on Outlier Mining [J]. COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, 2019, 463 : 1229 - 1236
- [2] Research of Outlier Mining Based Adaptive Intrusion Detection Techniques [J]. THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 552 - 555
- [3] Density Based Outlier Mining Algorithm with Application to Intrusion Detection [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 489 - 492
- [4] Framework of intrusion detection based on distributed data mining approach [J]. Wuhan Daxue Xuebao (Lixue Ban)/Journal of Wuhan University (Natural Science Edition), 2002, 48 (01):
- [5] An Intrusion Detection Method Based on Outlier Ensemble Detection [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 600 - +
- [6] A Deviation Based Outlier Intrusion Detection System [J]. RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 395 - 401
- [7] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
- [8] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
- [9] The Design and Implementation of a Distributed Network Intrusion Detection System Based on Data Mining [J]. 2009 WRI WORLD CONGRESS ON SOFTWARE ENGINEERING, VOL 3, PROCEEDINGS, 2009, : 446 - 450
- [10] Soft-Man and Data Mining based Distributed Intrusion Detection System [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 145 - 150