共 50 条
- [31] Intrusion Detection Models Based on Data Mining [J]. International Journal of Computational Intelligence Systems, 2012, 5 : 30 - 38
- [32] Hybrid intrusion detection based on data mining [J]. 2018 11TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION (ICICTA 2018), 2018, : 299 - 301
- [33] Intrusion scenarios detection based on data mining [J]. PROCEEDINGS OF 2008 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2008, : 1293 - 1297
- [34] Text Mining Based Approach for Intrusion Detection [J]. 2016 INTERNATIONAL CONFERENCE ON ENGINEERING & MIS (ICEMIS), 2016,
- [35] Towards a Multiagent-Based Distributed Intrusion Detection System Using Data Mining Approaches [J]. AGENTS AND DATA MINING INTERACTION, 2012, 7103 : 173 - +
- [36] Robust Network Intrusion Detection Systems for Outlier Detection [J]. 2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 140 - 146
- [37] NETWORK INTRUSION DETECTION MECHANISMS USING OUTLIER DETECTION [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1468 - 1473
- [38] Distributed intrusion detection system based on ARTIS [J]. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 356 - 363
- [39] A Distributed Intrusion Detection System Based on Agents [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 531 - 535
- [40] Outlier Application Level based Intrusion detection and Prevention in Wireless Network [J]. 2020 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2020), 2020, : 418 - +