共 50 条
- [1] Anomaly intrusion detection based on clustering a data stream [J]. INFORMATION SECURITY, PROCEEDINGS, 2006, 4176 : 415 - 426
- [2] Grid-based data stream clustering for intrusion detection [J]. Quan, Q. (qqian@shu.edu.cn), 1600, Femto Technique Co., Ltd. (15):
- [3] An Intrusion Detection Method Based on Damped Window of Data Stream Clustering [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT HUMAN-MACHINE SYSTEMS AND CYBERNETICS (IHMSC 2017), VOL 1, 2017, : 211 - 214
- [4] Data Stream Clustering Algorithm Based on Bucket Density for Intrusion Detection [J]. ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 846 - 850
- [5] Intrusion detection algorithm based on SSC-tree stream clustering [J]. Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics, 2012, 34 (03): : 625 - 630
- [6] An Intrusion Detection mechanism based on feature based data clustering [J]. 2008 INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES, PROCEEDINGS, 2008, : 172 - 175
- [7] Anomaly detection model based on data stream clustering [J]. Cluster Computing, 2019, 22 : 1729 - 1738
- [8] Anomaly detection model based on data stream clustering [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 1): : 1729 - 1738
- [9] A Web Intrusion Detection Mechanism based on Feature based Data Clustering [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1123 - 1128
- [10] Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System [J]. PROCEEDINGS OF ACM TURING AWARD CELEBRATION CONFERENCE, ACM TURC 2021, 2021, : 87 - 91