共 50 条
- [21] Integrating Intrusion Detection System and Data Mining [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
- [22] Overview of Data Mining Based Adaptive Intrusion Detection Techniques [J]. 2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 702 - 706
- [23] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques [J]. 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
- [24] Intrusion Detection in Smart Grid Using Data Mining Techniques [J]. 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
- [25] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES [J]. JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131
- [26] Network Intrusion Detection System Using Data Mining [J]. ENGINEERING APPLICATIONS OF NEURAL NETWORKS, 2012, 311 : 104 - 113
- [27] A Novel Intrusion Detection System Based on Data Mining [J]. PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER, MECHATRONICS, CONTROL AND ELECTRONIC ENGINEERING (ICCMCEE 2015), 2015, 37 : 1306 - 1309
- [28] The Application of Data Mining Technology in the Intrusion Detection System [J]. THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
- [29] Application of data mining technology to intrusion detection system [J]. DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
- [30] Application of Data Mining on the Design of Intrusion Detection System [J]. 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893