共 50 条
- [1] Density Based Outlier Mining Algorithm with Application to Intrusion Detection [J]. PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 489 - 492
- [2] Distributed Intrusion Detection Based on Outlier Mining [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 343 - 348
- [3] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
- [4] Research of Outlier Mining Based Adaptive Intrusion Detection Techniques [J]. THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 552 - 555
- [5] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
- [6] Power information network intrusion detection based on data mining algorithm [J]. The Journal of Supercomputing, 2020, 76 : 5521 - 5539
- [7] Power information network intrusion detection based on data mining algorithm [J]. JOURNAL OF SUPERCOMPUTING, 2020, 76 (07): : 5521 - 5539
- [8] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
- [9] Robust Network Intrusion Detection Systems for Outlier Detection [J]. 2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 140 - 146
- [10] NETWORK INTRUSION DETECTION MECHANISMS USING OUTLIER DETECTION [J]. PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1468 - 1473