共 50 条
- [21] Intrusion Detection System Based on data mining for Host Log 2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 1742 - 1746
- [22] Network intrusion detection based on system calls and data mining FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
- [23] Network intrusion detection based on system calls and data mining Frontiers of Computer Science in China, 2010, 4 : 522 - 528
- [24] Intrusion Detection Based on Data Mining EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 696 - 701
- [25] Intrusion detection based on data mining COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 724 - 729
- [26] An new Intrusion Prevention Attack System Model based on Immune Principle 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 666 - 669
- [27] An intrusion detection systembased on data mining and immune principles 2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, : 524 - 528
- [28] The Intrusion Detection Model of Multi-dimension Data Based on Artificial Immune System THEORY, METHODOLOGY, TOOLS AND APPLICATIONS FOR MODELING AND SIMULATION OF COMPLEX SYSTEMS, PT IV, 2016, 646 : 149 - 160
- [29] Research on Principle Techniques for Network Intrusion Detection based on Data Mining and Analysis Approach PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS RESEARCH AND MECHATRONICS ENGINEERING, 2015, 121 : 513 - 517
- [30] Integrating Intrusion Detection System and Data Mining INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259