共 50 条
- [21] Application of Unbalanced Data Approach to Network Intrusion Detection FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 140 - +
- [22] The Application of Data Mining Technology in the Intrusion Detection System THIRD INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND COMPUTATIONAL TECHNOLOGY (ISCSCT 2010), 2010, : 208 - 211
- [23] Application of Data Mining on the Design of Intrusion Detection System 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 1890 - 1893
- [24] Application of data mining technology to intrusion detection system DCABES 2004, Proceedings, Vols, 1 and 2, 2004, : 1027 - 1030
- [25] Application of Gray Theory and Data Fusion in Intrusion Detection 2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 4, 2010, : 131 - 135
- [26] Research on the Application of the Data Mining in Network Intrusion Detection 2014 2ND INTERNATIONAL CONFERENCE ON ECONOMIC, BUSINESS MANAGEMENT AND EDUCATION INNOVATION (EBMEI 2014), VOL 38, 2014, 38 : 234 - 237
- [27] An intrusion detection model based on data mining over data Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2011, 42 (09): : 2720 - 2728
- [28] Building a Network Intrusion Model Based on Data from Honeypots 2018 26TH TELECOMMUNICATIONS FORUM (TELFOR), 2018, : 104 - 107
- [29] An Embedded Intrusion Detection System Model for Application Program PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 1861 - +
- [30] A fuzzy data mining based intrusion detection model 10TH IEEE INTERNATIONAL WORKSHOP ON FUTURE TRENDS OF DISTRIBUTED COMPUTING SYSTEMS, PROCEEDINGS, 2004, : 191 - 197