共 50 条
- [31] Design of Intrusion Detection Model Based on Data Mining Technology [J]. 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 571 - 574
- [32] An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques [J]. 2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 13 - 17
- [33] Adaptive intrusion detection with data mining [J]. 2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 3097 - 3103
- [34] A Study of Intrusion Detection in Data Mining [J]. WORLD CONGRESS ON ENGINEERING, WCE 2011, VOL III, 2011, : 1889 - 1894
- [35] Real time data mining-based intrusion detection [J]. DISCEX'01: DARPA INFORMATION SURVIVABILITY CONFERENCE & EXPOSITION II, VOL I, PROCEEDINGS, 2001, : 89 - 100
- [36] Research and Design on Intrusion Detection System Based on Data Mining [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 188 - 194
- [37] A novel adaptive intrusion detection system based on data mining [J]. PROCEEDINGS OF 2005 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-9, 2005, : 2390 - 2395
- [38] Intrusion Detection System Based on data mining for Host Log [J]. 2017 IEEE 2ND ADVANCED INFORMATION TECHNOLOGY, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IAEAC), 2017, : 1742 - 1746
- [40] Research on a Network Intrusion Detection System Based on Data Mining [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (ICTMF 2012), 2013, 38 : 204 - 209