共 50 条
- [1] Applying mining fuzzy association rules to intrusion detection based on sequences of system calls [J]. NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 826 - 835
- [2] Intrusion Detection System using Fuzzy Logic and Data Mining Technique [J]. ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
- [3] Network intrusion detection based on system calls and data mining [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2010, 4 (04): : 522 - 528
- [4] Network intrusion detection based on system calls and data mining [J]. Frontiers of Computer Science in China, 2010, 4 : 522 - 528
- [5] Applying fuzzy neural network to intrusion detection based on sequences of system calls [J]. ADVANCED DATA MINING AND APPLICATIONS, PROCEEDINGS, 2005, 3584 : 483 - 490
- [6] Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique [J]. PROCEEDINGS OF 2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2018), 2018, : 119 - 123
- [7] Intrusion detection system based on data mining [J]. Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
- [8] Intrusion detection system based on data mining [J]. FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
- [9] Integrating Intrusion Detection System and Data Mining [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
- [10] A Low-cost Method to Intrusion Detection System using Sequences of System Calls [J]. ICIC 2009: SECOND INTERNATIONAL CONFERENCE ON INFORMATION AND COMPUTING SCIENCE, VOL 1, PROCEEDINGS: COMPUTING SCIENCE AND ITS APPLICATION, 2009, : 143 - +