共 50 条
- [21] Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 35 - 41
- [22] An Overview of Intrusion Detection Based on Data Mining Techniques 2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
- [23] Data mining for intrusion detection: Techniques, applications and systems 20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 877 - 877
- [24] Integrating data mining techniques with intrusion detection methods RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 33 - 46
- [25] Intrusion Detection System using Stream Data Mining and Drift Detection Method 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
- [26] Intrusion detection system based on data mining Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
- [27] Intrusion detection system based on data mining FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
- [28] Integrating Intrusion Detection System and Data Mining INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
- [29] Intrusion Detection System using Fuzzy Logic and Data Mining Technique ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
- [30] Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique PROCEEDINGS OF 2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2018), 2018, : 119 - 123