共 50 条
- [1] Intrusion detection techniques and approaches [J]. COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1356 - 1365
- [2] Data warehousing and data mining techniques for intrusion detection systems [J]. Distributed and Parallel Databases, 2006, 20 : 149 - 166
- [4] Data mining for intrusion detection: Techniques, applications and systems [J]. 20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 877 - 877
- [5] A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS [J]. 2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 730 - 737
- [6] Data mining approaches for intrusion detection [J]. PROCEEDINGS OF THE SEVENTH USENIX SECURITY SYMPOSIUM, 1998, : 79 - 93
- [7] Adaptation techniques for intrusion detection and intrusion response systems [J]. SMC 2000 CONFERENCE PROCEEDINGS: 2000 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN & CYBERNETICS, VOL 1-5, 2000, : 2344 - 2349
- [8] Exploiting efficient data mining techniques to enhance intrusion detection systems [J]. Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005, : 512 - 517
- [10] Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review [J]. IEEE ACCESS, 2018, 6 : 56046 - 56058