Improved clustering algorithm based on high-speed network data stream
暂无分享,去创建一个
Jin Wang | Ruxia Sun | Lian Xia | Chunyong Yin | Sun Zhang
[1] Xiangliang Zhang,et al. Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks , 2014, Knowl. Based Syst..
[2] Bin Gu,et al. Incremental Support Vector Learning for Ordinal Regression , 2015, IEEE Transactions on Neural Networks and Learning Systems.
[3] Bin Gu,et al. Incremental learning for ν-Support Vector Regression , 2015, Neural Networks.
[4] Dong Hyun Jeong,et al. A survey of cloud-based network intrusion detection analysis , 2016, Human-centric Computing and Information Sciences.
[5] KeeganNathan,et al. A survey of cloud-based network intrusion detection analysis , 2016 .
[6] Wei Yu,et al. A streaming-based network monitoring and threat detection system , 2016, 2016 IEEE 14th International Conference on Software Engineering Research, Management and Applications (SERA).
[7] Guo Shan. Anomaly Intrusion Detection Based on Data Stream , 2007 .
[8] Lin Zhu,et al. A Study on the Application of Data Stream Clustering Mining through a Sliding and Damped Window to Intrusion Detection , 2011, 2011 Fourth International Conference on Information and Computing.
[9] Jin Wang,et al. An improved anonymity model for big data security based on clustering algorithm , 2017, Concurr. Comput. Pract. Exp..
[10] Wu Hai-feng. Research on Data Mining Technology and Tools , 2003 .
[11] Xuejun Liu. Mining Frequent Patterns in Data Streams , 2005 .
[12] Peng Shi,et al. Learning very fast decision tree from uncertain data streams with positive and unlabeled samples , 2012, Inf. Sci..
[13] Matthew O. Ward,et al. Shared execution strategy for neighbor-based pattern mining requests over streaming windows , 2012, ACM Trans. Database Syst..
[14] Tirtharaj Dash,et al. A study on intrusion detection using neural networks trained with evolutionary algorithms , 2017, Soft Comput..
[15] Cai Yingkun. An Improved DBSCAN Algorithm which is Insensitive to Input Parameters , 2004 .
[16] Xiaomin Wang,et al. A Parallel Clustering Ensemble Algorithm for Intrusion Detection System , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
[17] Ira Assent,et al. Self-Adaptive Anytime Stream Clustering , 2009, 2009 Ninth IEEE International Conference on Data Mining.
[18] Sushil Jajodia,et al. ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.
[19] Alfred O. Hero,et al. Adaptive evolutionary clustering , 2011, Data Mining and Knowledge Discovery.
[20] Lu Feng,et al. A Feature Selection Method for Improved Clonal Algorithm Towards Intrusion Detection , 2016, Int. J. Pattern Recognit. Artif. Intell..
[21] Xia Lu. SA-DBSCAN:A self-adaptive density-based clustering algorithm , 2009 .
[22] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[23] Jin Wang,et al. An Effective Feature Selection and Data-Stream Classification Model HDP , 2016 .
[24] Peter Xiaoping Liu,et al. Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks , 2010, IEEE Transactions on Vehicular Technology.
[25] Madhu Sharma Gaur,et al. Trusted and secure clustering in mobile pervasive environment , 2015, Human-centric Computing and Information Sciences.
[26] Donggang Yu,et al. Segmentation, recognition and tracing analysis for high-content cell-cycle screening , 2007 .
[27] Sandeep Kumar,et al. Optimize Intrusion Prevention and Minimization of Threats for Stream Data Classification , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[28] Ira Assent,et al. The ClusTree: indexing micro-clusters for anytime stream mining , 2011, Knowledge and Information Systems.