Use of Data Mining Techniques in Intrusion Detection – A Survey
暂无分享,去创建一个
[1] Brijesh Sharma,et al. A Design and Implementation of Intrusion Detection System by Using Data Mining , 2014, 2014 Fourth International Conference on Communication Systems and Network Technologies.
[2] Ahmed E. Youssef,et al. NETWORK INTRUSION DETECTION USING DATA MINING AND NETWORK BEHAVIOUR ANALYSIS , 2011 .
[3] Han Li. Research and Implementation of an Anomaly Detection Model Based on Clustering Analysis , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.
[4] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[5] Cheng Xiang,et al. Design of Multiple-Level Hybrid Classifier for Intrusion Detection System , 2005, 2005 IEEE Workshop on Machine Learning for Signal Processing.
[6] A. John,et al. Survey on data mining techniques to enhance intrusion detection , 2012, 2012 International Conference on Computer Communication and Informatics.
[7] R. R. Deshmukh,et al. Data Mining Classification , 2016 .
[8] Shingo Mabu,et al. An Intrusion-Detection Model Based on Fuzzy Class-Association-Rule Mining Using Genetic Network Programming , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[9] Ketan Sanjay Desale,et al. Efficient Intrusion Detection System Using Stream Data Mining Classification Technique , 2015, 2015 International Conference on Computing Communication Control and Automation.
[10] B. R. Madhu,et al. Data mining based CIDS: Cloud intrusion detection system for masquerade attacks [DCIDSM] , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[11] Solane Duque,et al. Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS) , 2015, Complex Adaptive Systems.
[12] P. Anitha,et al. Efficient classification mechanism for network intrusion detection system based on data mining techniques: A survey , 2014, 2014 IEEE 8th International Conference on Intelligent Systems and Control (ISCO).
[13] Shi-Jinn Horng,et al. A novel intrusion detection system based on hierarchical clustering and support vector machines , 2011, Expert Syst. Appl..