An anomaly detection model of user behavior based on similarity clustering
暂无分享,去创建一个
Shuai Hu | Qiang Rao | Rongtao Liao | Zhihua Xiao | Rongtao Liao | Zhihua Xiao | Qiang Rao | Shuai Hu
[1] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[2] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[3] Pavel Berkhin,et al. A Survey of Clustering Data Mining Techniques , 2006, Grouping Multidimensional Data.
[4] Zhenguo Chen,et al. Anomaly Detection Based on Enhanced DBScan Algorithm , 2011 .
[5] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[6] Yang Shao-quan,et al. An Intrusion Detection System Based on Support Vector Machine , 2003 .
[7] Gulshan Kumar,et al. Survey on Data Mining Techniques in Intrusion Detection , 2012 .