The Role of Data Mining Techniques in Network Intrusion Detection System
暂无分享,去创建一个
[1] E. Bloedorn,et al. Data mining for network intrusion detection : How to get started , 2001 .
[2] Julie A. Dickerson,et al. Fuzzy network profiling for intrusion detection , 2000, PeachFuzz 2000. 19th International Conference of the North American Fuzzy Information Processing Society - NAFIPS (Cat. No.00TH8500).
[3] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[4] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[5] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[6] Salvatore J. Stolfo,et al. A Data Mining and CIDF Based Approach for Detecting Novel and Distributed Intrusions , 2000, Recent Advances in Intrusion Detection.
[7] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[8] Salvatore J. Stolfo,et al. Adaptive Model Generation for Intrusion Detection Systems , 2000 .
[9] Gregory Piatetsky-Shapiro,et al. The KDD process for extracting useful knowledge from volumes of data , 1996, CACM.
[10] Srikanth Kandula,et al. Argus: A Distributed Network Intrusion Detection System , 2002 .