Fast detection of database system abuse behaviors based on data mining approach
暂无分享,去创建一个
[1] Ke Wang,et al. Pushing Support Constraints Into Association Rules Mining , 2003, IEEE Trans. Knowl. Data Eng..
[2] Johannes Gehrke,et al. MAFIA: a maximal frequent itemset algorithm for transactional databases , 2001, Proceedings 17th International Conference on Data Engineering.
[3] Salvatore J. Stolfo,et al. Anomalous Payload-Based Worm Detection and Signature Generation , 2005, RAID.
[4] Ada Wai-Chee Fu,et al. Mining frequent itemsets without support threshold: with and without item constraints , 2004, IEEE Transactions on Knowledge and Data Engineering.
[5] Raymond Chi-Wing Wong,et al. Mining top-K frequent itemsets from data streams , 2006, Data Mining and Knowledge Discovery.
[6] Sunita Sarawagi,et al. Integrating association rule mining with relational database systems: alternatives and implications , 1998, SIGMOD '98.
[7] Laks V. S. Lakshmanan,et al. Pushing Convertible Constraints in Frequent Itemset Mining , 2004, Data Mining and Knowledge Discovery.
[8] Venu Govindaraju,et al. Data mining for intrusion detection: techniques, applications and systems , 2004, Proceedings. 20th International Conference on Data Engineering.
[9] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[10] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[11] Ke Wang,et al. Mining Frequent Itemsets Using Support Constraints , 2000, VLDB.
[12] Salvatore J. Stolfo,et al. Anomalous Payload-Based Network Intrusion Detection , 2004, RAID.
[13] Wei Fan,et al. Mining system audit data: opportunities and challenges , 2001, SGMD.
[14] Mohammed J. Zaki,et al. Efficiently mining maximal frequent itemsets , 2001, Proceedings 2001 IEEE International Conference on Data Mining.
[15] Sunita Sarawagi,et al. Integrating Mining with Relational Database Systems: Alternatives and Implications. , 1998, SIGMOD 1998.
[16] Jian Pei,et al. Mining frequent patterns without candidate generation , 2000, SIGMOD 2000.
[17] Mohammed J. Zaki,et al. ADMIT: anomaly-based data mining for intrusions , 2002, KDD.
[18] Roberto J. Bayardo,et al. Efficiently mining long patterns from databases , 1998, SIGMOD '98.
[19] Dimitrios Gunopulos,et al. Constraint-Based Rule Mining in Large, Dense Databases , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).