An Overview of Intrusion Detection Based on Data Mining Techniques
暂无分享,去创建一个
[1] A. John,et al. Survey on data mining techniques to enhance intrusion detection , 2012, 2012 International Conference on Computer Communication and Informatics.
[2] Hiroki Takakura,et al. High-Performance Intrusion Detection Using OptiGrid Clustering and Grid-Based Labelling , 2011, 2011 IEEE/IPSJ International Symposium on Applications and the Internet.
[3] Ali A. Ghorbani,et al. Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[4] Li Han. Using a Dynamic K-means Algorithm to Detect Anomaly Activities , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[5] Liu Hui,et al. Research Intrusion Detection Techniques from the Perspective of Machine Learning , 2010, 2010 Second International Conference on Multimedia and Information Technology.
[6] W. Yassin,et al. Intrusion detection based on K-Means clustering and Naïve Bayes classification , 2011, 2011 7th International Conference on Information Technology in Asia.
[7] Hari Om,et al. A hybrid system for reducing the false alarm rate of anomaly intrusion detection system , 2012, 2012 1st International Conference on Recent Advances in Information Technology (RAIT).
[8] Mrudula Gudadhe,et al. A new data mining based network Intrusion Detection model , 2010, 2010 International Conference on Computer and Communication Technology (ICCCT).
[9] Sufyan T. Faraj Al-Janabi,et al. A Neural Network Based Anomaly Intrusion Detection System , 2011, 2011 Developments in E-systems Engineering.
[10] Han Li. Research and Implementation of an Anomaly Detection Model Based on Clustering Analysis , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.
[11] Wang Huai-bin,et al. A Clustering Algorithm Use SOM and K-Means in Intrusion Detection , 2010, 2010 International Conference on E-Business and E-Government.
[12] Xiaomin Wang,et al. A Parallel Clustering Ensemble Algorithm for Intrusion Detection System , 2010, 2010 Ninth International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
[13] Erland Jonsson,et al. Using active learning in intrusion detection , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..