An Attribute-weighted Clustering Intrusion Detection Method
暂无分享,去创建一个
Yi Yu | Yurong Li | Lifang Wang | Shuhai Zhang | Ruijuan Wu
[1] Yupin Luo,et al. Saliency Detection by Selective Strategy for Salient Object Segmentation , 2012, J. Multim..
[2] Bai Liang,et al. K-Modes Clustering Algorithm Based on a New Distance Measure , 2010 .
[3] Chen Li. Adaptive Algorithm for Soft Subspace Clustering , 2010 .
[4] Salvatore J. Stolfo,et al. Mining Audit Data to Build Intrusion Detection Models , 1998, KDD.
[5] Xiang Lian,et al. General Cost Models for Evaluating Dimensionality Reduction in High-Dimensional Spaces , 2009, IEEE Transactions on Knowledge and Data Engineering.
[6] Qing Wang,et al. Tour Route Recommendation Begins with Multimodal Classification , 2012, J. Multim..
[7] Swagatam Das,et al. Automatic Clustering Using an Improved Differential Evolution Algorithm , 2007 .
[8] Zhang Zhong-zhi. Intrusion Detection Algorithm Based on Simulated Annealing and K-mean Clustering , 2010 .
[9] Jianhua Lu,et al. Call Admission Control and Scheduling Schemes with QoS Support for Real-time Video Applications in IEEE 802.16 Networks , 2006, J. Multim..
[10] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[11] Michael Schatz,et al. A Real-Time Intrusion Detection System Based on Learning Program Behavior , 2000, Recent Advances in Intrusion Detection.
[12] Genyun Sun,et al. A New Method for Edge Detection Based on the Criterion of Separability , 2011, J. Multim..
[13] Jiuchao Feng,et al. A sparse projection clustering algorithm , 2009 .
[14] Ping Wang,et al. Feature Particles Tracking for Moving Objects , 2012, J. Multim..
[15] Ruimin Hu,et al. An Even Grid Based Lattice Vector Quantization Algorithm for Mobile Audio Coding , 2011, J. Multim..
[16] Sanghamitra Bandyopadhyay,et al. A Point Symmetry-Based Clustering Technique for Automatic Evolution of Clusters , 2008, IEEE Transactions on Knowledge and Data Engineering.
[17] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .