Database Intrusion Detection using Weighted Sequence Mining
暂无分享,去创建一个
[1] Abhinav Srivastava,et al. Weighted Intra-transactional Rule Mining for Database Intrusion Detection , 2006, PAKDD.
[2] Sin Yeung Lee,et al. Learning Fingerprints for a Database Intrusion Detection System , 2002, ESORICS.
[3] Xiao-Lin Qin,et al. Research on algorithm of user query frequent itemsets mining , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[4] Abhinav Srivastava,et al. Speeding Up Web Access Using Weighted Association Rules , 2005, PReMI.
[5] Sushil Jajodia,et al. ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.
[6] Victor C. S. Lee,et al. Intrusion detection in real-time database systems via time signatures , 2000, Proceedings Sixth IEEE Real-Time Technology and Applications Symposium. RTAS 2000.
[7] Erland Jonsson,et al. Survey of Intrusion Detection Research , 2002 .
[8] Gregory Piatetsky-Shapiro,et al. The KDD process for extracting useful knowledge from volumes of data , 1996, CACM.
[9] Petra Perner,et al. Data Mining - Concepts and Techniques , 2002, Künstliche Intell..
[10] Peter Mell,et al. NIST Special Publication on Intrusion Detection Systems , 2001 .
[11] Michael Gertz,et al. DEMIDS: A Misuse Detection System for Database Systems , 2000, IICIS.
[12] Philip S. Yu,et al. Efficient mining of weighted association rules (WAR) , 2000, KDD '00.
[13] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[14] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[15] Marc Dacier,et al. Mining intrusion detection alarms for actionable knowledge , 2002, KDD.
[16] Fionn Murtagh,et al. Weighted Association Rule Mining using weighted support and significance framework , 2003, KDD '03.
[17] Yi Hu,et al. A data mining approach for database intrusion detection , 2004, SAC '04.