Performance evaluation of data clustering techniques using KDD Cup-99 Intrusion detection data set
暂无分享,去创建一个
[1] Nishu Sharma,et al. A Comparative Study Of Data Clustering Techniques , 2013 .
[2] R. A. Rahmat,et al. GENERATION OF FUZZY RULES WITH SUBTRACTIVE CLUSTERING , 2005 .
[3] Charles Elkan,et al. Results of the KDD'99 classifier learning , 2000, SKDD.
[4] R.K. Cunningham,et al. Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[5] E. Mizutani,et al. Neuro-Fuzzy and Soft Computing-A Computational Approach to Learning and Machine Intelligence [Book Review] , 1997, IEEE Transactions on Automatic Control.
[6] Zhengxin Chen,et al. Data Mining and Uncertain Reasoning: An Integrated Approach , 2001 .
[7] Stephen L. Chiu,et al. Fuzzy Model Identification Based on Cluster Estimation , 1994, J. Intell. Fuzzy Syst..
[8] Abdul Hanan Abdullah,et al. Unsupervised Clustering Methods for Identifying Rare Events in Anomaly Detection , 2007 .
[9] Manas Ranjan Patra,et al. SOME CLUSTERING ALGORITHMS TO ENHANCE THE PERFORMANCE OF THE NETWORK INTRUSION DETECTION SYSTEM , 2008 .
[10] Dimitar Filev,et al. Generation of Fuzzy Rules by Mountain Clustering , 1994, J. Intell. Fuzzy Syst..