Outlier Detection with Double-Sided Control Mechanism and Different Priority Weight Values for Network Security
暂无分享,去创建一个
[1] Phillip A. Porras,et al. STAT -- A State Transition Analysis Tool For Intrusion Detection , 1993 .
[2] Georg Carle,et al. Traffic Anomaly Detection Using K-Means Clustering , 2007 .
[3] E. Bloedorn,et al. Data mining for network intrusion detection : How to get started , 2001 .
[4] V. Rao Vemuri,et al. Use of K-Nearest Neighbor classifier for intrusion detection , 2002, Comput. Secur..
[5] Hinrich Schütze,et al. Introduction to information retrieval , 2008 .
[6] Jaideep Srivastava,et al. Data Mining for Network Intrusion Detection , 2002 .
[7] Jelena Mirkovic,et al. Profiling and Clustering Internet Hosts , 2006, DMIN.