USING DATA MINING TECHNIQUES FOR DETECTING TERROR- RELATED ACTIVITIES ON THE WEB
暂无分享,去创建一个
[1] Tom Fawcett,et al. Robust Classification for Imprecise Environments , 2000, Machine Learning.
[2] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[3] Kevin Richards. Network based intrusion detection: A review of technologies , 1999, Comput. Secur..
[4] Tsvi Kuflik,et al. Automatic keyword identification by artificial neural networks compared to manual identification by users of filtering systems , 2001, Inf. Process. Manag..
[5] Marc Dacier,et al. Towards a taxonomy of intrusion-detection systems , 1999, Comput. Networks.
[6] George Karypis,et al. CLUTO - A Clustering Toolkit , 2002 .
[7] Eugene H. Spafford,et al. An architecture for intrusion detection using autonomous agents , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[8] Gerard Salton,et al. A vector space model for automatic indexing , 1975, CACM.
[9] Abraham Kandel,et al. Content-Based Methodology for Anomaly Detection on the Web , 2003, AWIC.
[10] Jiawei Han,et al. Data Mining: Concepts and Techniques , 2000 .
[11] Samuel Pierre,et al. An agent-based approach for integrating user profile into a knowledge management process , 2000, Knowl. Based Syst..