Database Intrusion Detection Using Adaptive Resonance Network Theory Model
暂无分享,去创建一个
[1] Yong Zhong,et al. Database intrusion detection based on user query frequent itemsets mining with item constraints , 2004, InfoSecu '04.
[2] Sung-Bae Cho,et al. Incorporating soft computing techniques into a probabilistic intrusion detection system , 2002, IEEE Trans. Syst. Man Cybern. Part C.
[3] Erkan Topal,et al. Decision support system of unplanned dilution and ore-loss in underground stoping operations using a neuro-fuzzy system , 2015, Appl. Soft Comput..
[4] Lotfi A. Zadeh,et al. Soft computing and fuzzy logic , 1994, IEEE Software.
[5] Sushil Jajodia,et al. Mining Malicious Corruption of Data with Hidden Markov Models , 2002, DBSec.
[6] Shamik Sural,et al. Detection of Database Intrusion Using a Two-Stage Fuzzy System , 2009, ISC.
[7] Shamik Sural,et al. Two-stage database intrusion detection by combining multiple evidence and belief update , 2013, Inf. Syst. Frontiers.
[8] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[9] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[10] Victor C. S. Lee,et al. Intrusion detection in real-time database systems via time signatures , 2000, Proceedings Sixth IEEE Real-Time Technology and Applications Symposium. RTAS 2000.
[11] Morteza Amini,et al. RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks , 2006, Comput. Secur..
[12] Hung Q. Ngo,et al. A Data-Centric Approach to Insider Attack Detection in Database Systems , 2010, RAID.
[13] Elisa Bertino,et al. Intrusion detection in RBAC-administered databases , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).