Research and Implementation of an Anomaly Detection Model Based on Clustering Analysis
暂无分享,去创建一个
[1] Deborah A. Frincke,et al. Intrusion and Misuse Detection in Large-Scale Systems , 2002, IEEE Computer Graphics and Applications.
[2] Christopher Krügel,et al. A multi-model approach to the detection of web-based attacks , 2005, Comput. Networks.
[3] Ian Witten,et al. Data Mining , 2000 .
[4] Ali A. Ghorbani,et al. Y-means: a clustering method for intrusion detection , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[5] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[6] James C. Bezdek,et al. Extending fuzzy and probabilistic clustering to very large data sets , 2006, Comput. Stat. Data Anal..
[7] Rui Xu,et al. Survey of clustering algorithms , 2005, IEEE Transactions on Neural Networks.
[8] Ian H. Witten,et al. Data mining: practical machine learning tools and techniques with Java implementations , 2002, SGMD.
[9] Terran Lane,et al. Data mining methods for anomaly detection KDD-2005 workshop report , 2005, SKDD.
[10] Zhang Nan,et al. Using an improved clustering method to detect anomaly activities , 2006, Wuhan University Journal of Natural Sciences.