Data Mining Tool for Intrusion Detection
暂无分享,去创建一个
Bhavani Thuraisingham | Lei Wang | Latifur Khan | Mamoun Awad | B. Thuraisingham | L. Khan | Lei Wang | M. Awad
[1] D. R. Wyman,et al. Bibliography and References , 2012 .
[2] Usama M. Fayyad,et al. Knowledge Discovery in Databases: An Overview , 1997, ILP.
[3] Gregory Piatetsky-Shapiro,et al. Knowledge Discovery in Databases: An Overview , 1992, AI Mag..
[4] Nhlanhla Mlitwa,et al. The role of intrusion detection systems in electronic information security: From the activity theory perspective , 2011 .
[5] Roger S. Pressman,et al. Software Engineering: A Practitioner's Approach , 1982 .
[6] Jakob Nielsen,et al. Usability engineering , 1997, The Computer Science and Engineering Handbook.
[7] Susan M. Bridges,et al. A FRAMEWORK FOR AN ADAPTIVE INTRUSION DETECTION SYSTEM WITH DATA MINING , 2001 .
[8] Daniel A. Keim,et al. Information Visualization and Visual Data Mining , 2002, IEEE Trans. Vis. Comput. Graph..
[9] Paul E. Proctor,et al. Practical Intrusion Detection Handbook , 2000 .