The Use of Data Mining in the Implementation of a Network Intrusion Detection System
暂无分享,去创建一个
[1] Usama M. Fayyad,et al. Knowledge Discovery in Databases: An Overview , 1997, ILP.
[2] Margaret H. Dunham,et al. Data Mining: Introductory and Advanced Topics , 2002 .
[3] Kristopher Kendall,et al. A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems , 1999 .
[4] Arthur B. Maccabe,et al. The architecture of a network level intrusion detection system , 1990 .
[5] Gregory Piatetsky-Shapiro,et al. The KDD process for extracting useful knowledge from volumes of data , 1996, CACM.
[6] William L. Fithen,et al. State of the Practice of Intrusion Detection Technologies , 2000 .
[7] Tim Bass,et al. Intrusion detection systems and multisensor data fusion , 2000, CACM.