Detecting Cumulated Anomaly by a Dubiety Degree based detection Model
暂无分享,去创建一个
[1] W. Pedrycz,et al. An introduction to fuzzy sets : analysis and design , 1998 .
[2] Joseph Lee,et al. DIDAFIT: Detecting Intrusions in Databases Through Fingerprinting Transactions , 2002, ICEIS.
[3] Goto Shigeki,et al. An Improved Intrusion Detecting Method Based on Process Profiling , 2002 .
[4] Jacinth Salome,et al. Fuzzy Data Mining and Genetic Algorithms Applied to Intrusion Detection , 2007 .
[5] Christopher Krügel,et al. Anomalous system call detection , 2006, TSEC.
[6] Zhongmin Cai,et al. A rough set theory based method for anomaly intrusion detection in computer network systems , 2003, Expert Syst. J. Knowl. Eng..
[7] Sin Yeung Lee,et al. Learning Fingerprints for a Database Intrusion Detection System , 2002, ESORICS.
[8] Susan M. Bridges,et al. FUZZY DATA MINING AND GENETIC ALGORITHMS APPLIED TO INTRUSION DETECTION , 2002 .
[9] Michael Gertz,et al. DEMIDS: A Misuse Detection System for Database Systems , 2000, IICIS.
[10] Ya-Jing Zhang,et al. An investigation of immune detection algorithm with vaccine operator and fuzzy match , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[11] Marina Moscarini,et al. Auditing sum-queries to make a statistical database secure , 2006, TSEC.
[12] Ping Xiong,et al. Optimization of membership functions in anomaly detection based on fuzzy data mining , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[13] Man Hon Wong,et al. Mining fuzzy association rules in databases , 1998, SGMD.