Integrating Data Mining Techniques with Intrusion Detection Methods
暂无分享,去创建一个
[1] Tsau Young Lin,et al. Security and Data Mining , 1995, DBSec.
[2] Carla E. Brodley,et al. Applying classification algorithms in practice , 1997, Stat. Comput..
[3] Ramon E. Henkel. Tests of Significance , 1976 .
[4] Pieter Adriaans,et al. Data mining , 1996 .
[5] Gopal Kanji,et al. 100 Statistical Tests , 1994 .
[6] Ray Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[7] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[8] Mike James,et al. Classification Algorithms , 1986, Encyclopedia of Machine Learning and Data Mining.
[9] Sholom M. Weiss,et al. Predictive data mining - a practical guide , 1997 .
[10] Casimir A. Kulikowski,et al. Computer Systems That Learn: Classification and Prediction Methods from Statistics, Neural Nets, Machine Learning and Expert Systems , 1990 .
[11] Sholom M. Weiss,et al. Rule-based Machine Learning Methods for Functional Prediction , 1995, J. Artif. Intell. Res..