暂无分享,去创建一个
[1] Shichao Zhang,et al. Association Rule Mining: Models and Algorithms , 2002 .
[2] U. Fayyad,et al. Scaling EM (Expectation Maximization) Clustering to Large Databases , 1998 .
[3] Philip K. Chan,et al. An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection , 2003, RAID.
[4] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[5] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .
[6] David G. Kleinbaum,et al. Analysis of Matched Data Using Logistic Regression , 2010 .
[7] Giovanni Vigna,et al. NetSTAT: A Network-based Intrusion Detection System , 1999, J. Comput. Secur..
[8] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[9] Yao Yuan,et al. Study of database intrusion detection based on improved association rule algorithm , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[10] Manas Ranjan Patra,et al. NETWORK INTRUSION DETECTION USING NAÏVE BAYES , 2007 .
[11] J. Runnenburg,et al. Mean, median, mode , 1978 .
[12] B. Nath,et al. Dimensionality Reduction for Association Rule Mining , 2011 .
[13] Salvatore J. Stolfo,et al. A data mining framework for building intrusion detection models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[14] Tomasz Imielinski,et al. Mining association rules between sets of items in large databases , 1993, SIGMOD Conference.
[15] Wynne Hsu,et al. Integrating Classification and Association Rule Mining , 1998, KDD.
[16] G. Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[17] Aboul Ella Hassanien,et al. Continuous Features Discretization for Anomaly Intrusion Detectors Generation , 2014, ArXiv.
[18] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[19] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[20] S. Selvakumar,et al. SSENet-2011: A Network Intrusion Detection System dataset and its comparison with KDD CUP 99 dataset , 2011, 2011 Second Asian Himalayas International Conference on Internet (AH-ICI).
[21] Ming-Yang Su,et al. A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach , 2009, Comput. Secur..