CDN加速镜像 | 设为首页 | 加入收藏夹
当前位置: 首页 资源下载 搜索资源 - Data Mining Intrusion Detection

搜索资源列表

  1. 456123

    0下载:
  2. 基于数据挖掘的入侵检测系统的设计与实现 基于数据挖掘的入侵检测系统的设计与实现-Based on Data Mining Intrusion Detection System Design and Implementation Based on Data Mining Intrusion Detection System Design and Implementation
  3. 所属分类:文件操作

    • 发布日期:2008-10-13
    • 文件大小:58.14kb
    • 提供者:Jihong
  1. dminid

    0下载:
  2. 入侵检测中的数据挖掘方法研究.pdf-A Research into Data Mining Technology in Intrusion Detection. file type pdf
  3. 所属分类:弱点检测代码

    • 发布日期:2008-10-13
    • 文件大小:599.38kb
    • 提供者:赵艳
  1. 基于数据挖掘技术入侵检测系统研究

    0下载:
  2. 入侵检测技术已经成为网络安全领域的研究热点。本文介绍了入侵检测的分类以及应用在入侵检测中的数据挖掘方法,并阐述了构建的基于数据挖掘技术的入侵检测系统的设计与实现。-Intrusion Detection Technology network security has become a hot topic. This paper introduces the intrusion detection and the application of the classification in Intru
  3. 所属分类:弱点检测代码

    • 发布日期:2008-10-13
    • 文件大小:6.59kb
    • 提供者:李显
  1. Apriori

    1下载:
  2. 关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前为止,关联规则的挖掘已经取得了令人瞩目的成绩,包括:单机环境
  3. 所属分类:Windows Develop

    • 发布日期:2017-05-10
    • 文件大小:1.96mb
    • 提供者:henry
  1. DMIDS

    0下载:
  2. 基于数据挖掘技术的入侵检测系统的设计思路与模型,以及改进思路-Based on Data Mining Intrusion Detection System Design and model, as well as ideas to improve
  3. 所属分类:Project Design

    • 发布日期:2017-04-02
    • 文件大小:255.08kb
    • 提供者:CCLK
  1. paper

    0下载:
  2. 关联规则论文: GP在入侵检测规则提取中的适应度函数设计.pdf 采用数据挖掘的入侵检测技术研究.pdf 分类规则挖掘算法综述.pdf -Articles of Association Rules: GP in intrusion detection rule extraction in the design of fitness function. Pdf intrusion detection using data mining technology research. Pd
  3. 所属分类:AI-NN-PR

    • 发布日期:2017-04-09
    • 文件大小:1.25mb
    • 提供者:yxm
  1. Research_on_Network_intrusion_detection_based_on_d

    0下载:
  2. 本文提出一种基于数据挖掘的入侵检测模型,其主要思想是利用数据挖掘的方法,从经预处理的包含网络连接信息的 审计数据中提取能够区分正常和入侵的规则,并用来检测入侵行为。对Apriori 算法中求频繁集时扫描数据库I/O 负载惊人 的问题提出了一种改进办法。为验证该算法的可行性,文章最后实现了该入侵检测模型的知识库中正常连接规则的挖掘。实 验表明该模型能提取特征生成新规则,并证明了方法的可行性和有效性。-In this paper an intrusion detection system
  3. 所属分类:AI-NN-PR

    • 发布日期:2017-04-01
    • 文件大小:202.61kb
    • 提供者:youby
  1. UsingDataMiningTechniquesforDetectingTerrorRelate

    0下载:
  2. An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior of terrorists by applying a data mining algorithm to the te
  3. 所属分类:Development Research

    • 发布日期:2017-04-02
    • 文件大小:211.9kb
    • 提供者:keerthi
  1. AttacksClassificationinAdaptivIntrusion

    0下载:
  2. Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employ
  3. 所属分类:Windows Develop

    • 发布日期:2017-03-31
    • 文件大小:304.76kb
    • 提供者:keerthi
  1. DataMiningTechniquesfor(Network)Intrusion

    0下载:
  2. In Information Security, intrusion detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion detection does not, in general, include prevention of intrusions. In
  3. 所属分类:SCM

    • 发布日期:2017-03-31
    • 文件大小:364.17kb
    • 提供者:keerthi
  1. FuzzyIntrusionDetectionSystemviaDataMining

    0下载:
  2. There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is built as a hardware product with its own hardware platform (IDS applia
  3. 所属分类:Windows Develop

    • 发布日期:2017-03-24
    • 文件大小:694.08kb
    • 提供者:keerthi
  1. wangluoanquan

    0下载:
  2. 基于数据挖掘的智能入侵检测系统研究,提出了一个基于数据挖掘、Agent技术的入侵检测系统框架-Intelligent data mining-based intrusion detection system, proposed based on data mining, Agent Intrusion Detection System
  3. 所属分类:AI-NN-PR

    • 发布日期:2017-04-02
    • 文件大小:99.19kb
    • 提供者:shenren
  1. bucuo

    0下载:
  2. 针对现有入侵 检测系统的不足,对数据挖掘技术和智能检测代理应用于入侵检测系统进行了研究,提出一个基于数据挖掘技 术的智能入侵检测系统模型-Intrusion detection system for the existing shortage of data mining and intelligent detection agents used in intrusion detection systems have been studied, proposed a data min
  3. 所属分类:AI-NN-PR

    • 发布日期:2017-04-07
    • 文件大小:241.5kb
    • 提供者:shenren
  1. DMPAGENTS

    0下载:
  2. In recent years and within the intrusion detection domain, an increasingly evident trend has emerged. The trend stands within the crossroads of multi-agent systems and data mining. The documents present some related works introducing distributed
  3. 所属分类:SCM

    • 发布日期:2017-05-21
    • 文件大小:6.22mb
    • 提供者:i
  1. Intrusion-Detection

    0下载:
  2. The problem of intrusion detection has been studied and received a lot of attention in machine learning and data mining in the literature survey. The existing techniques are not effective to improve the classification accuracy and to reduce high
  3. 所属分类:matlab

    • 发布日期:2017-03-26
    • 文件大小:390.7kb
    • 提供者:Sumit
  1. 31-Mining-network-data-for-intrusion-detection-th

    0下载:
  2. Mining network data for intrusion detection through combining SVM with ant colony
  3. 所属分类:software engineering

    • 发布日期:2017-05-03
    • 文件大小:671.37kb
    • 提供者:Samir
  1. IJETAE_0313_100

    0下载:
  2. Intrusion Detection System Using Data Mining Technique: Support Vector Machine
  3. 所属分类:Data Mining

    • 发布日期:2017-05-01
    • 文件大小:469.42kb
    • 提供者:salem
搜珍网 www.dssz.com