搜索资源列表
paper
- 关联规则论文: GP在入侵检测规则提取中的适应度函数设计.pdf 采用数据挖掘的入侵检测技术研究.pdf 分类规则挖掘算法综述.pdf -Articles of Association Rules: GP in intrusion detection rule extraction in the design of fitness function. Pdf intrusion detection using data mining technology research. Pd
UsingDataMiningTechniquesforDetectingTerrorRelate
- An innovative knowledge-based methodology for terrorist detection by using Web traffic content as the audit information is presented. The proposed methodology learns the typical behavior of terrorists by applying a data mining algorithm to the te
AttacksClassificationinAdaptivIntrusion
- Recently, information security has become a key issue in information technology as the number of computer security breaches are exposed to an increasing number of security threats. A variety of intrusion detection systems (IDS) have been employ
DMPAGENTS
- In recent years and within the intrusion detection domain, an increasingly evident trend has emerged. The trend stands within the crossroads of multi-agent systems and data mining. The documents present some related works introducing distributed
IJETAE_0313_100
- Intrusion Detection System Using Data Mining Technique: Support Vector Machine