메뉴 건너뛰기




Volumn 15, Issue 8, 2000, Pages 687-703

Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

DATA MINING; DATA PRIVACY; FUZZY SETS; LEARNING ALGORITHMS; SECURITY OF DATA;

EID: 0034247240     PISSN: 08848173     EISSN: None     Source Type: Journal    
DOI: 10.1002/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X     Document Type: Article
Times cited : (140)

References (16)
  • 1
    • 85141038051 scopus 로고    scopus 로고
    • Mining audit data to build intrusion detection models
    • Agrawal R, Stolorz P, editor, New York, New York, August 27-31, 1998, New York: AAAI Press
    • Lee W, Stolfo S, Mok K. Mining audit data to build intrusion detection models, In: Agrawal R, Stolorz P, editor. Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining, New York, New York, August 27-31, 1998, New York: AAAI Press; 1998. p 66-72.
    • (1998) Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining , pp. 66-72
    • Lee, W.1    Stolfo, S.2    Mok, K.3
  • 5
    • 0024984441 scopus 로고
    • Adaptive real-time anomaly detection using inductively generated sequential patterns
    • Oakland, CA, May 7-9, 1990. Los Alamitos, CA: IEEE Computer Society Press
    • Teng H, Chen K, Lu S. Adaptive real-time anomaly detection using inductively generated sequential patterns. Proceedings of 1990 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland, CA, May 7-9, 1990. Los Alamitos, CA: IEEE Computer Society Press; 1990. p 278-284.
    • (1990) Proceedings of 1990 IEEE Computer Society Symposium on Research in Security and Privacy , pp. 278-284
    • Teng, H.1    Chen, K.2    Lu, S.3
  • 7
    • 0029267472 scopus 로고
    • State transition analysis: A rule-based intrusion detection approach
    • Ilgun K, Kemmerer A. State transition analysis: a rule-based intrusion detection approach. IEEE Trans Software Eng 1995;21(3):181-199.
    • (1995) IEEE Trans Software Eng , vol.21 , Issue.3 , pp. 181-199
    • Ilgun, K.1    Kemmerer, A.2
  • 9
  • 11
    • 85084163349 scopus 로고    scopus 로고
    • Data mining approaches for intrusion detection
    • Lee W, Stolfo S. Data mining approaches for intrusion detection. Proceedings of the 7th USENIX security symposium, 1998. (Downloaded from http://www.es.columbia.edu/~sal/recent-papers.html on March 10, 1999.)
    • (1998) Proceedings of the 7th USENIX Security Symposium
    • Lee, W.1    Stolfo, S.2
  • 13
    • 0348132918 scopus 로고    scopus 로고
    • Mining fuzzy association rules in databases
    • Kuok C, Fu A, Wong M. Mining fuzzy association rules in databases. SIGMOD Rec 1998;27(1):41-46.
    • (1998) SIGMOD Rec , vol.27 , Issue.1 , pp. 41-46
    • Kuok, C.1    Fu, A.2    Wong, M.3
  • 16
    • 12944326251 scopus 로고    scopus 로고
    • The Institute for Visualization and Perception Research, University of Massachusetts Lowell, 1998. Information Exploration Shootout. (http://iris.cs.uml/edu:8080, accessed March 1, 1999.)
    • (1998) Information Exploration Shootout


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.