메뉴 건너뛰기




Volumn 20, Issue 5, 2003, Pages 251-259

A rough set theory based method for anomaly intrusion detection in computer network systems

Author keywords

Anomaly detection; Computer network security; Intrusion detection; Knowledge base; Rough sets

Indexed keywords

KNOWLEDGE BASED SYSTEMS; REAL TIME SYSTEMS; ROUGH SET THEORY; SECURITY OF DATA;

EID: 0242289557     PISSN: 02664720     EISSN: None     Source Type: Journal    
DOI: 10.1111/1468-0394.00249     Document Type: Article
Times cited : (27)

References (15)
  • 2
    • 0003907293 scopus 로고    scopus 로고
    • Basingstoke: Macmillan Technical
    • BACE, R. (2000) Intrusion Detection, Basingstoke: Macmillan Technical.
    • (2000) Intrusion Detection
    • Bace, R.1
  • 3
    • 0034223798 scopus 로고    scopus 로고
    • Classification and rule induction using rough set theory
    • BEYNON, M.J., B. CURRY and P.H. MORGAN (2000) Classification and rule induction using rough set theory, Expert Systems, 17 (3), 136-148.
    • (2000) Expert Systems , vol.17 , Issue.3 , pp. 136-148
    • Beynon, M.J.1    Curry, B.2    Morgan, P.H.3
  • 7
    • 0010533951 scopus 로고    scopus 로고
    • The extraction of trading rules from stock market data using rough sets
    • KIM, K. and I. HAN (2001) The extraction of trading rules from stock market data using rough sets, Expert Systems, 18 (4), 194-202.
    • (2001) Expert Systems , vol.18 , Issue.4 , pp. 194-202
    • Kim, K.1    Han, I.2
  • 15
    • 0040431304 scopus 로고    scopus 로고
    • Data mining for network intrusion detection: A comparison of alternative methods
    • ZHU, D., G. PREMKUMAR, X. ZHANG and C. CHU (2001) Data mining for network intrusion detection: a comparison of alternative methods, Decision Sciences, 32 (4), 635-660.
    • (2001) Decision Sciences , vol.32 , Issue.4 , pp. 635-660
    • Zhu, D.1    Premkumar, G.2    Zhang, X.3    Chu, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.