-
1
-
-
0002283033
-
From data mining to knowledge discovery in databases
-
U. Fayyad, G. Piatetsky-Shapiro, and P. Smyth, "From Data Mining to Knowledge Discovery in Databases." American Association for Artificial Intelligence, AI Magazine. Fall Edition, pp. 37-54, 1996.
-
(1996)
American Association for Artificial Intelligence, AI Magazine. Fall Edition
, pp. 37-54
-
-
Fayyad, U.1
Piatetsky-Shapiro, G.2
Smyth, P.3
-
2
-
-
0002169158
-
Knowledge discovery in databases: An overview
-
W. Frawley, G. Piatetsky-Shapiro, and C. Matheus, "Knowledge Discovery in Databases: An Overview." American Association for Artificial Intelligence, AI Magazine. Fall Edition, pp. 57-70, 1992.
-
(1992)
American Association for Artificial Intelligence, AI Magazine. Fall Edition
, pp. 57-70
-
-
Frawley, W.1
Piatetsky-Shapiro, G.2
Matheus, C.3
-
4
-
-
26844574201
-
Applying data mining to intrusion detection: The quest for automation, efficiency and credibility
-
W. Lee, "Applying Data Mining to Intrusion Detection: The Quest for Automation, Efficiency and Credibility." ACM SIGKDD Explorations Newsletter, Vol. 4, Issue 2, pp.35-45, 2002.
-
(2002)
ACM SIGKDD Explorations Newsletter
, vol.4
, Issue.2
, pp. 35-45
-
-
Lee, W.1
-
5
-
-
0004255908
-
Machine learning
-
Boston, MA
-
T. Mitchell, "Machine Learning". WCB McGraw-Hill, Boston, MA, 1997.
-
(1997)
WCB McGraw-hill
-
-
Mitchell, T.1
-
6
-
-
71549167720
-
Security is fuzzy! Applying the fuzzy logic paradigm to the multipolicy paradigm
-
Little Compton, RI
-
H. Hosmer, "Security is Fuzzy! Applying the Fuzzy Logic Paradigm to the Multipolicy Paradigm." Proceedings of the 1992-1003 workshop on New Security Paradigms, Little Compton, RI, pp. 175-184, 1993.
-
(1993)
Proceedings of the 1992-1003 Workshop on New Security Paradigms
, pp. 175-184
-
-
Hosmer, H.1
-
7
-
-
23944493926
-
A framework for hybrid fuzzy logic intrusion detection systems
-
Reno, NV
-
A. El-Semary, J. Edmonds, J. González-Pino, and M. Papa, "A Framework for Hybrid Fuzzy Logic Intrusion Detection Systems." Proceedings of the 2005 IEEE International Conference on Fuzzy Systems, Reno, NV, pp. 325-330, 2005.
-
(2005)
Proceedings of the 2005 IEEE International Conference on Fuzzy Systems
, pp. 325-330
-
-
El-Semary, A.1
Edmonds, J.2
González-Pino, J.3
Papa, M.4
-
8
-
-
33747370445
-
Implementation of a hybrid intrusion detection system using fuzzyJess
-
Miami, FL
-
A. El-Semary, J. Edmonds, J. González-Pino, and M. Papa, "Implementation of a Hybrid Intrusion Detection System using FuzzyJess." Proceedings of the 7th International Conference on Enterprise Information Systems, Miami, FL, pp. 390-393, 2005.
-
(2005)
Proceedings of the 7th International Conference on Enterprise Information Systems
, pp. 390-393
-
-
El-Semary, A.1
Edmonds, J.2
González-Pino, J.3
Papa, M.4
-
9
-
-
0348132918
-
Mining fuzzy association rules in databases
-
C. Kuok, A. Fu, and M. Wong, "Mining Fuzzy Association Rules in Databases" The ACM SIGMOD Record, Vol. 27, No. 1, pp. 41-46. 1998.
-
(1998)
The ACM SIGMOD Record
, vol.27
, Issue.1
, pp. 41-46
-
-
Kuok, C.1
Fu, A.2
Wong, M.3
-
10
-
-
0001882616
-
Fast algorithms for mining association rules in large databases
-
Santiago, Chile
-
R. Agrawal, and R. Srikant, "Fast Algorithms for Mining Association Rules in Large Databases." Proceedings of the 20th International Conference on Very Large Databases, Santiago, Chile, pp. 487-499, 1994.
-
(1994)
Proceedings of the 20th International Conference on Very Large Databases
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
12
-
-
0034247240
-
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
-
John Wiley & Sons
-
J. Luo, and S. Bridges. "Mining Fuzzy Association Rules and Fuzzy Frequency Episodes for Intrusion Detection." International Journal of Intelligent Systems, John Wiley & Sons, Vol. 15, pp. 687-703, 2000.
-
(2000)
International Journal of Intelligent Systems
, vol.15
, pp. 687-703
-
-
Luo, J.1
Bridges, S.2
-
14
-
-
84973632308
-
Fuzzy reasoning in jess: The fuzzy J toolkit and FuzzyJess
-
Proceedings of the ICEIS 2001, Setubal, Portugal
-
R. Orchard. "Fuzzy Reasoning in Jess: The Fuzzy J Toolkit and FuzzyJess." Proceedings of the ICEIS 2001, 3rd International Conference on Enterprise Information Systems, Setubal, Portugal, pp. 533-542, 2001.
-
(2001)
3rd International Conference on Enterprise Information Systems
, pp. 533-542
-
-
Orchard, R.1
-
15
-
-
0032028297
-
Feature subset selection using a genetic algorithm
-
J. Yang, and V. Honavar, "Feature Subset Selection Using a Genetic Algorithm." IEEE Intelligent Systems, Vol. 13, No. 2, pp. 44-49, 1998.
-
(1998)
IEEE Intelligent Systems
, vol.13
, Issue.2
, pp. 44-49
-
-
Yang, J.1
Honavar, V.2
-
18
-
-
33751119481
-
Hybrid feature selection for modeling intrusion detection systems
-
Pal N.R. et al. (Eds.) Springer Verlag, Germany, Lecture Notes in Computer Science
-
S. Chebrolu, A. Abraham, and J. Thomas, "Hybrid Feature Selection for Modeling Intrusion Detection Systems". 11th International Conference on Neural Information Processing, ICONIP'04, Pal N.R. et al. (Eds.) Springer Verlag, Germany, Lecture Notes in Computer Science, Vol. 3316, pp. 1020-1025, 2004.
-
(2004)
11th International Conference on Neural Information Processing, ICONIP'04
, vol.3316
, pp. 1020-1025
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.3
-
20
-
-
33644961664
-
1999 DARPA intrusion detection system evaluation: Design and procedures
-
Technical Report
-
J. Haines, R. Lippmann, D. Fried, E. Tran, S. Boswell, and M. Zissman, "1999 DARPA Intrusion Detection System Evaluation: Design and Procedures." MIT Lincoln Laboratory, Technical Report.
-
MIT Lincoln Laboratory
-
-
Haines, J.1
Lippmann, R.2
Fried, D.3
Tran, E.4
Boswell, S.5
Zissman, M.6
|