메뉴 건너뛰기




Volumn 2, Issue , 2008, Pages 585-589

Data mining for security applications

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTIONS; CYBER SECURITIES; DATA MINING TECHNIQUES; DATA STREAM MININGS; EXECUTABLES; MALICIOUS CODE DETECTIONS; MINING NETWORKS; NETWORK INTRUSION DETECTIONS; SECURITY APPLICATIONS; UNIVERSITY OF TEXAS;

EID: 63149160678     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EUC.2008.62     Document Type: Conference Paper
Times cited : (25)

References (11)
  • 1
    • 85055224488 scopus 로고    scopus 로고
    • Web Data Mining Technologies and Their Applications in Business Intelligence and Counter- terrorism
    • FL
    • Thuraisingham, B., "Web Data Mining Technologies and Their Applications in Business Intelligence and Counter- terrorism", CRC Press, FL, 2003.
    • (2003) CRC Press
    • Thuraisingham, B.1
  • 2
    • 0033336136 scopus 로고    scopus 로고
    • Distributed Data Mining in Credit Card Fraud Detection
    • Chan, P, et al, "Distributed Data Mining in Credit Card Fraud Detection", IEEE Intelligent Systems, 14 (6), 1999.
    • (1999) IEEE Intelligent Systems , vol.14 , Issue.6
    • Chan, P.1
  • 3
    • 63149097958 scopus 로고    scopus 로고
    • Lazarevic, A., et al., Data Mining for Computer Security Applications, Tutorial Proc. IEEE Data Mining Conference, 2003.
    • Lazarevic, A., et al., "Data Mining for Computer Security Applications", Tutorial Proc. IEEE Data Mining Conference, 2003.
  • 4
    • 63149120650 scopus 로고    scopus 로고
    • Thuraisingham, B., Managing Threats to Web Databases and Cyber Systems, Issues, Solutions and Challenges, Kluwer, MA 2004 (Editors: V. Kumar et al).
    • Thuraisingham, B., "Managing Threats to Web Databases and Cyber Systems, Issues, Solutions and Challenges", Kluwer, MA 2004 (Editors: V. Kumar et al).
  • 5
    • 85055556304 scopus 로고    scopus 로고
    • Database and Applications Security
    • Thuraisingham B., "Database and Applications Security", CRC Press, 2005.
    • (2005) CRC Press
    • Thuraisingham, B.1
  • 6
    • 63149193919 scopus 로고    scopus 로고
    • Data Miming, Privacy, Civil Liberties and National Security
    • Thuraisingham B., "Data Miming, Privacy, Civil Liberties and National Security", SIGKDD Explorations, 2002.
    • (2002) SIGKDD Explorations
    • Thuraisingham, B.1
  • 7
    • 36049030250 scopus 로고    scopus 로고
    • A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering
    • ACM/Springer-Verlag
    • Khan, L., Awad, M. and Thuraisingham, B. "A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering", The VLDB Journal: ACM/Springer-Verlag, 16(1), page 507-521, 2007.
    • (2007) The VLDB Journal , vol.16 , Issue.1 , pp. 507-521
    • Khan, L.1    Awad, M.2    Thuraisingham, B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.