-
2
-
-
0027621699
-
Mining association rules between sets of items in large databases
-
Agrawal R., Imielinski T., and Swami A. Mining association rules between sets of items in large databases. SIGMOD (1993)
-
(1993)
SIGMOD
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
3
-
-
0037390557
-
Mining fuzzy association rules in a bank-account database
-
Au W.-H., and Chan K.C.C. Mining fuzzy association rules in a bank-account database. IEEE Transactions on Fuzzy Systems 11 2 (2003) 238-248
-
(2003)
IEEE Transactions on Fuzzy Systems
, vol.11
, Issue.2
, pp. 238-248
-
-
Au, W.-H.1
Chan, K.C.C.2
-
10
-
-
67349138509
-
-
IP Traffic. http://www.omnicor.com/netest.htm
-
-
-
IP Traffic1
-
11
-
-
0037860947
-
-
Mehmet Kaya, Reda Alhajj. A clustering algorithm with genetically optimized membership functions for fuzzy association rules mining. In: The Proceedings of the IEEE Conference on Fuzzy Systems; 2003a.
-
Mehmet Kaya, Reda Alhajj. A clustering algorithm with genetically optimized membership functions for fuzzy association rules mining. In: The Proceedings of the IEEE Conference on Fuzzy Systems; 2003a.
-
-
-
-
12
-
-
33645616225
-
Facilitating fuzzy association rules mining by using multi-objective genetic algorithms for automated clustering
-
Kaya M, Alhajj R. Facilitating fuzzy association rules mining by using multi-objective genetic algorithms for automated clustering. In: The Proceedings of the IEEE Conference on Data Mining; 2003b.
-
(2003)
The Proceedings of the IEEE Conference on Data Mining
-
-
Kaya, M.1
Alhajj, R.2
-
15
-
-
34548342921
-
Improved hybrid intelligent intrusion detection system using ai technique
-
Shanmugam B., and Idris N.B. Improved hybrid intelligent intrusion detection system using ai technique. Neural Network World 17 4 (2007) 351-362
-
(2007)
Neural Network World
, vol.17
, Issue.4
, pp. 351-362
-
-
Shanmugam, B.1
Idris, N.B.2
-
16
-
-
50249150849
-
Using incremental mining to the fuzzy rules for real-time network intrusion detect intrusion detection systems
-
Workshops, March 25-28
-
Su Ming-Yang, Yeh Sheng-Cheng, Chang Kai-Chi, Wei Hua-Fu. Using incremental mining to the fuzzy rules for real-time network intrusion detect intrusion detection systems. In: The Proceedings of the IEEE Conference on Advanced Information Networking and Applications - Workshops, March 25-28, 2008a. p. 50-5.
-
(2008)
The Proceedings of the IEEE Conference on Advanced Information Networking and Applications
, pp. 50-55
-
-
Su, M.-Y.1
Yeh, S.-C.2
Chang, K.-C.3
Wei, H.-F.4
-
17
-
-
45849149267
-
Feature weighting and selection for a real-time network intrusion detection system based on GA with KNN
-
To appear
-
Su M.-Y., Chang K.-C., Wei H.-F., and Lin C.-Y. Feature weighting and selection for a real-time network intrusion detection system based on GA with KNN. Lecture Note on Computer Science (LNCS) (2008) To appear
-
(2008)
Lecture Note on Computer Science (LNCS)
-
-
Su, M.-Y.1
Chang, K.-C.2
Wei, H.-F.3
Lin, C.-Y.4
-
18
-
-
34447639073
-
A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers
-
Toosj A.N., and Kahani M. A new approach to intrusion detection based on an evolutionary soft computing model using neuro-fuzzy classifiers. Computer Communications 30 (2007) 2201-2212
-
(2007)
Computer Communications
, vol.30
, pp. 2201-2212
-
-
Toosj, A.N.1
Kahani, M.2
-
19
-
-
34247636165
-
Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection
-
Tsang C.-H., Kwong S., and Wang H. Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection. Pattern Recognition 40 (2007) 2373-2391
-
(2007)
Pattern Recognition
, vol.40
, pp. 2373-2391
-
-
Tsang, C.-H.1
Kwong, S.2
Wang, H.3
-
20
-
-
23944446885
-
-
Xie Dong (Walter). Fuzzy association rules discovered on effective reduced database algorithm. In: The Proceedings of the IEEE Conference on Fuzzy Systems; 2005.
-
Xie Dong (Walter). Fuzzy association rules discovered on effective reduced database algorithm. In: The Proceedings of the IEEE Conference on Fuzzy Systems; 2005.
-
-
-
|