-
1
-
-
67650706141
-
The Application of Association Rule Mining in Promoting Data Quality
-
Jan
-
Zhang Yingjun, Xie Binhong, Zhao Hongyan. "The Application of Association Rule Mining in Promoting Data Quality", Journal of Taiyuan University of Technology, Jan 2008, pp. 46-48.
-
(2008)
Journal of Taiyuan University of Technology
, pp. 46-48
-
-
Zhang, Y.1
Xie, B.2
Zhao, H.3
-
2
-
-
67650701865
-
Analysis and Design of Intrusion Detection Based on Data Mining of Association Rule
-
Zeng Changjun. "Analysis and Design of Intrusion Detection Based on Data Mining of Association Rule", Computer&Digital Engineering, 2008, pp. 91-94.
-
(2008)
Computer&Digital Engineering
, pp. 91-94
-
-
Zeng, C.1
-
3
-
-
67650704743
-
Data Mining Algorithm of Fuzzy Multi-layered Association Rule
-
Zeng Xiaowen, Wang Huiyu. "Data Mining Algorithm of Fuzzy Multi-layered Association Rule", Computer Development&Applications, 2008, pp. 59-61.
-
(2008)
Computer Development&Applications
, pp. 59-61
-
-
Zeng, X.1
Wang, H.2
-
4
-
-
70350558138
-
-
ZHAO Jitao, MA Li, WANG Xianjun, SHANG Guanglong. An Adaptive Algorithm for Mining Fuzzy Association Rules, Computer Technology and Development, May 2008, pp. 64-66
-
ZHAO Jitao, MA Li, WANG Xianjun, SHANG Guanglong. "An Adaptive Algorithm for Mining Fuzzy Association Rules", Computer Technology and Development, May 2008, pp. 64-66
-
-
-
-
5
-
-
84949223752
-
-
Fluhrer S, Mantin I, Shamir A. Weaknesses in Key Scheduling algorithm of RC4. Proceeding of Eighth Annual Workshop on Selected Areas in Cryptography, Las Vegas(NV), 2001.1~2
-
Fluhrer S, Mantin I, Shamir A. "Weaknesses in Key Scheduling algorithm of RC4". Proceeding of Eighth Annual Workshop on Selected Areas in Cryptography, Las Vegas(NV), 2001.1~2
-
-
-
-
6
-
-
70350529538
-
-
Donald Welch, Scott Lathrop. A Survey of 802.11a wireless security threats and security mechanisms. Information Technology and Operations Center, Dept. EE&CS, U.S. Military Academy, 2003.
-
Donald Welch, Scott Lathrop. "A Survey of 802.11a wireless security threats and security mechanisms". Information Technology and Operations Center, Dept. EE&CS, U.S. Military Academy, 2003.
-
-
-
-
7
-
-
70350537943
-
With improved Associate rules counting to build Intrusion Detection System mould
-
The development of computer
-
Zhu xiaodong. Zheng Cheng. Le yi, "With improved Associate rules counting to build Intrusion Detection System mould", The development of computer,2004(11) , pp. 139-141.
-
(2004)
, Issue.11
, pp. 139-141
-
-
Zhu xiaodong1
-
8
-
-
0242456797
-
-
Karlton Sequeira, Mohammed J.Zaki. ADMIT: Anomaly-based data Mining for Intrusion, In: Osmar Zaiane ed. Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada. 2002. NY USA:ACM Press. 2002, pp. 386 - 395.
-
Karlton Sequeira, Mohammed J.Zaki. ADMIT: "Anomaly-based data Mining for Intrusion", In: Osmar Zaiane ed. Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada. 2002. NY USA:ACM Press. 2002, pp. 386 - 395.
-
-
-
-
9
-
-
0009900351
-
Anomaly Detection over Noisy Data Using Learned Probability Distributions
-
Pat Lnagley ed, CA USA: Morgan Kaufmann
-
Eleazar Eskin, "Anomaly Detection over Noisy Data Using Learned Probability Distributions", in: Pat Lnagley ed. Proceedings of the Seventeenth International Conference on Machine Learning, Stanford, CA USA. 2000. CA USA: Morgan Kaufmann. 2000, pp. 255 - 262.
-
(2000)
Proceedings of the Seventeenth International Conference on Machine Learning, Stanford, CA USA
, pp. 255-262
-
-
Eskin, E.1
-
11
-
-
84946397365
-
Wireless intrusion detection and response
-
West Point N.Y, June
-
Y.X.Lim, T.Schmoyer, J.Levine, H.Owen, "Wireless intrusion detection and response", IEEE 4th Annual Information Assurance Workshop, West Point N.Y., June 2003,68-75
-
(2003)
IEEE 4th Annual Information Assurance Workshop
, pp. 68-75
-
-
Lim, Y.X.1
Schmoyer, T.2
Levine, J.3
Owen, H.4
|