메뉴 건너뛰기




Volumn , Issue 2, 2009, Pages 413-416

Improvement of association rules mining algorithm in wireless network intrusion detection

Author keywords

Algorithm; Association rule; Fuzzy; Intrusion detection; Wireless network

Indexed keywords

APRIORI; ASSOCIATION RULE MINING; ASSOCIATION RULES MINING; CLASSICAL ALGORITHMS; COMPARATIVE ANALYSIS; FUZZY; FUZZY ASSOCIATION RULE;

EID: 70350555372     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CINC.2009.19     Document Type: Conference Paper
Times cited : (11)

References (11)
  • 1
    • 67650706141 scopus 로고    scopus 로고
    • The Application of Association Rule Mining in Promoting Data Quality
    • Jan
    • Zhang Yingjun, Xie Binhong, Zhao Hongyan. "The Application of Association Rule Mining in Promoting Data Quality", Journal of Taiyuan University of Technology, Jan 2008, pp. 46-48.
    • (2008) Journal of Taiyuan University of Technology , pp. 46-48
    • Zhang, Y.1    Xie, B.2    Zhao, H.3
  • 2
    • 67650701865 scopus 로고    scopus 로고
    • Analysis and Design of Intrusion Detection Based on Data Mining of Association Rule
    • Zeng Changjun. "Analysis and Design of Intrusion Detection Based on Data Mining of Association Rule", Computer&Digital Engineering, 2008, pp. 91-94.
    • (2008) Computer&Digital Engineering , pp. 91-94
    • Zeng, C.1
  • 3
    • 67650704743 scopus 로고    scopus 로고
    • Data Mining Algorithm of Fuzzy Multi-layered Association Rule
    • Zeng Xiaowen, Wang Huiyu. "Data Mining Algorithm of Fuzzy Multi-layered Association Rule", Computer Development&Applications, 2008, pp. 59-61.
    • (2008) Computer Development&Applications , pp. 59-61
    • Zeng, X.1    Wang, H.2
  • 4
    • 70350558138 scopus 로고    scopus 로고
    • ZHAO Jitao, MA Li, WANG Xianjun, SHANG Guanglong. An Adaptive Algorithm for Mining Fuzzy Association Rules, Computer Technology and Development, May 2008, pp. 64-66
    • ZHAO Jitao, MA Li, WANG Xianjun, SHANG Guanglong. "An Adaptive Algorithm for Mining Fuzzy Association Rules", Computer Technology and Development, May 2008, pp. 64-66
  • 5
    • 84949223752 scopus 로고    scopus 로고
    • Fluhrer S, Mantin I, Shamir A. Weaknesses in Key Scheduling algorithm of RC4. Proceeding of Eighth Annual Workshop on Selected Areas in Cryptography, Las Vegas(NV), 2001.1~2
    • Fluhrer S, Mantin I, Shamir A. "Weaknesses in Key Scheduling algorithm of RC4". Proceeding of Eighth Annual Workshop on Selected Areas in Cryptography, Las Vegas(NV), 2001.1~2
  • 6
    • 70350529538 scopus 로고    scopus 로고
    • Donald Welch, Scott Lathrop. A Survey of 802.11a wireless security threats and security mechanisms. Information Technology and Operations Center, Dept. EE&CS, U.S. Military Academy, 2003.
    • Donald Welch, Scott Lathrop. "A Survey of 802.11a wireless security threats and security mechanisms". Information Technology and Operations Center, Dept. EE&CS, U.S. Military Academy, 2003.
  • 7
    • 70350537943 scopus 로고    scopus 로고
    • With improved Associate rules counting to build Intrusion Detection System mould
    • The development of computer
    • Zhu xiaodong. Zheng Cheng. Le yi, "With improved Associate rules counting to build Intrusion Detection System mould", The development of computer,2004(11) , pp. 139-141.
    • (2004) , Issue.11 , pp. 139-141
    • Zhu xiaodong1
  • 8
    • 0242456797 scopus 로고    scopus 로고
    • Karlton Sequeira, Mohammed J.Zaki. ADMIT: Anomaly-based data Mining for Intrusion, In: Osmar Zaiane ed. Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada. 2002. NY USA:ACM Press. 2002, pp. 386 - 395.
    • Karlton Sequeira, Mohammed J.Zaki. ADMIT: "Anomaly-based data Mining for Intrusion", In: Osmar Zaiane ed. Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Edmonton, Alberta, Canada. 2002. NY USA:ACM Press. 2002, pp. 386 - 395.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.