메뉴 건너뛰기




Volumn , Issue , 2009, Pages 167-174

Anomaly detection in data streams using fuzzy logic

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; CLUSTERING RESULTS; DATA STREAM; DATA STREAM CLUSTERING; DENSITY FUNCTIONS; HUMAN INTERVENTION; REAL-TIME DECISION MAKING; UNSUPERVISED DATA;

EID: 70449746530     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICICT.2009.5267196     Document Type: Conference Paper
Times cited : (8)

References (29)
  • 2
    • 84869679257 scopus 로고    scopus 로고
    • www.wikipedia.org
  • 4
    • 0004169830 scopus 로고
    • 3rd Edition ISBN: 0471930946 Publication Date: Publisher: Wiley
    • V. Barnett and T. Lewis, "Outliers in Statistical Data", 3rd Edition ISBN: 0471930946 Publication Date: Publisher: Wiley: 1994.
    • (1994) Outliers in Statistical Data
    • Barnett, V.1    Lewis, T.2
  • 5
    • 77952380096 scopus 로고    scopus 로고
    • Mining distancebased outliers in near linear time with randomization and a simple pruning rule
    • S. Bay and M. Schwabacher, "Mining distancebased outliers in near linear time with randomization and a simple pruning rule". In ACM SIGKDD, 2003.
    • (2003) ACM SIGKDD
    • Bay, S.1    Schwabacher, M.2
  • 7
    • 0039253819 scopus 로고    scopus 로고
    • LOF: Identifying density-based local outliers
    • M. Breunig et al, "LOF: Identifying density-based local outliers", In ACM SIGMOD, 2000.
    • (2000) ACM SIGMOD
    • Breunig, M.1
  • 8
    • 0034133513 scopus 로고    scopus 로고
    • Distance-based outliers: Algorithms and applications
    • E. Knorr et al, "Distance-based outliers: Algorithms and applications", VLDB Journal, 2000.
    • (2000) VLDB Journal
    • Knorr, E.1
  • 9
    • 0242456797 scopus 로고    scopus 로고
    • K. Sequeira and M. Zaki. ADMIT, Anomalybased data mining for intrusions, In ACM SIGKDD, 2002.
    • K. Sequeira and M. Zaki. ADMIT, "Anomalybased data mining for intrusions", In ACM SIGKDD, 2002.
  • 10
    • 32344452166 scopus 로고    scopus 로고
    • A comparative study of outlier detection schemes for network intrusion detection
    • A. Lazarevic et al, "A comparative study of outlier detection schemes for network intrusion detection", In SIAM Data Mining, 2003.
    • (2003) SIAM Data Mining
    • Lazarevic, A.1
  • 17
    • 0033681199 scopus 로고    scopus 로고
    • Dickerson, J. E, Dickerson, J. A, Fuzzy network profiling for intrusion detection, Fuzzy Information Processing Society, NAFIPS, 19th International Conference of the North American. 2000.
    • Dickerson, J. E, Dickerson, J. A, "Fuzzy network profiling for intrusion detection", Fuzzy Information Processing Society, NAFIPS, 19th International Conference of the North American. 2000.
  • 20
    • 0030157145 scopus 로고    scopus 로고
    • BIRCH: An efficient data clustering method for very large databases
    • June, Pages:, ISSN: 0163-5808, New York, NY, USA
    • Tian Zhang, Raghu Ramakrishnan, Miron Livny, "BIRCH: an efficient data clustering method for very large databases", ACM SIGMOD Record archive Volume 25, Issue 2 June 1996, Pages: 103-114, ISSN: 0163-5808, New York, NY, USA.
    • (1996) ACM SIGMOD Record archive , vol.25 , Issue.2 , pp. 103-114
    • Zhang, T.1    Ramakrishnan, R.2    Livny, M.3
  • 26
    • 84869688781 scopus 로고    scopus 로고
    • http://www.networkworld.com/columnists/2006/0 3130 6-faceoff-yes.html
  • 27
    • 84869688779 scopus 로고    scopus 로고
    • http://ieeexplore.ieee.org
  • 28
    • 84869688782 scopus 로고    scopus 로고
    • http://portal.acm.org
  • 29
    • 84869671477 scopus 로고    scopus 로고
    • ht ml
    • http://www.csse.monash.edu.au/∼mgaber/main. ht ml


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.