메뉴 건너뛰기




Volumn 7, Issue , 2010, Pages

The intrusion detection system based on fuzzy association rules mining

Author keywords

Association rules; Denial of service attack; Fuzzy association rules; Fuzzy theory; Network security

Indexed keywords

ABNORMAL DETECTION; CUT-OFF; DENIAL OF SERVICE; DENIAL OF SERVICE ATTACKS; DOS ATTACKS; FALSE POSITIVE; FUZZY ASSOCIATION RULE; FUZZY THEORY; INFORMATION DETECTION; INTRUSION DETECTION SYSTEMS; NETWORK BEHAVIORS; NETWORK INTRUSION DETECTION SYSTEMS; PACKET FLOWS;

EID: 77958026652     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCET.2010.5485674     Document Type: Conference Paper
Times cited : (4)

References (6)
  • 6
    • 77958043622 scopus 로고    scopus 로고
    • App lying data mining of fuzzy association rules to network intrusion detection:P roceedings of the 2006 IEEE workshop on information assurance.[C]
    • West Point, NY
    • Aly El2Semary, Janica Edmonds, Jesus Gonzalez2Pino, et al. App lying data mining of fuzzy association rules to network intrusion detection:p roceedings of the 2006 IEEE Workshop on Information Assurance.[C]. United States Military Academy, West Point, NY, 2006.
    • (2006) United States Military Academy
    • El Semary, A.1    Edmonds, J.2    Gonzalez Pino, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.