메뉴 건너뛰기




Volumn , Issue , 2005, Pages 144-153

Evaluating pattern recognition techniques in intrusion detection systems

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALOUS ACTIVITY; DATA SOURCE; DESIGN AND OPERATIONS; INTRUSION DETECTION SYSTEMS; NETWORK TRAFFIC; OPERATING SYSTEMS; OPERATIONAL SCENARIO; PATTERN RECOGNITION TECHNIQUES; POTENTIAL ATTACK; REAL-WORLD; RESEARCH FIELDS;

EID: 78650753809     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (18)
  • 10
    • 0002283033 scopus 로고    scopus 로고
    • From data mining to knowledge discovery in databases
    • Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery in databases. AI Magazine (1996) 37-52
    • (1996) AI Magazine , pp. 37-52
    • Fayyad, U.1    Piatetsky-Shapiro, G.2    Smyth, P.3
  • 12
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • McHugh, J.: Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions on Information and System Security 3 (2000) 262-294
    • (2000) ACM Transactions on Information and System Security 3 , pp. 262-294
    • McHugh, J.1
  • 17
    • 1542276975 scopus 로고    scopus 로고
    • An introdution to boosting and leveraging
    • In Mendelson, S., Smola, A., eds.: Springer Verlag
    • Meir, R., Ratsch, G.: An introdution to boosting and leveraging. In Mendelson, S., Smola, A., eds.: Advanced Lectures an Machine Learning, Springer Verlag (2003) 119-184
    • (2003) Advanced Lectures An Machine Learning , pp. 119-184
    • Meir, R.1    Ratsch, G.2
  • 18


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.