-
1
-
-
0027621699
-
Mining Association Rules between Sets of Items in Large Databases
-
Agrawal, R., Imielinski, T., Swami, A.: Mining Association Rules between Sets of Items in Large Databases. In: Proceedings of the ACM-SIGMOD International Conference on Management of Data, Washington, USA, pp. 207-216 (1993)
-
(1993)
Proceedings of the ACM-SIGMOD International Conference on Management of Data, Washington, USA
, pp. 207-216
-
-
Agrawal, R.1
Imielinski, T.2
Swami, A.3
-
2
-
-
4544229404
-
ADAM: Detecting Intrusions by Data Mining
-
Barbara, D., Couto, J., Jajodia, S., Popyack, L., Wu, N.: ADAM: Detecting Intrusions by Data Mining. In: Proc. of the 2nd Annual IEEE SMC Information Assurance Workshop, West Point, NY, pp. 11-16 (2001)
-
(2001)
Proc. of the 2nd Annual IEEE SMC Information Assurance Workshop, West Point, NY
, pp. 11-16
-
-
Barbara, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
3
-
-
84861436756
-
-
Ben Messaoud, R., Rabaséda, S.L., Missaoui, R., Boussaid, O.: OLEMAR: An Online Environment for Mining Association Rules in Multidimensional Data, vol. 2, pp. 14-47 (2008)
-
(2008)
OLEMAR: An Online Environment for Mining Association Rules in Multidimensional Data
, vol.2
, pp. 14-47
-
-
Ben Messaoud, R.1
Rabaséda, S.L.2
Missaoui, R.3
Boussaid, O.4
-
4
-
-
35048880717
-
Revisiting Generic Bases of Association Rules
-
Kambayashi, Y., Mohania, M., Wöß, W. (eds.) DaWaK 2004. Springer, Heidelberg
-
Yahia, S.B., Nguifo, E.M.: Revisiting Generic Bases of Association Rules. In: Kambayashi, Y., Mohania, M., Wöß, W. (eds.) DaWaK 2004. LNCS, vol. 3181, pp. 58-67. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3181
, pp. 58-67
-
-
Yahia, S.B.1
Nguifo, E.M.2
-
5
-
-
84861436974
-
IDS-GARC: Détection d'Intrusions Basée sur les Règles Associatives Génériques de Classification
-
Brahmi, I., Ben Yahia, S., Slimai, Y.: IDS-GARC: Détection d'Intrusions Basée sur les Règles Associatives Génériques de Classification. In: Actes du 9ème Colloque Africain sur la Recherche en Informatique, Rabat, Maroc, pp. 667-674 (2008)
-
(2008)
Actes du 9ème Colloque Africain Sur la Recherche en Informatique, Rabat, Maroc
, pp. 667-674
-
-
Brahmi, I.1
Ben Yahia, S.2
Slimai, Y.3
-
6
-
-
70349696809
-
Data Mining for Cyber Security
-
Singhal, A. (ed.) Springer
-
Chandola, V., Eilertson, E., Ertoz, L., Simon, G., Kumar, V.: Data Mining for Cyber Security. In: Singhal, A. (ed.) Data Warehousing and Data Mining Techniques for Computer Security, pp. 83-103. Springer (2006)
-
(2006)
Data Warehousing and Data Mining Techniques for Computer Security
, pp. 83-103
-
-
Chandola, V.1
Eilertson, E.2
Ertoz, L.3
Simon, G.4
Kumar, V.5
-
7
-
-
0344811122
-
An Overview of Data Warehousing and OLAP Technology
-
Chaudhuri, S., Dayal, U.: An Overview of Data Warehousing and OLAP Technology. SIGMOD Record 26(1), 65-74 (1997)
-
(1997)
SIGMOD Record
, vol.26
, Issue.1
, pp. 65-74
-
-
Chaudhuri, S.1
Dayal, U.2
-
8
-
-
85072300233
-
On-Demand View Materialization and Indexing for Network Forensic Analysis
-
Geambasu, R., Bragin, T., Jung, J., Balazinska, M.: On-Demand View Materialization and Indexing for Network Forensic Analysis. In: Proceedings of the 3rd USENIX International Workshop on Networking Meets Databases, Cambridge, MA, pp. 4:1-4:7 (2007)
-
(2007)
Proceedings of the 3rd USENIX International Workshop on Networking Meets Databases, Cambridge, MA
-
-
Geambasu, R.1
Bragin, T.2
Jung, J.3
Balazinska, M.4
-
9
-
-
84861449927
-
Intrusion Detection Using C4.5: Performance Enhancement by Classifier Combination
-
Gyanchandani, M., Yadav, R.N., Rana, J.L.: Intrusion Detection Using C4.5: Performance Enhancement by Classifier Combination. In: Proceedings of the International Conference on Advances in Computer Science, pp. 130-133 (2010)
-
(2010)
Proceedings of the International Conference on Advances in Computer Science
, pp. 130-133
-
-
Gyanchandani, M.1
Yadav, R.N.2
Rana, J.L.3
-
10
-
-
0004204719
-
-
Phd thesis, Columbia University, New York, NY, USA
-
Lee, W.: A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems. Phd thesis, Columbia University, New York, NY, USA (1999)
-
(1999)
A Data Mining Framework for Constructing Features and Models for Intrusion Detection Systems
-
-
Lee, W.1
-
11
-
-
0033096890
-
Efficient Mining of Association Rules Using Closed Itemset Lattices
-
Pasquier, N., Bastide, Y., Taouil, R., Lakhal, L.: Efficient Mining of Association Rules Using Closed Itemset Lattices. Journal of Information Systems 24(1), 25-46 (1999)
-
(1999)
Journal of Information Systems
, vol.24
, Issue.1
, pp. 25-46
-
-
Pasquier, N.1
Bastide, Y.2
Taouil, R.3
Lakhal, L.4
-
13
-
-
84861438903
-
Warehousing and Data Mining Techniques for Cyber Security
-
Springer
-
Singhal, A.: Warehousing and Data Mining Techniques for Cyber Security. Advances in Information Security, vol. 31. Springer (2007)
-
(2007)
Advances in Information Security
, vol.31
-
-
Singhal, A.1
-
14
-
-
79960800396
-
Data Mining for Intrusion Detection
-
Maimon, O., Rokach, L. (eds.) Springer
-
Singhal, A., Jajodia, S.: Data Mining for Intrusion Detection. In: Maimon, O., Rokach, L. (eds.) Data Mining and Knowledge Discovery Handbook, pp. 1171-1180. Springer (2010)
-
(2010)
Data Mining and Knowledge Discovery Handbook
, pp. 1171-1180
-
-
Singhal, A.1
Jajodia, S.2
|