-
1
-
-
84876313026
-
The approach of instruction detection based on data mining
-
Chen, X., 2010. The approach of instruction detection based on data mining. J. Comput. Eng., 3(5): 156-161.
-
(2010)
J. Comput. Eng.
, vol.3
, Issue.5
, pp. 156-161
-
-
Chen, X.1
-
2
-
-
84876304478
-
Research intrusion detection system based on data mining technology
-
Gao, X. and M. Wang, 2003. Research intrusion detection system based on data mining technology. J. Northwestern Polytech. Univ., 21(4): 189-192.
-
(2003)
J. Northwestern Polytech. Univ.
, vol.21
, Issue.4
, pp. 189-192
-
-
Gao, X.1
Wang, M.2
-
3
-
-
84876306186
-
Application research of data mining technology for intrusion detection
-
Gu, J. and L. Sun, 2006. Application research of data mining technology for intrusion detection. J. Comput. Technol. Develop., 16(9): 243-246.
-
(2006)
J. Comput. Technol. Develop.
, vol.16
, Issue.9
, pp. 243-246
-
-
Gu, J.1
Sun, L.2
-
4
-
-
0034335199
-
A survey of intrusion detection research on network security
-
Jiang, J., H. Ma and D. Ren, 2000. A survey of intrusion detection research on network security. J. Softw., 11(11): 1460-1466.
-
(2000)
J. Softw.
, vol.11
, Issue.11
, pp. 1460-1466
-
-
Jiang, J.1
Ma, H.2
Ren, D.3
-
5
-
-
0036488412
-
The structure of intrusion detection system based on data mining approach
-
Lu, Y., Y. Cao and J. Ling, 2003. The structure of intrusion detection system based on data mining approach. J. Wuhan Univ., 48(1): 63-66.
-
(2003)
J. Wuhan Univ.
, vol.48
, Issue.1
, pp. 63-66
-
-
Lu, Y.1
Cao, Y.2
Ling, J.3
-
6
-
-
84876322363
-
Data mining approaches for network intrusion detection
-
Ning, Y. and X. Guo, 2006. Data mining approaches for network intrusion detection. J. Comput. Measur. Control, 10(3): 189-192.
-
(2006)
J. Comput. Measur. Control
, vol.10
, Issue.3
, pp. 189-192
-
-
Ning, Y.1
Guo, X.2
-
7
-
-
84876306451
-
An intelligent model of instrusion detection based on data mining approach
-
Su, H. and L. Fu, 2007. An intelligent model of instrusion detection based on data mining approach. J. Micro Comput. Inform., 23(3): 74-77.
-
(2007)
J. Micro Comput. Inform.
, vol.23
, Issue.3
, pp. 74-77
-
-
Su, H.1
Fu, L.2
-
8
-
-
84876319778
-
Intrusion detection system based on data mining technology
-
Xu, S. and L. Cai, 2008. Intrusion detection system based on data mining technology. J. Elect. Des. Eng., 17(8): 3-5.
-
(2008)
J. Elect. Des. Eng.
, vol.17
, Issue.8
, pp. 3-5
-
-
Xu, S.1
Cai, L.2
|