Download - VTUPlanet

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
REFERENCES
[1] Yusufovna S.F., “Integrating Intrusion Detection System and Data Mining”, International
Symposium on Ubiquitous Multimedia Computing, 978-0-7695-3427-5/08, IEEE, 2008,
pp.256-259.
[2] Miao Chunyu, Chen Wei, “A Study of Intrusion Detection System Based on Data Mining”,
978-1-4244-6943-7/10, IEEE,2010, pp.186-189.
[3] Heady et.al. “The architecture of a network level intrusion detection system”. Technical
report, Computer Science Department, University of New Mexico, August 1990.
[4] Scarfone, Karen; Mell, Peter (February 2007). "Guide to Intrusion Detection and Prevention
Systems (IDPS)". Computer Security Resource Center (National Institute of Standards and
Technology) (800-94). http://csrc.ncsl.nist.gov/publications/nistpubs/800-94/SP800-94.pdf.
[5] Frawley et.al. "Knowledge Discovery in Databases: An Overview". AI Magazine, ISSN
0738-4602,pp.213-228.
[6] Hand et.al.” Principles of Data Mining”, MIT Press, Cambridge, MA. ISBN 0-262- 08290-X,
2001.
[7] Lee W, Salvatore Department” Data Mining Approaches for Intrusion Detection [M]”, New
York, NY: Computer Science Department, Columbia University, 1996.
[8] Liu Wei, “Research of Data Mining in Intrusion Detection System and the uncertainty of the
attack”, 978-1-4244-5273-6/09, IEEE, 2009.
Related documents