Author:
García Víctor H.,Monroy Raúl,Quintana Maricela
Reference13 articles.
1. Amor NB, Benferhat S, Elouedi Z (2004) Naive bayes vs decision trees in intrusion detection systems. In Omicini A, Wainwright RL (eds) Proceedings of the 2004 ACM symposium on Applied computing, pages 420–424. ACM Press
2. Barbará D, Couto J, Jajodia S, Wu N (2001) ADAM: A testbed for exploring the use of data mining in intrusion detection. SIC MOD Record, 30(4): 15–24
3. Clark P, Niblett T (1989) The CN2 induction algorithm. Machine Learning, 3:261–283
4. Cohen WW (1995) Fast effective rule induction. In Prieditis A, Russell SJ (eds) Proceedings of the Twelfth International Conference on Machine Learning, pages 115–123. Morgan Kaufmann
5. Lee W, Stolfo SJ (1999) Combining knowledge discovery and knowledge engineering to build idss. In Recent Advances in Intrusion Detection (RAID’99)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献