Author:
Guan Jian,Liu Da-xin,Wang Tong
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Frank, J.: Artificial intelligence and intrusion detection: Current and future directions. In: Proceedings of the 17th national computer security conference (October 1994)
2. Lunt, T., Jagannathan, R.: A prototype real-time intrusion-detection expert system. In: Proceedings of 1988 IEEE computer society symposium on research in security and privacy, Oakland, California, April 18-21, pp. 59–66. IEEE Computer Society Press, Los Alamitos (1988)
3. Teng Chen, H., Lu, K.: Adaptive real-time anomaly detection using inductively generated sequential patterns. In: Proceedings of 1990 IEEE computer society symposium on research in security and privacy, Oakland, California, May 7-9, pp. 278–284. IEEE Computer Society Press, Los Alamitos (1990)
4. Debar, H., Becker, M., Siboni, D.: A neural network component for an intrusion detection system. In: Proceedings of 1992 IEEE computer society symposium on research in security and privacy, Oakland, California, May 4-6, pp. 240–250. IEEE Computer Society Press, Los Alamitos (1992)
5. Lee, W., Stolfo, S., Mok, K.: A data mining framework for building intrusion detection models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999, pp. 120–132 (1999)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献