Author:
Bosin Andrea,Dessì Nicoletta,Pes Barbara
Publisher
Springer Berlin Heidelberg
Reference4 articles.
1. Lee, W., Stolfo, S.J.: A Framework for Constructing Features and Models for Intrusion Detections Systems. ACM Transactions on Information and System Security 3(4), 227 (2000)
2. Lee, W.: Applying Data Mining to Intrusion Detection: the Quest for Automation, Efficiency, and Credibility. SIGMOD Explorations 4(2) (2002)
3. Yarmus, J.S.: ABN: A Fast, Greedy Bayesian Network Classifier (2003), http://otn.oracle.com/products/bi/pdf/adaptive_bayes_net.pdf
4. UCI KDD Archive: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Network Intrusion Detection Using Genetic Algorithm and Neural Network;Advances in Computing and Information Technology;2011
2. Data Mining in Security Applications;Encyclopedia of Data Warehousing and Mining, Second Edition;2009