Author:
Horng Shi-Jinn,Su Ming-Yang,Chen Yuan-Hsin,Kao Tzong-Wann,Chen Rong-Jian,Lai Jui-Lin,Perkasa Citra Dwi
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference20 articles.
1. Evolutionary design of intrusion detection programs;Abraham;International Journal of Network Security,2007
2. Bouzida, Y., & Cuppens, F. (2006). Neural networks vs. decision trees for intrusion detection. .
3. Chimphlee, W., Abdullah, A. H., Md Sap, M. N., Srinoy, S., & Chimphlee, S. (2006) Anomaly-based intrusion detection using fuzzy rough clustering. In Proceedings of the international conference on hybrid information technology (ICHIT’06).
4. Guha, S., Rastogi, R., & Shim, K. (1999). Rock: A robust clustering algorithm for categorical attributes. In Proceedings of the international conference on data engineering (ICDE’99) (pp. 512–521).
5. Guha, S., Rastogi, R., & Shim, K. (1998). Cure: An efficient clustering algorithm for large databases. In Proceedings of the ACM SIGMOD (SIGMOD’98) (pp. 73–84).
Cited by
277 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献