Author:
Jan Nien-Yi,Lin Shun-Chieh,Tseng Shian-Shyong,Lin Nancy P.
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference27 articles.
1. Agrwal, R., & Srikant, R. (1995). Mining sequential patterns. In Proceedings of the 11th international conference on data engineering (pp. 3–14).
2. Alharby, A., & Imai, H. (2005). IDS false alarm reduction using continuous and discontinuous patterns. In Proceedings of ACNS 2005 (pp. 192–205).
3. Basic Analysis and Security Engine (BASE) (2005). URL: .
4. Bridis, T. (2002). Powerful attack cripples majority of key Internet computers. In Yahoo! news.
5. Cabrera, J. B. D., Lewis, L., Qin, X., Lee, W., Prasanth, R. K., Ravichandran, B., & Mehra, R. K. (2001). Proactive detection of distributed denial of service attacks using MIB traffic variables-A feasibility study. In Proceedings of the seventh IFIP/IEEE international symposium on integrated network management (pp. 609–622).
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献