Author:
Boulaiche Ammar,Bouzayani Hatem,Adi Kamel
Reference23 articles.
1. W. W. Cohen, Fast effective rule induction, In A. Prieditis and S. Russell (Eds.), Proc. of the 12th International Conference on Machine Learning, Tahoe City, CA, pp. 115123. Morgan Kaufmann. 9-12 July 1995.
2. S. J. S. Lee, W., K.W. Mok, Adaptive intrusion detection: A data mining approach, Artificial Intelligence Review 14 (6), 533567. 2000.
3. F. Neri, Comparing local search with respect to genetic evolution to detect intrusion in computer networks, In Proc. of the 2000 Congress on Evolutionary Computation CEC00, La Jolla, CA, pp. 238243. IEEE Press. 16-19 July, 2000.
4. F. Neri, Mining tcp/ip traffic for network intrusion detection, In R. L. de M’antaras and E. Plaza (Eds.), Proc. of Machine Learning: ECML 2000, 11th European Conference on Machine Learning, Volume 1810 of Lecture Notes in Computer Science, Barcelona, Spain, pp. 313322. Springer. May 31-June 2. 2000.
5. G. J. Klir, Fuzzy arithmetic with requisite constraints, Fuzzy Sets and Systems, 91:165175. 1997.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献