搜索历史记录选项已关闭,请开启搜索历史记录选项。
作者: Wenke Lee , Salvatore J. Stolfo
DOI: 10.1145/382912.382914
关键词:
摘要: … according to the feature definitions to generate intrusion detection rules. Results from the 1998 DARPA Intrusion Detection Evaluation showed that our ID model was one of the best …
knowledge discovery and data mining,2012, 引用: 22
international conference on security and cryptography,2006, 引用: 1
,2011, 引用: 34
Security and Management,2003, 引用: 23
United States. Defense Advanced Research Projects Agency,2004, 引用: 1
,2004, 引用: 2
intelligent data engineering and automated learning,2004, 引用: 2
international conference on software, telecommunications and computer networks,2004, 引用: 5
,2006, 引用: 2
australasian data mining conference,2008, 引用: 41