您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 管理学资料 > 基于Rough Set的数据挖掘技术在网络安全中的应用研究――邮件分类和入侵检测
基于RoughSet的数据挖掘技术在网络安全中的应用研究——邮件分类和入侵检测作者:李志君学位授予单位:重庆邮电学院被引用次数:1次参考文献(56条)1.陈立潮网络安全策略与措施探讨2003(08)2.JScambray.SMcclure.GKurtzHackingExposed:NetworkSecuritySecrets&Solutions3.陈绪水.邓亚平网络安全评测系统的设计与实现2003(ze)4.董安波.陈龙.王国胤.董振兴电子商务安全审计系统的设计与实现[期刊论文]-计算机工程与应用2004(7)5.WWCohen.YSingerContext-SensitiveLearningMethodsforTextCategorization6.MGraven.DDipasquo.DFreitag.A.McCallumLearningtoExtractSymbolicKnowledgefromtheWorldWideWeb7.XCarreras.LMrquezBoostingTreesforAnti-spamEmailFiltering20018.IAndroutsopoulos.GPaliouras.VKarkaletsis.G.Sakkis,P.StamatopoulosLearningtoFilterSpamE-mail:AComparisonofaNaiveBayesianandaMemory-basedApproach20009.XCarreras.LMrquezBoostingTreesforAnti-spamEmailFiltering200110.SKiritchenko.SMatwinEmailClassificationwithCo-training200111.MSahami.SDumais.DHeckerman.E.HorvitzABayesianApproachtoFilteringJunkE-mail12.WWCohenLearningRulesthatClassifyE-mail13.DEDenningAnIntrusionDetectionModel1987(02)14.TFLunt.RJagannathanAPrototypeReal-timeIntrusionDetectionExpertSystem199815.TFLunt.ATamaru.FGilhamAReal-TimeIntrusionDetectionExpertSystem(IDES)199216.HSJavitz.AValdes.TFLunt.A.Tamaru,M.TysonNextGenerationIntrusionDetectionExpertSystem(NIDES)199317.SRSnappDIDS(DistributedIntrusionDetectionSystem)-motivation,architecture,andanearlyprototype199118.SCheung.RCrawford.MDilger.J.FrankThedesignofGrIDS:AGraph-basedIntrusionDetectionSystem199919.PAPorras.PGNeumannEMERALD:EventMonitoringEnablingResponsestoAnomalousLiveDisturbances199720.GVigna.RAKemmererNetSTAT:Anetwork-basedintrusiondetectionsystem199921.JEDickerson.JJuslin.OKoukousoula.J.A.DickersonFuzzyIntrusionDetection200122.ASiraj.SMBrdges.RBvaughmFuzzyCognitiveMapsforDecisionSupportinanIntelligentIntrusionDetectionSystem200123.CWCeib.RPGoldmanPlanRecognitioninIntrusionDetectionSystem200124.LWenkeADataMiningFrameworkforBuildingIntrusionDetectionModeling199925.SForrest.SHofmeyr.TLongstaffASenseofSelfforUnixProcesses199626.UFayyad.GPiatetsky-Shapiro.PSmythTheKDDprocessofextractingusefulknowledgeformvolumesofdata1996(11)27.UFayyad.GPiatetsky-Shapiro.PSmythFromdataminingtoknowledgediscovery:Anoverview199628.张伟.刘勇国.彭军.廖晓峰.吴中福数据挖掘发展研究[期刊论文]-计算机科学2001(7)29.王国胤Rough集理论与知识获取200130.WangGY.ZhengZ.ZhangYRIDAS-Aroughsetbasedintelligentdataanalysissystem200231.HSVaccaro.GELiepinsDetectionofAnomalousComputerSessionActivity198932.JPAndersonComputerSecurityThreatMonitoringandSurveillance198033.TFLunt.ATamaru.FGilhamAReal-TimeIntrusionDetectionExpertSystem(IDES)199234.RHeady.GLuger.AMaccabe.M.ServillaThearchitectureofaNetworklevelIntrusionDetectionSystem199035.SKumarClassificationandDetectionofComputerIntrusions199536.TLane.ECarlaTemporalsequenceLearningandDataReductionforAnomalyDetection199837.SKumar.EHSpaffordASoftwareArchitecturetoSupportMisuseIntrusionDetection199838.HerveDebar.MarcDacier.AndreasWespiTowardsataxonomyofintrusion-detectionsystems[外文期刊]1999(08)39.MAsaka.ATaguchiTheImplementationofIDA:anIntrusionDetectionAgentSystem40.查看详情41.刘美兰.姚京松入侵检测预警系统及其性能设计200042.HDebar.MDacier.AWespi查看详情1999(08)43.LTHeberleinANewSecurityMonitor199044.侯利娟.王国胤.聂能.吴渝粗糙集理论中的离散化问题[期刊论文]-计算机科学2000(12)45.王国胤.于洪.杨大春基于条件信息熵的决策表约简[期刊论文]-计算机学报2002(7)46.苗夺谦.胡桂荣知识约简的一种启发式算法[期刊论文]-计算机研究与发展1999(6)47.WLee.SJStolfo.KMokDatamininginWorkFlowEnvironments:ExperienceinIntrusionDetection199948.CWarrender.SForrestDetectingIntrusionsUsingSystemCalls:AlternativeDataModels199949.蔡忠闽.管晓宏.邵萍.彭勤科.孙国基基于粗糙集理论的入侵检测新方法[期刊论文]-计算机学报2003(3)50.WenkeLeeADataMiningFrameworkforBuildingIntrusionDetectionModeling199951.SManganaris.MChristensen.DZerkle.K.HermizADataMiningAnalysisofRTIDAlarms[外文期刊]52.RKerberChiMerge:DiscretizationofNumericAttributes199253.NHoa.NSonSomeEfficientAlgorithmsforRoughSetMethods199654.苗夺谦.胡桂荣知识约简的一种启发式算法[期刊论文]-计算机研究与发展1999(6)55.ZZheng.GYWang.YWuARoughSetandRuleTreeBasedIncrementalKnowledgeAcquisitionAlgorithm200356.查看详情引证文献(1条)1.白洁.吴渝.王国胤.邱文斌基于多层自组织映射和主成分分析的入侵检测方法[期刊论文]-计算机应用研究2007(1)本文链接:
本文标题:基于Rough Set的数据挖掘技术在网络安全中的应用研究――邮件分类和入侵检测
链接地址:https://www.777doc.com/doc-4870885 .html