搜索资源列表
-
0下载:
基于数据挖掘的入侵检测系统的设计与实现
基于数据挖掘的入侵检测系统的设计与实现-Based on Data Mining Intrusion Detection System Design and Implementation Based on Data Mining Intrusion Detection System Design and Implementation
-
-
1下载:
关联规则挖掘的研究工作主要包括:Apriori算法的扩展、数量关联规则挖掘、关联规则增量式更新、无须生成候选项目集的关联规则挖掘、最大频繁项目集挖掘、约束性关联规则挖掘以及并行及分布关联规则挖掘算法等,其中快速挖掘与更新频繁项目集是关联规则挖掘研究的重点,也是多种数据挖掘应用中的技术关键,已用于分类规则挖掘和网络入侵检测等方面的研究。研究者还对数据挖掘的理论进行了有益的探索,将概念格和粗糙集应用于关联规则挖掘中,获得了显著的效果。到目前为止,关联规则的挖掘已经取得了令人瞩目的成绩,包括:单机环境
-
-
0下载:
Recently, information security has become a key issue
in information technology as the number of computer security
breaches are exposed to an increasing number of security threats. A
variety of intrusion detection systems (IDS) have been employ
-
-
0下载:
There are two main approaches for implementing IDS Host based and Network based. While the former is implemented in
form of software deployed on a host, the latter, usually is built as a
hardware product with its own hardware platform (IDS applia
-