共 50 条
- [31] Mining Association Rules for Intrusion Detection FCST 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY, 2009, : 644 - +
- [33] Cloud Data Center Intrusion Detection Model Based on Active Rules 2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 49 - 54
- [34] A multiple agents based intrusion detection system KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 1, PROCEEDINGS, 2005, 3681 : 205 - 211
- [35] Intrusion detection system based on mobile agent ISTM/2005: 6th International Symposium on Test and Measurement, Vols 1-9, Conference Proceedings, 2005, : 7888 - 7891
- [36] MOBILE AGENT BASED INTRUSION DETECTION SYSTEM 2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 1363 - 1366
- [37] On the capability of an SOM based intrusion detection system PROCEEDINGS OF THE INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS 2003, VOLS 1-4, 2003, : 1808 - 1813
- [39] Intrusion Detection System Based on Pattern Recognition Arabian Journal for Science and Engineering, 2023, 48 : 9849 - 9857
- [40] A Constraint-based Intrusion Detection System PROCEEDINGS OF THE FIFTH EUROPEAN CONFERENCE ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS (ECBS 2017), 2017,