共 50 条
- [1] Density Based Outlier Mining Algorithm with Application to Intrusion Detection PACIIA: 2008 PACIFIC-ASIA WORKSHOP ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION, VOLS 1-3, PROCEEDINGS, 2008, : 489 - 492
- [2] Distributed Intrusion Detection Based on Outlier Mining PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 343 - 348
- [3] Clustering Algorithm Based on Outlier Detection for Anomaly Intrusion Detection JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 291 - 299
- [4] Research of Outlier Mining Based Adaptive Intrusion Detection Techniques THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 552 - 555
- [5] Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection 2006 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-12, 2006, : 2388 - 2393
- [6] Power information network intrusion detection based on data mining algorithm The Journal of Supercomputing, 2020, 76 : 5521 - 5539
- [7] Power information network intrusion detection based on data mining algorithm JOURNAL OF SUPERCOMPUTING, 2020, 76 (07): : 5521 - 5539
- [8] Anomaly-Based Network Intrusion Detection: An Outlier Detection Techniques PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND PATTERN RECOGNITION (SOCPAR 2016), 2018, 614 : 262 - 269
- [9] NETWORK INTRUSION DETECTION MECHANISMS USING OUTLIER DETECTION PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1468 - 1473
- [10] Robust Network Intrusion Detection Systems for Outlier Detection 2022 IEEE 27TH INTERNATIONAL WORKSHOP ON COMPUTER AIDED MODELING AND DESIGN OF COMMUNICATION LINKS AND NETWORKS (CAMAD), 2022, : 140 - 146