共 50 条
- [1] Practical User Identification for Masquerade Detection WCECS 2008: ADVANCES IN ELECTRICAL AND ELECTRONICS ENGINEERING - IAENG SPECIAL EDITION OF THE WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, PROCEEDINGS, 2009, : 47 - +
- [2] Data Mining based CIDS: Cloud Intrusion Detection System for Masquerade Attacks [DCIDSM] 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
- [3] Masquerade Detection Using Command Prediction and Association Rules Mining 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, 2009, : 552 - 559
- [4] Data Mining Instant Messaging Communications to Perform Author Identification for Cybercrime Investigations DIGITAL FORENSICS AND CYBER CRIME, 2010, 31 : 99 - +
- [5] Canonical variates for recursive partitioning in data mining COMPSTAT 2002: PROCEEDINGS IN COMPUTATIONAL STATISTICS, 2002, : 213 - 218
- [6] IMA: Identification of Multi-author Student Assignment Submissions Using a Data Mining Approach DBKDA 2011: THE THIRD INTERNATIONAL CONFERENCE ON ADVANCES IN DATABASES, KNOWLEDGE, AND DATA APPLICATIONS, 2011, : 136 - 141
- [7] Intrusion detection and identification system using data mining and forensic techniques ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 137 - +
- [8] Crime detection and criminal identification in India using data mining techniques AI and Society, 2014, 30 (01): : 117 - 127
- [9] On fault detection based on recursive subspace identification SYSTEMS AND HUMAN SCIENCE - FOR SAFETY, SECURITY AND DEPENDABILITY, 2005, : 173 - +
- [10] Change detection in the dynamics with recursive subspace identification PROCEEDINGS OF THE 40TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-5, 2001, : 2297 - 2302