ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Intrusion Detection Based on Fuzzy Association Rules
2010 International Symposium on Intelligence Information Processing and Trusted Computing
◽
10.1109/iptc.2010.28
◽
2010
◽
Cited By ~ 4
Author(s):
KaiXing Wu
◽
Juan Hao
◽
Chunhua Wang
Keyword(s):
Intrusion Detection
◽
Association Rules
◽
Fuzzy Association Rules
Download Full-text
Related Documents
Cited By
References
ACO-based Intrusion Detection Method in Computer Networks using Fuzzy Association Rules
2021 5th International Conference on Pattern Recognition and Image Analysis (IPRIA)
◽
10.1109/ipria53572.2021.9483486
◽
2021
◽
Author(s):
S. Miryahyaie
◽
H. Ebrahimpour-komleh
◽
A. M. Nickfarjam
Keyword(s):
Intrusion Detection
◽
Computer Networks
◽
Association Rules
◽
Detection Method
◽
Fuzzy Association Rules
Download Full-text
Applying Mining Fuzzy Association Rules to Intrusion Detection Based on Sequences of System Calls
Networking and Mobile Computing - Lecture Notes in Computer Science
◽
10.1007/11534310_87
◽
2005
◽
pp. 826-835
◽
Cited By ~ 1
Author(s):
Guiling Zhang
Keyword(s):
Intrusion Detection
◽
Association Rules
◽
Fuzzy Association Rules
◽
System Calls
Download Full-text
Intrusion Detection Based on Immune Principles and Fuzzy Association Rules
Intelligence Computation and Evolutionary Computation - Advances in Intelligent Systems and Computing
◽
10.1007/978-3-642-31656-2_5
◽
2013
◽
pp. 31-35
Author(s):
Zhang Lei
◽
Meng Lingrui
◽
Hou Chunjie
Keyword(s):
Intrusion Detection
◽
Association Rules
◽
Fuzzy Association Rules
Download Full-text
The intrusion detection system based on fuzzy association rules mining
2010 2nd International Conference on Computer Engineering and Technology
◽
10.1109/iccet.2010.5485674
◽
2010
◽
Cited By ~ 2
Author(s):
Ma Yanchun
Keyword(s):
Intrusion Detection
◽
Association Rules
◽
Intrusion Detection System
◽
Detection System
◽
Association Rules Mining
◽
Fuzzy Association Rules
Download Full-text
The Optimization and Enhancement of Network Intrusion Detection through Fuzzy Association Rules
2019 6th International Conference on Technical Education (ICTechEd6)
◽
10.1109/icteched6.2019.8790881
◽
2019
◽
Cited By ~ 1
Author(s):
Pongsarun Boonyopakorn
Keyword(s):
Intrusion Detection
◽
Association Rules
◽
Network Intrusion Detection
◽
Fuzzy Association Rules
◽
Network Intrusion
Download Full-text
Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection
International Journal of Intelligent Systems
◽
10.1002/1098-111x(200008)15:8<687::aid-int1>3.0.co;2-x
◽
2000
◽
Vol 15
(8)
◽
pp. 687-703
◽
Cited By ~ 93
Author(s):
Jianxiong Luo
◽
Susan M. Bridges
Keyword(s):
Intrusion Detection
◽
Association Rules
◽
Fuzzy Association Rules
Download Full-text
Application of Fuzzy Association Rules in Intrusion Detection
2011 International Conference on Internet Computing and Information Services
◽
10.1109/icicis.2011.72
◽
2011
◽
Cited By ~ 2
Author(s):
Kai Xing Wu
◽
Juan Hao
◽
Chunhua Wang
Keyword(s):
Intrusion Detection
◽
Association Rules
◽
Fuzzy Association Rules
Download Full-text
Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection
2006 IEEE Information Assurance Workshop
◽
10.1109/iaw.2006.1652083
◽
2006
◽
Cited By ~ 19
Author(s):
A. El-Semary
◽
J. Edmonds
◽
J. Gonzalez-Pino
◽
M. Papa
Keyword(s):
Data Mining
◽
Intrusion Detection
◽
Association Rules
◽
Network Intrusion Detection
◽
Fuzzy Association Rules
◽
Network Intrusion
Download Full-text
Hybrid Approach for Intrusion Detection Using Fuzzy Association Rules
2018 2nd Cyber Security in Networking Conference (CSNet)
◽
10.1109/csnet.2018.8602882
◽
2018
◽
Cited By ~ 2
Author(s):
Samira Douzi
◽
Ibtissam Benchaji
◽
Bouabid ElOuahidi
Keyword(s):
Intrusion Detection
◽
Association Rules
◽
Hybrid Approach
◽
Fuzzy Association Rules
Download Full-text
Genetic-fuzzy association rules for network intrusion detection systems
2011 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE 2011)
◽
10.1109/fuzzy.2011.6007555
◽
2011
◽
Cited By ~ 2
Author(s):
Ming-Yang Su
◽
Chun-Yuen Lin
◽
Sheng-Wei Chien
◽
Han-Chung Hsu
Keyword(s):
Intrusion Detection
◽
Association Rules
◽
Intrusion Detection Systems
◽
Network Intrusion Detection
◽
Fuzzy Association Rules
◽
Detection Systems
◽
Network Intrusion
◽
Network Intrusion Detection Systems
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close