outlier mining
Recently Published Documents


TOTAL DOCUMENTS

98
(FIVE YEARS 13)

H-INDEX

10
(FIVE YEARS 1)

Sadhana ◽  
2021 ◽  
Vol 46 (3) ◽  
Author(s):  
P Sharon Femi ◽  
S Ganesh Vaidyanathan ◽  
A Kala

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Limin Shen ◽  
Zhongkui Sun ◽  
Lei Chen ◽  
Jiayin Feng

As the Internet applications are growing rapidly, the intrusion detection system is widely used to detect network intrusion effectively. Aiming at the high-dimensional characteristics of data in the intrusion detection system, but the traditional frequent-pattern-based outlier mining algorithm has the problems of difficulty in obtaining complete frequent patterns and high time complexity, the outlier set is further analysed to get the attack pattern of intrusion detection. The NSL-KDD dataset and UNSW-NB15 dataset are used for evaluating the proposed approach by conducting some experiments. The experiment results show that the method has good performance in detection rate, false alarm rate, and recall rate and effectively reduces the time complexity.


2021 ◽  
pp. 430-445
Author(s):  
Jiefeng Chen ◽  
Yixuan Li ◽  
Xi Wu ◽  
Yingyu Liang ◽  
Somesh Jha
Keyword(s):  

2020 ◽  
Vol 93 ◽  
pp. 101569 ◽  
Author(s):  
Theodoros Toliopoulos ◽  
Anastasios Gounaris ◽  
Kostas Tsichlas ◽  
Apostolos Papadopoulos ◽  
Sandra Sampaio

Author(s):  
Huosong Xia ◽  
Xiang Wei ◽  
Wuyue An ◽  
Zuopeng Justin Zhang ◽  
Zelin Sun

2020 ◽  
Vol 17 (2) ◽  
pp. 222-235 ◽  
Author(s):  
Boxiang Dong ◽  
Hui Wang ◽  
Anna Monreale ◽  
Dino Pedreschi ◽  
Fosca Giannotti ◽  
...  

2019 ◽  
Vol 504 ◽  
pp. 1-19
Author(s):  
Junli Li ◽  
Jifu Zhang ◽  
Xiao Qin ◽  
Yaling Xun

2019 ◽  
Vol 7 ◽  
Author(s):  
Pablo Amil ◽  
Nahuel Almeira ◽  
Cristina Masoller

Sign in / Sign up

Export Citation Format

Share Document