[1] |
DENNING D E . An intrusion-detection model[J]. IEEE Transactions on Software Engineering, 1987,SE-13(2): 222-232.
|
[2] |
AGRAWAL R , IMIELINSKI T , SWAMI A N . Mining association rules between sets of items in large databases[C]// The 1993 ACM SIGMOD International Conference on Management of Data,May 26-28,1993,New York,USA. New York:ACM Press, 1993: 207-216.
|
[3] |
AGRAWAL R , SRIKANT R . Fast algorithms for mining association rules[M]. New York: ACM PressPress, 1994: 487-499.
|
[4] |
ADITYA S P , HEMANTH M , LAKSHMIKANTH C K ,et al. Effective algorithm for frequent pattern mining[C]// International Conference on IoT and Application,May 19-20,2017,Nagapattinam,India. Piscataway:IEEE Press, 2017.
|
[5] |
LI L , LI Q , WU Y ,et al. Mining association rules based on deep pruning strategies[J]. Wireless Personal Communications, 2018(2): 1-25.
|
[6] |
XIAO M , YIN Y , ZHOU Y ,et al. Research on improvement of apriori algorithm based on marked transaction compression[C]// Advanced Information Technology,Electronic and Automation Control Conference,March 25-26,2017,Chongqing,China. Piscataway:IEEE Press, 2017: 1067-1071.
|
[7] |
黄玉蕾, 罗晓霞, 林青 . 基于位运算和倒排索引的关联规则挖掘算法[J]. 电信科学, 2015,31(11): 81-86.
|
|
HUANG Y L , LUO X X , LIN Q . An association rule mining scheme based on bit operation and reverse index[J]. Telecommunications Science, 2015,31(11): 81-86.
|
[8] |
CHANA G Y , CHUAA F F , LEEB C S . Fuzzy association rules vs fuzzy associative patterns in defending against Web service attacks[C]// International Conference on Fuzzy Systems and Knowledge Discovery,August 13-15,2016,Changsha,China. Piscataway:IEEE Press, 2016: 524-529.
|
[9] |
张春琴, 谢立春 . 云环境中改进 FCM 和规则参数优化的网络入侵检测方法[J]. 电信科学, 2018,34(1): 72-79.
|
|
ZHANG C Q , XIE L C . Network intrusion detection method based on improved FCM and rule parameter optimization in cloud environment[J]. Telecommunications Science, 2018,34(1): 72-79.
|
[10] |
JIAO W , LI Q . Anomaly detection based on fuzzy rules[J]. International Journal of Performability Engineering, 2018,14(2): 376-385.
|
[11] |
MABU S , CHEN C , LU N ,et al. An intrusion-detection model based on fuzzy class-association-rule mining using genetic network programming[J]. IEEE Transactions on Systems Man &Cybernetics Part C, 2010,41(1): 130-139.
|
[12] |
高妮, 高岭, 贺毅岳 ,等. 基于自编码网络特征降维的轻量级入侵检测模型[J]. 电子学报, 2017(3): 730-739.
|
|
GAO N , GAO L , HE Y Y ,et al. A lightweight intrusion detection model based on auto encoder network with feature reduction[J]. Acta Electronica Sinica, 2017(3): 730-739.
|
[13] |
KUMAR S . Classification and detection of computer intrusions[D]. West Lafayette:Purdue University, 1995.
|
[14] |
MADBOULY A I , GODY A M , BARAKAT T M . Relevant feature selection model using data mining for intrusion detection system[J]. International Journal of Engineering Trends &Technology, 2014,9(10): 804-811.
|