CURD 发表于 2025-3-21 17:47:32

书目名称Applications of Data Mining in Computer Security影响因子(影响力)<br>        http://figure.impactfactor.cn/if/?ISSN=BK0159359<br><br>        <br><br>书目名称Applications of Data Mining in Computer Security影响因子(影响力)学科排名<br>        http://figure.impactfactor.cn/ifr/?ISSN=BK0159359<br><br>        <br><br>书目名称Applications of Data Mining in Computer Security网络公开度<br>        http://figure.impactfactor.cn/at/?ISSN=BK0159359<br><br>        <br><br>书目名称Applications of Data Mining in Computer Security网络公开度学科排名<br>        http://figure.impactfactor.cn/atr/?ISSN=BK0159359<br><br>        <br><br>书目名称Applications of Data Mining in Computer Security被引频次<br>        http://figure.impactfactor.cn/tc/?ISSN=BK0159359<br><br>        <br><br>书目名称Applications of Data Mining in Computer Security被引频次学科排名<br>        http://figure.impactfactor.cn/tcr/?ISSN=BK0159359<br><br>        <br><br>书目名称Applications of Data Mining in Computer Security年度引用<br>        http://figure.impactfactor.cn/ii/?ISSN=BK0159359<br><br>        <br><br>书目名称Applications of Data Mining in Computer Security年度引用学科排名<br>        http://figure.impactfactor.cn/iir/?ISSN=BK0159359<br><br>        <br><br>书目名称Applications of Data Mining in Computer Security读者反馈<br>        http://figure.impactfactor.cn/5y/?ISSN=BK0159359<br><br>        <br><br>书目名称Applications of Data Mining in Computer Security读者反馈学科排名<br>        http://figure.impactfactor.cn/5yr/?ISSN=BK0159359<br><br>        <br><br>

假装是你 发表于 2025-3-21 23:37:44

http://reply.papertrans.cn/16/1594/159359/159359_2.png

BUST 发表于 2025-3-22 03:32:14

1568-2633 tivity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence..978-1-4613-5321-8978-1-4615-0953-0Series ISSN 1568-2633 Series E-ISSN 2512-2193

Middle-Ear 发表于 2025-3-22 06:45:21

Mike Robinson,Helaine Silvermanersus data volume. We introduce a novel way of characterizing intrusion detection activities: degree of attack guilt. It is useful for qualifying the degree of confidence associated with detection events, providing a framework in which we analyze detection quality versus cost.

逗留 发表于 2025-3-22 12:16:29

http://reply.papertrans.cn/16/1594/159359/159359_5.png

WAX 发表于 2025-3-22 13:30:08

https://doi.org/10.1007/978-3-319-57669-5ive probability estimation techniques are compared to an algorithm that builds scenarios using a set of rules. Both probability estimate approaches make use of training data to learn the appropriate probability measures. Our algorithm can determine the scenario membership of a new alert in time proportional to the number of candidate scenarios.

龙卷风 发表于 2025-3-22 18:43:07

http://reply.papertrans.cn/16/1594/159359/159359_7.png

交响乐 发表于 2025-3-23 00:07:37

http://reply.papertrans.cn/16/1594/159359/159359_8.png

gastritis 发表于 2025-3-23 04:40:19

Using MIB II Variables for Network Intrusion Detection,tion provided by the MIB II variables and use data mining techniques and information-theoretic measures to build an intrusion detection model. We test our MIB II-based intrusion detection model with several Denial of Service (DoS) and probing attacks. The results have shown that the model can detect these attacks effectively.

增减字母法 发表于 2025-3-23 08:52:10

1568-2633 aign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. .Applications Of Data Mining In Computer Security. presents a co
页: [1] 2 3 4 5
查看完整版本: Titlebook: Applications of Data Mining in Computer Security; Daniel Barbará,Sushil Jajodia Book 2002 Springer Science+Business Media New York 2002 In