找回密码
 To register

QQ登录

只需一步,快速开始

扫一扫,访问微社区

Titlebook: Applications of Data Mining in Computer Security; Daniel Barbará,Sushil Jajodia Book 2002 Springer Science+Business Media New York 2002 In

[复制链接]
查看: 42284|回复: 40
发表于 2025-3-21 17:47:32 | 显示全部楼层 |阅读模式
期刊全称Applications of Data Mining in Computer Security
影响因子2023Daniel Barbará,Sushil Jajodia
视频video
学科分类Advances in Information Security
图书封面Titlebook: Applications of Data Mining in Computer Security;  Daniel Barbará,Sushil Jajodia Book 2002 Springer Science+Business Media New York 2002 In
影响因子.Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. .Applications Of Data Mining In Computer Security. presents a collection of research efforts on the use of data mining in computer security...Applications Of Data Mining In Computer Security. concentrates heavily on the use of data mining in the area of intrusion detection. The reason for this is twofold. First, the volume of data dealing with both network and host activity is so large that it makes it an ideal candidate for using data mining techniques. Second, intrusion detection is an extremely critical activity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence..
Pindex Book 2002
The information of publication is updating

书目名称Applications of Data Mining in Computer Security影响因子(影响力)




书目名称Applications of Data Mining in Computer Security影响因子(影响力)学科排名




书目名称Applications of Data Mining in Computer Security网络公开度




书目名称Applications of Data Mining in Computer Security网络公开度学科排名




书目名称Applications of Data Mining in Computer Security被引频次




书目名称Applications of Data Mining in Computer Security被引频次学科排名




书目名称Applications of Data Mining in Computer Security年度引用




书目名称Applications of Data Mining in Computer Security年度引用学科排名




书目名称Applications of Data Mining in Computer Security读者反馈




书目名称Applications of Data Mining in Computer Security读者反馈学科排名




单选投票, 共有 0 人参与投票
 

0票 0%

Perfect with Aesthetics

 

0票 0%

Better Implies Difficulty

 

0票 0%

Good and Satisfactory

 

0票 0%

Adverse Performance

 

0票 0%

Disdainful Garbage

您所在的用户组没有投票权限
发表于 2025-3-21 23:37:44 | 显示全部楼层
发表于 2025-3-22 03:32:14 | 显示全部楼层
1568-2633 tivity. This book also addresses the application of data mining to computer forensics. This is a crucial area that seeks to address the needs of law enforcement in analyzing the digital evidence..978-1-4613-5321-8978-1-4615-0953-0Series ISSN 1568-2633 Series E-ISSN 2512-2193
发表于 2025-3-22 06:45:21 | 显示全部楼层
Mike Robinson,Helaine Silvermanersus data volume. We introduce a novel way of characterizing intrusion detection activities: degree of attack guilt. It is useful for qualifying the degree of confidence associated with detection events, providing a framework in which we analyze detection quality versus cost.
发表于 2025-3-22 12:16:29 | 显示全部楼层
发表于 2025-3-22 13:30:08 | 显示全部楼层
https://doi.org/10.1007/978-3-319-57669-5ive probability estimation techniques are compared to an algorithm that builds scenarios using a set of rules. Both probability estimate approaches make use of training data to learn the appropriate probability measures. Our algorithm can determine the scenario membership of a new alert in time proportional to the number of candidate scenarios.
发表于 2025-3-22 18:43:07 | 显示全部楼层
发表于 2025-3-23 00:07:37 | 显示全部楼层
发表于 2025-3-23 04:40:19 | 显示全部楼层
Using MIB II Variables for Network Intrusion Detection,tion provided by the MIB II variables and use data mining techniques and information-theoretic measures to build an intrusion detection model. We test our MIB II-based intrusion detection model with several Denial of Service (DoS) and probing attacks. The results have shown that the model can detect these attacks effectively.
发表于 2025-3-23 08:52:10 | 显示全部楼层
1568-2633 aign, looking for patterns in financial transactions to discover illegal activities or analyzing genome sequences. From this perspective, it was just a matter of time for the discipline to reach the important area of computer security. .Applications Of Data Mining In Computer Security. presents a co
 关于派博传思  派博传思旗下网站  友情链接
派博传思介绍 公司地理位置 论文服务流程 影响因子官网 SITEMAP 大讲堂 北京大学 Oxford Uni. Harvard Uni.
发展历史沿革 期刊点评 投稿经验总结 SCIENCEGARD IMPACTFACTOR 派博系数 清华大学 Yale Uni. Stanford Uni.
|Archiver|手机版|小黑屋| 派博传思国际 ( 京公网安备110108008328) GMT+8, 2025-5-2 05:57
Copyright © 2001-2015 派博传思   京公网安备110108008328 版权所有 All rights reserved
快速回复 返回顶部 返回列表