2018 Vol.1 Dec. No.6 |
---|
|
Reference: [1]Liu Xiangqi, Chong Xiangting, Zhen Chenggang. Intrusion Detection System Based on Data Mining [J]. Information System Engineering ,2013,04:44-45,50. [2] Zhao Yanjun, Wei Mingjun. The application of Improved Data Mining Algorithm in Intrusion Detection System [J].Computer Engineering and Applications ,2013,18:69-72,115. [3] Qi Aihua, Song Shucai. The application of data MiningTechnology inComputer IntrusionDetection[J].Bulletin of Science and Technology ,2013,10:19-20,23. [4] Cho S, Pearlman W A. A Full-featured, Error-resilient, Scalable Wavelet Video Codec Based on the Set Partitioning in Hierarchical Trees (SPIHT) Algorithm. IEEE Trans. on CAS for VT, 2002, 12(3):157-171 [5] Xie QingXiu, Regional Conflict Hot Blind Localization Algorithm Based on Wireless Network[J]. Bulletin of Science and Technology, 2013, 29(12): 97-99. [6] Mula y S, Devale P ,Gar J G. Decision tree basedsupport vector machine for intrusion detection[C].Procof Networking and Information Technology(ICNIT),Piscataway,NJ:IEEE 2010 59-63. |
Tsuruta Institute of Medical Information Technology
Address:[502,5-47-6], Tsuyama, Tsukuba, Saitama, Japan TEL:008148-28809 fax:008148-28808 Japan,Email:jpciams@hotmail.com,2019-09-16