A Study on Applying Effective Cluster Analysis Schemes to Intrusion Detection Systems
碩士 === 大葉大學 === 資訊管理學系碩士班 === 91 === In recent years, along with the popularity of Internet, the pervasion of the computer usage and the maturity of the network technique, it makes Internet become the media of commercial transaction, and attract the attention from society. On the contrary, it also c...
Main Authors: | Lin Tung Sen, 林東森 |
---|---|
Other Authors: | Tsaur Woei Jiunn |
Format: | Others |
Language: | zh-TW |
Published: |
2003
|
Online Access: | http://ndltd.ncl.edu.tw/handle/06667918325434921878 |
Similar Items
-
Hybrid Intelligent Algorithms Applied to the Data Analysis of Intrusion Detection System
by: Cheng-Chieh Lin, et al.
Published: (2009) -
CANN: Combining Cluster Centers and Nearest Neighbors for Intrusion Detection Systems
by: Jia-Sheng Lin, et al.
Published: (2009) -
Exploring the antecedents and influence of compulsive mobile application usage:An examination of personality traits
by: Tung-Sen Lin, et al.
Published: (2015) -
A Clustered Architecture for Network Intrusion Detection System
by: Lun-Chuan Lee, et al.
Published: (2002) -
Data Visualization Applied for Anomaly Detection in Intrusion Detection Systems
by: Kai-Wei Chen, et al.
Published: (2018)