Applying Data Mining Techniques on Intrusion Detection Systems
碩士 === 國立交通大學 === 管理學院碩士在職專班資訊管理組 === 98 === The fast development and wide spread use of Internet has indeed brought the benefit and competitiveness for the enterprise: However, the complicated web may result in several vulnerabilities and risks which may jeopardize the host system. Therefore, the I...
Main Authors: | Chuang, Kuo-Wei, 莊國緯 |
---|---|
Other Authors: | Tsai, Min-Jen |
Format: | Others |
Language: | zh-TW |
Published: |
2010
|
Online Access: | http://ndltd.ncl.edu.tw/handle/07497031486284284316 |
Similar Items
-
Intrusion Detection and Identification System Using Data Mining and Profiling Techniques
by: Kai-Wei Hu, et al.
Published: (2007) -
Improving intrusion detection systems using data mining techniques
by: Almutairi, Abdulrazaq Z.
Published: (2016) -
DATA MINING TECHNIQUES FOR SIGNATURE SEARCH IN NETWORK INTRUSION DETECTION
by: Shau-Wei Lin, et al.
Published: (2004) -
A Real-Time Intrusion Detection System using Data Mining Technique
by: Fang-Yie Leu, et al.
Published: (2008-04-01) -
Applying Data Mining Technology to Intrusion Dection System
by: CHANG, CHAO-HSIANG, et al.
Published: (2004)