Open Access
ITM Web Conf.
Volume 17, 2018
4th Annual International Conference on Wireless Communication and Sensor Network (WCSN 2017)
Article Number 01012
Number of page(s) 9
Section Session 1: Wireless Communication
Published online 02 February 2018
  1. Guo Chun. Research on Key Technologies of Network Intrusion Detection Based on Data Mining [D]. Beijing University of Port and Telecommunications for the Degree of Doctor of Engineering.(2014). [Google Scholar]
  2. Cui Wen Ke, Design and Implementation of Intrusion Detection System Based on Clustering Algorithm [D]. A Master Thesis Submitted to University of Electronic Science and Technology of China.(2016). [Google Scholar]
  3. Sun Jian-hua, Jin Hai,Chen Hao,Han Zong-fen, MA-IDS: A Distributed Intrusion Detection System Based on Data Mining[J]. WuHan University Journal Of Natural Sciences-english,(2005,10(1):111-111). [CrossRef] [Google Scholar]
  4. Juliette Dromard;Gilles Roudière;Philippe Owezarski .Online and Scalable Unsupervised Network Anomaly Detection Method[J]. IEEE Transactions on Network and Service Management,(2017,14(1):34-47). [CrossRef] [Google Scholar]
  5. Martin Grillab;Tomáš Pevnýab;Martin Rehakab, Reducing false positives of network anomaly detection by local adaptive multivariate smoothing[J]. Journal of Computer and System Sciences,(2017, 83(1):43-57). [CrossRef] [Google Scholar]
  6. He Z, Xu X, Deng S. Discovering Cluster-Based Local Outliers [J]. Pattern Recognition Letters, (2003, 24(9):1641-1650). [CrossRef] [Google Scholar]
  7. Kordecki, H;Karmowski, M;Knapik-Kordecka, M;Karmowski, A;Gworys, B.Method of Component Importance Evaluation in Complex Data Structure Analysis[J].Advances in clinical and experimental medicine,(2011,20(2):205-209). [Google Scholar]
  8. Nguyen T T, Chang K, Hui S C. Supervised Term Weighting Centroid-Based Classifiers for Text Categorization [J]. Knowledge and Information Systems, (2013,35(1): 61-85). [CrossRef] [Google Scholar]
  9. Liu Shuai.Research on Analysis and Detection of Multi-layer Abnormal Behavior for Network Data Stream[D].A Dissertation Engineering University for the Degree of Doctor of Engineering.(2015). [Google Scholar]
  10. Hettich S, Bay S D. Kdd cup 1999 data. UCI KDD Archive [DB/OL], 1999. http://kdd.ics.uci. edu//databases/kddcup99/kddcup99. html]. [Google Scholar]
  11. Amiri F, Rezaei Yousefi M M, Lucas C, et al. Mutual Information-Based Feature Selection for Intrusion Detection Systems [J]. Journal of Network and Applications, (2011, 34(4):1184-1199). [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.