1 |
정종근, 이윤배, '새로운 침입 패턴을 위한 데이터마이닝 침입탐지시스템 설계', 대한전자공학회 논문지, 제39권 TE편 제1호, pp.77-87, 3, 2002
|
2 |
한국전자통신연구원, '인터넷보안 기술/시장보고서', 12, 2001
|
3 |
amuel I. Schaen, 'Network Auditing: Issues and Recommendations', IEEE 7th Computer Security Applications Conference, pp.66-79, Dec., 1991
|
4 |
T. Lane, 'Filtering technique for rapid user classification', In Proceedings of the AAAI98/ ICML98 Joint Workshop on AI Approaches to Time series Analysis, 1998
|
5 |
Anup K. Ghosh, "Learning Program Behavior Profiles for Intrusion Detection", Proc. of the Workshop on Intrusion Detection and Network Monitoring, April., 1999
|
6 |
U. Fayyad, G. Piatetsky-Shapiro and P. Smyth, 'The KDD process of extracting useful knowledge from volumes of data', Communications of the ACM, 39(11):27-34, Nov., 1996
DOI
ScienceOn
|
7 |
R. Buschkes, M. Borning, and D. Kesdogan, "Transaction based Anomaly Detection" Proc. of the Workshop on Intrusion Detection and Network monitoring, USENIX, Apr., 1999
|
8 |
W. Lee, S. J. Stolfo and K. W. Mok, 'Mining Audit data to build Intrusion Detection Models', In proceeding of the 4th International Conference on Knowledge Discovery and Data Mining, New York, NY, Aug., 1998
|