1 |
Jeffrey Dean and Sanjay Ghemawat, "MapReduce: simplified data processing on large clusters," Communications of the ACM - 50th anniversary , vol. 51, no. 1, pp. 107-113, 2008
|
2 |
Olusola, Adetunmbi A., Adeola S. Oladele, and Daramola O. Abosede, "Analysis of KDD'99 Intrusion Detection Dataset for Selection of Relevance Features." Proceedings of the World Congress on Engineering and Computer Science. vol. 1. pp. 20-22, Oct. 2010.
|
3 |
Jaekwang Kim, KwangHo Yoon, Seunghoon Lee, Je-hee Jung, Jeehyong Lee, "A Slow Portscan Attack Detection and Countermove Mechanism based on Fuzzy Logic," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.18, No.5, pp 679-684, 2008
|
4 |
Se-Yul Lee , Yong-Soo Kim, Kwee-Bo Sim, "A Study on Network based Intelligent Intrusion Prevention model by using Fuzzy Cognitive Maps on Denial of Service Attack," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.13, No.2, pp 148-153, 2003
과학기술학회마을
DOI
ScienceOn
|
5 |
Kwee-Bo Sim, Jae-Won Yang, Young-Soo Kim, Se-Yul Lee, "Intrusion Detection Learning Algorithm using Adaptive Anomaly Detector," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.14, No.4, pp 451-456, 2004
과학기술학회마을
DOI
ScienceOn
|
6 |
Kwee-Bo Sim, Jae-Won Yang, Dong-Wook Lee, Dong-Il Seo, and Yang-Seo Choi, "Adaptive Intrusion Detection Algorithm based on Learning Algorithm," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.14, No.1, pp 75-81, 2004
과학기술학회마을
DOI
ScienceOn
|
7 |
Dae-Soo Choi and Yong-Min Kim, "Big Data and Enterprise Security 2.0", Journal of the Korean Institute of Information Scientists and Engineers(KIISE), vol. 30, no. 6, pp.65-72, Jun. 2012.
과학기술학회마을
|
8 |
Kim Hyun-Woo, Shin Seong-Jun, Lee Seung-Min, and Jeong Seok-Bong, "Network-based Intrusion Detection Scheme using Markov Chin Model", Journal of Decision Science, Vol. 20, No. 1, pp.75-88, Nov. 2012.
|
9 |
Kim Sang Beom, "Reserach on development direction of network intrusion detection system", M.A., Yonsei University, 2008.
|
10 |
Hansung Lee, Jiyung Song, Eunyoung Kim, Chulho Lee, and Daihee Park, "Adaptive Intrusion Detection System Based on SVM and Clustering", Proceedings of KIIS Conference, vol. 13, no. 2, pp. 237-242, Jun. 2005.
|
11 |
Jong-Ha Ahn and Dae-Won Kim, "Compression-based Anomaly Detection using K-means Clustering, Journal of the Korean Institute of Information Scientists and Engineers(KIISE) , vol. 39, no. 8, pp. 605-612, Aug. 2012.
과학기술학회마을
|
12 |
Kyle Banker, MongoDB in Action, Oreilly & Associates, Aug. 2010.
|
13 |
Varun Chandola, Arindam Banerjee, and Vipin Kumar, "Anomaly Detection : A Survey," in ACM Computing Surveys, vol.41 no. 3, Jul. 2009
|
14 |
Kumar, Vipin, Pang-Ning Tan, and Michael Steinbach, Introduction to data mining, Addison-Wesley, 2005
|
15 |
Zhao, Weizhong, Huifang Ma, and Qing He, Cloud Computing, Springer Berlin Heidelberg, 2009.
|
16 |
Kwee-Bo Sim, Jae-Won Yang, Dong-Wook Lee, Dong-Il Seo, Yang-Seo Choi, "Intrusion Detection System of Network Based on Biological Immune System," INTERNATIONAL JOURNAL of FUZZY LOGIC and INTELLIGENT, Vol.12, No.5, pp 411-416, 2002
과학기술학회마을
DOI
ScienceOn
|