Computer Science ›› 2006, Vol. 33 ›› Issue (9): 81-82.

Previous Articles     Next Articles

MA Hong-Jiang (Computer Science Department of Aba Teachers College, Sichuan 623000)   

  • Online:2018-11-17 Published:2018-11-17

Abstract: This paper uses RST as tool of data mining to analyze network data set of intrusion detection so that mine some potential rules useful to user from these data, the proposed method no longer rely on experience of expert and lead to the intrusion detection

Key words: Rough set, Data mining, Association rules, Intrusion detection

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!