Computer Science ›› 2006, Vol. 33 ›› Issue (9): 81-82.
Previous Articles Next Articles
MA Hong-Jiang (Computer Science Department of Aba Teachers College, Sichuan 623000)
Online:
Published:
Abstract: This paper uses RST as tool of data mining to analyze network data set of intrusion detection so that mine some potential rules useful to user from these data, the proposed method no longer rely on experience of expert and lead to the intrusion detection
Key words: Rough set, Data mining, Association rules, Intrusion detection
MA Hong-Jiang (Computer Science Department of Aba Teachers College, Sichuan 623000). [J].Computer Science, 2006, 33(9): 81-82.
0 / / Recommend
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
URL: https://www.jsjkx.com/EN/
https://www.jsjkx.com/EN/Y2006/V33/I9/81
Cited