2013 IEEE Symposium on Computers and Communications (ISCC) 2013
DOI: 10.1109/iscc.2013.6754981
|View full text |Cite
|
Sign up to set email alerts
|

Combining conjunctive rule extraction with diffusion maps for network intrusion detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
2
1

Relationship

3
3

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 29 publications
0
7
0
Order By: Relevance
“…The proposed intrusion detection system is multilayer. Juvonen and Sipola [7] have proposed online anomaly detection system using un-supervised learning method and combination rule extraction algorithm. The rules are generated by using Conjunctive rule extraction algorithm.…”
Section: Literature Surveymentioning
confidence: 99%
“…The proposed intrusion detection system is multilayer. Juvonen and Sipola [7] have proposed online anomaly detection system using un-supervised learning method and combination rule extraction algorithm. The rules are generated by using Conjunctive rule extraction algorithm.…”
Section: Literature Surveymentioning
confidence: 99%
“…Article Juvonen and Sipola (2013) deals with extracting rules from the clustering results provided by a diffusion map training framework. Modern data mining technology in network security context does not always create understandable results for the end users.…”
Section: Some Proposed Approachesmentioning
confidence: 99%
“…Article [12] deals with extracting rules from the clustering results provided by a diffusion map training framework. Modern data mining technology in network security context does not always create understandable results for the end users.…”
Section: Some Proposed Approachesmentioning
confidence: 99%