참고문헌
- Leonid Portnoy, Eleazar Eskin, and Salvatore J. Stolfo. "Intrusion detection with unlabeled data using clustering", Proceedings of ACM CSS Workshop on Data Mining Applied to Security (DMSA-2001), Philadelphia, PA: November 5-8, 2001.
- Jack Marin, Daniel Ragsdale, and John Shurdu, "A hybrid approach to the profile creation and intrusion detection", Proceedings of DARPA Information Suroivahility Coriference and Exposition, IEEE, 2001.
- Nong Ye and Xiangyang Li, "A scalable clustering technique for intrusion signature recognition", 2001 IEEE Man Systems and Cybernetics Iriformation Assurance Workshop, West Point, NY, June 5-6, 2001.
- Wenke Lee, Salvatore J. Stolfo, and Kui W. Mok, "A data mining framework for building intrusion detection models", Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 120-132, 1999.
- Jianxiong Luo and Susan M. Bridges, "Mining fuzzy association rules and fuzzy frequency episodes for intrusion detection", International Journal of Intelligent Systems, vol. 15, pp. 687-703, 2000. https://doi.org/10.1002/1098-111X(200008)15:8<687::AID-INT1>3.0.CO;2-X
- Nello Cristianini and John Shawe-Taylor, An introduction to support vector machines and other kernel-based learning methods, Cambridge University PRESS, 2000.
- Mark Girolami, "Mercer kernel based clustering in feature space", IEEE Transactions on Neural Networks, vol. 13, no. 4, pp. 780-784, 2002. https://doi.org/10.1109/TNN.2002.1000150
- Jiawei Han and Micheline Kamber, Data Mining: Concepts and Techniques, Morgan Kaufmann Publishers, 2001.1.
- A. Baraldi and E. Chang, "Simplified ART : A new class of ART algorithms", International Computer Science Institute, TR 98-004, 1998.
- I. S. Dhillon and D. S. Modha, "Concept decomposition for large sparse text data using clustering", Technical Report RJ 10147(95022), IBM Almaden Research Center, 1999.
- KDD CUP 1999 DATA, Available in http://kdd.ics.uci.edu/databases/kddcup99/kddcup99. html and http://www-cse.ucsd.edu/users/elkan/kdresults.htmI
- Results of the KDD '99 Classifier Learning Contest, Available in http://www-cse.ucsd.edu/users/elkan/clresults.html
- 유신근, 이남훈, 심영철, "침입탐지시스템 평가 방법론" 한국정보처리학회 논문집, vol. 7, no. 11, pp. 3445-3461, 2000.
피인용 문헌
- Intruder Detection System Based on Pyroelectric Infrared Sensor vol.26, pp.5, 2016, https://doi.org/10.5391/JKIIS.2016.26.5.361