참고문헌
- J. F. Roddick and M. Spiliopoulou, 'Temporal data mining: survey and issues,' Research Report ACRC-99-007, University of South Australia, 1999
- B. Ozden, S. Ramaswamy and A. Silberschatz, 'Cyclic association rules,' 11th International Conference on Data Engineering, Orlando, May. 1998 https://doi.org/10.1109/ICDE.1998.655804
- X. Chen and I. Petrounias, 'A Framework for temporal data mining,' 9th International Conference on Database and Expert System Applications, 1998
- X. Chen, I. Petrounias and H. Heathfield, 'Discovering temporal association rules in temporal database,' International Workshop on Issues and Applications of Database Technology, 1998
- Y. Li and P. Ning, 'Discovering Calendar-based Temporal Association Rules,' In Proc. of the 8th International Symposium on Temporal Representation and Reasoning, 2001 https://doi.org/10.1109/TIME.2001.930706
- S. Ramaswsmy, S. Mahajan and A. Silberschatz, 'On the discovery of interesting patterns in association rules,' the VLDB Conference, New York City, Sep., 1998
- J. R. Quinlan, 'Induction of decision trees, Machine Learning,' Tom M. Mitchell Publishers, 1986
- J. R. Quinlan, 'C4.5: Programs for Machine Learning,' Morgan Kaufman Publishers, 1993
- J. Han and M. Kamber, 'Data Mining: Concepts and Techniques,' Morgan Kaufmann Publishers, 2000
- Chris Sinclair, Lyn Pierce and Sara Matzner, 'An Application of Machine Learning to Network Intrusion Detection,' 15th Annual Computer Security Applications Conference Dec., Phoenix, Arizona, 1999 https://doi.org/10.1109/CSAC.1999.816048
- B. Liu, W. Hsu and Y. Ma, 'Integrating classification and association rule mining,' In Proc. of the 4th International Conference Knowledge Discovery and Data Mining, 1998
- W. Li, J. Han and J. Pei, 'CMAR: Accurate and Efficient Classification Based on Multiple Association Rules,' In Proc. 2001 International Conference on Data Mining https://doi.org/10.1109/ICDM.2001.989541
- W. Lee and S. Stolfo, 'Data Mining Approaches for Intrusion Detection,' In Proc. of the 7th USENIX security Symposium, 1998
- W. Lee and S. Stolfo, 'A Data Mining Framework for Building Intrusion Detection Models,' IEEE Symposium on Security and Privacy, 1999 https://doi.org/10.1109/SECPRI.1999.766909
- M. J. Lee, M. S. Shin, K. H. Ryu and K. Y. Kim, 'Design and Implementation of Alert Analyzer with Data Mining Engine,' In Proc. of the 5th International Conference on Intelligent Data Engineering and Automated Learning, 2003
- M. S. Shin and K. H. Ryu, 'Data Mining Methods for Alert Correlation Analysis,' International Journal of Computer and Information Science (IJCIS), Vol.4, No.4, Dec., 2003
- D. Barbara, J. Couto and N. Wu, 'ADAM: Detection Intrusion by Data Mining,' In Proc. of 2th IEEE Information Assurance Workshop, 2001
- 이헌규, 이양우, 김룡, 서성보, 류근호, 박진수, '시간연관규칙과 분류규칙을 이용한 비정상행위 탐지 기법', 한국정보처리학회 춘계학술발표 논문집, 제10권 제1호, pp. 1579-1582, 2003
- Jin Suk Kim, Hohn Gyu Lee, Sungbo Seo and Keun Ho Ryu, 'CTAR: Classification based on Temporal Class-Association Rules for Intrusion Detection,' In Proc. of the 4th International Workshop on Information Security Applications, Vol.4, pp. 101-113, 2003
- '1998 DARPA Intrusion Detection Evaluation Data,' http://www.ll.mit.edu/IST/ideval/data/data_ index.html
-
http://www.csc.liv.ac.uk/
${\sim}$ frans/KDD/Software/CMAR/cmar.html - R. Srikant and R. Agrawal, 'Mining Quantitative Association Rules in Large Relational Tables,' In Proc. of the 1996 ACM SIGMOD International Conference on Management of Data, pp. 1-12, 1996