References
- G.V Nadiammai, M. Hemalatha, "Effective approach toward Intrusion Detection System using Data Mining Techniques," Egyptian Informatics Journal, December 2013.
- Jen-Yan Hang, I-En Liao, Yu-Fang Chung, Kuen-Tzung Chen, "Shielding Wireless Sensor Network using Markovian Intrusion Detection System with Attack Pattern Mining," Information Sciences, 29,March 2011.
- A. Chaudhary, V.N.Tiwari and A. Kumar, "Analysis of Fuzzy Logic Based Intrusion Detection System in Mobile Ad Hoc Networks," BIJIT-BVICAM'S International Journal of Information Technology 2014.
- Portnoy, L., Eskin, E. And Stolfo, S., "Intrusion detection with unlabeled data using clustering," in Proc. of the Workshop on Data Mining for Security Applications, November 2001.
- Y. Zhao, W. Liu, W. Lou, and Y. Fang, "Securing mobile ad hoc networks with certificate less public keys," IEEE Trans. Dependable Secure Comput., vol. 3, no. 4, pp. 386-399, Oct.-Dec. 2006. https://doi.org/10.1109/TDSC.2006.58
- Agrawal, R., Ramakrishnan, S., "Mining sequential patterns," in Proc. of 11th International Conference on Data Engineering, pp. 3-14. IEEE, 1995.
- Mohammed J. Zaki, "SPADE: An Efficient Algorithm For Mining Frequent Sequences," Machine Learning, 42, 31-60, Kluwer Academic Publishers, 2001. https://doi.org/10.1023/A:1007652502315
- Aseervatham, S., Osmani, A., Viennet, E., bitSPADE, "A Lattice-based Sequential Pattern Mining Algorithm Using Bitmap Representation," in Proc. of 6th Intern.Conf. Data Mining, pp. 792-797. IEEE, 2006.
- Ayres, J., Flannick, J., Gehrke, J., Yiu, T., "Sequential pattern mining using a bitmap representation," in Proc. of 8th ACM SIGKDD International Conference on Knowledge Dis-covery and Data Mining, pp. 429-435. ACM, 2002.
- Unil Yun, "A new framework for detecting weighted sequential patterns in large sequence databases," Science direct Knowledge-Based Systems 21, 110-122, 2008. https://doi.org/10.1016/j.knosys.2007.04.002
- Fayyad, U.M., and Irani, K.B., "The attribute selection problem in decision tree generation," in Proc. of AAAI-92, Proceedings of the Ninth National Conference on Artificial Intelligence, AAAI Press/The MIT Press, 104-110, 1992.
- Sun, Ron, and C. Lee Giles, "Sequence learning: Paradigms, algorithms, and applications," Springer Science & Business Media, Vol. 1828, 2001.
- Philippe Fournier-Viger, Antonio Gomariz , Michal Sebek, Martin Hlosta, "VGEN: Fast Vertical Mining of Sequential Generator Patterns."
- C.-H. Tsang et al., "Genetic-fuzzy rule mining approach and evaluation of feature selection techniques for anomaly intrusion detection," Pattern Recognition 40, 2373-2391, 2007. https://doi.org/10.1016/j.patcog.2006.12.009
- M. Ramze Rezaee, B. Goedhart, B.P.F. Lelieveldt, J.H.C. Reiber, "Fuzzy feature selection," Pattern Recognition 32, 1999.
- Marion Leleu, Christophe Rigotti , Jean-Francois Boulicaut, and Guillaume, "GO-SPADE: Mining Sequential Patterns over Datasets with Consecutive Repetitions," MLDM 2003, LNAI 2734, pp. 293-306, 2003.
- Liu, H., and Setiono, R., "A probabilistic approach to feature selection-a filter solution," in Proc. of International Conference on Machine Learning (ICML-96), July 3-6, 1996, Bari, Italy, San Francisco: Morgan Kaufmann Publishers, CA, 319-327, 1996.
- Siedlecki, W., and Sklansky, J,. "On automatic feature selection," International Journal of Pattern Recognition and Artificial Intelligence, 2, 197-220, 1998.
- M. Setnes, et al., "Similarity measures in fuzzy rule base simplification," IEEE Trans. Syst. Man Cybernetics.-Part B: Cybernetics 28 (3) 376-386, 1998.
- Ke Sun and Fengshan Bai, "Mining Weighted Association Rules without Preassigned Weights," IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 20, NO. 4, APRIL 2008.
- Maybin Muyeba, M. Sulaiman Khan, Frans Coenen "Fuzzy Weighted Association Rule Mining with Weighted Support and Confidence Framework."
- F. Tao, "Weighted association rule mining using weighted support and significant framework," in Proc. of the Ninth ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, August, pp. 661-666, 2003.
- W. Wang, J. Yang, and P.S. Yu, "Efficient Mining of Weighted Association Rules (WAR)," in Proc. of ACM SIGKDD '00, pp.270-274, 2000.
- Siedlecki, W., and Sklansky, J., "On automatic feature selection," International Journal of Pattern Recognition and Artificial Intelligence, 2, 197-220, 1998.
- Shan Suthaharan, "Big Data Classification: problems and challenges in Network Intrusion Prediction with Machine Learning," University of North Carolina, Greensboro, NC 27402, USA.
- Dunren Che, Mejdl Safran, and Zhiyong Peng, "From Big Data to Big Data Mining: Challenges, Issues' and Opportunities," Suthern LLinois University, 62901, USA.
- Amir Gandomi, Murtaza Haider, "Beyond the Hype: Big Data Concepts, Methods and analytics," International Journal of Information Management, 2014.
- Gu Jifa, Zhang Lingling, "Data, DIKW, Big Data and Data Science," in Proc. of 2nd International conference on Information Technology and quantitative Management, ITQM, 2014.
- Samson Oluwaseun Fadiya, Serdar Saydam, Vanduhe Vany Zira, "advancing big data for Humanitarian needs," Humanitarian Technology :science ,Systems and Global Impact 2014, HumTech 2014.
- Xindong Wu, Fellow, IEEE, Xingquan Zhu, Senior Member, IEEE, Gong-Qing Wu, and Wei Ding, Senior Member, IEEE, "Data mining with Big Data," IEEE transactions on Knowledge and Data Engineering, vol 26,no.1 January 2014.
- Karthik Kambatlaa, Giorgos Kollias b, Vipin Kumarc, Ananth Gramaa, "Trends in Big Data analytics," J.Parallel Distrib. Comput, 2014.
- Kevin D. Bowers, Catherine Hart, Ari Juels, "Securing the Data in Big Data Security Analytics."
- Shruti Karde1 , Mettu Govind Rao2 , Rajesh Bhise3 "INTRUSION DETECTION AND ANOMALY DETECTION SYSTEM USING SEQUENTIAL PATTERN MINING," IJRET: International Journal of Research in Engineering and Technology, eISSN: 2319-1163 pISSN: 2321-7308.
- Anisur Rahman, Yue Xu, Kenneth Radke, Ernest Foo, "Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining," Network and System Security, Volume 9955 of the series Lecture Notes in Computer Science pp 499-5.
Cited by
- Leveraging Big Data for Spark Deep Learning to Predict Rating vol.21, pp.6, 2017, https://doi.org/10.7472/jksii.2020.21.6.33