Search For:

Displaying 1-4 out of 4 total
Improvement of Association Rules Mining Algorithm in Wireless Network Intrusion Detection
Found in: Computational Intelligence and Natural Computing, International Conference on
By Ye Changguo, Zhang Qin, Zhou Jingwei, Wei Nianzhong, Zhu Xiaorong, Wang Tailei
Issue Date:June 2009
pp. 413-416
This paper, first analyzes the method of wireless network intrusion detection, presents a wireless network intrusion detection algorithm based on association rule mining. The application of fuzzy association rules in the wireless network intrusion detectio...
 
Application of Industry Ethernet and Configuration Software in Heating Network Monitoring System
Found in: Computer Science and Information Engineering, World Congress on
By Zhou Jingwei, Liu Dong, Ma Xiufeng, Ye Changguo
Issue Date:April 2009
pp. 131-134
The paper analyzes the sturcture of heating network monitoring system and introduces the design and realization of the heating network monitoring system based on industry ethernet and configuration software, the building of industry ethernet and the realiz...
 
The Research on the Application of Association Rules Mining Algorithm in Network Intrusion Detection
Found in: Education Technology and Computer Science, International Workshop on
By Ye Changguo, Wei Nianzhong, Wang Tailei, Zhang Qin, Zhu Xiaorong
Issue Date:March 2009
pp. 849-852
Network Intrusion Detection System (IDS), as the main security defending technique, is second guard for a network after firewall. Since it can discern and respond to the hostile behavior of the computer and network resource, it is a hot area for research n...
 
A New Feature Extraction Method of Intrusion Detection
Found in: Education Technology and Computer Science, International Workshop on
By Zhu Xiaorong, Wang Dianchun, Ye Changguo
Issue Date:March 2009
pp. 504-507
The paper uses kernel principal component analysis to extract features from the intrusion detection training samples. The method extracts features and reduces the dimensions very effectively. In addition, we make use of RSVM method into nonlinear proximal ...
 
 1