Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Nguyễn Hà Nam, Nguyễn Trí Thành, Hà Quang Thụy, Khai phá dữ liệu, NXB Đại học Quốc gia Hà Nội, 2013.Tài liệu tiếng Anh |
Sách, tạp chí |
Tiêu đề: |
Khai phá dữ liệu |
Nhà XB: |
NXB Đại học Quốc gia Hà Nội |
|
[2] George Danezis, Designing and attacking anonymous communication systems, July 2014, Cambridge |
Sách, tạp chí |
Tiêu đề: |
Designing and attacking anonymous communication systems |
|
[3] R.J Anderson, Security Enginnering – A Guide to Building Dependable Distributed Systems, Wiley 2001 |
Sách, tạp chí |
Tiêu đề: |
A Guide to Building Dependable Distributed Systems |
|
[4] Jiawei Han and Micheline Kamber, Data Mining Concepts and Techniques, Chapter 1 & Chapter 8 (Intelligent Database Systems Research Lab School of Computing Science Simon Fraser University, Canada), 2007 |
Sách, tạp chí |
Tiêu đề: |
Data Mining Concepts and Techniques |
|
[5] BS Everitt, Cluster Analysis, Edward Amold coblished by Haisted Press and imprint of john Wiley & Sons Inc, 3 rd edition, 1993 |
Sách, tạp chí |
Tiêu đề: |
Cluster Analysis |
|
[6] Michael R Anderber, Cluster analysis of application, Academic Press, Inc, New York, 1973 |
Sách, tạp chí |
Tiêu đề: |
Cluster analysis of application |
|
[7] S.Jain , M. Aalam , M.Doja , “ K-means clustering using weka interface”, Proceedings of the 4th National Conference; INDIACom, Computing For Nation Development, 2010 |
Sách, tạp chí |
Tiêu đề: |
K-means clustering using weka interface |
|
[8] Daniel Barbara, Julia Couto, Sushil Jajodia, and Ningning Wu, Adam: a testbed for exploring the use of data mining in intrusion detection, ACM SIGMOD Record, volume 30, December 2001 |
Sách, tạp chí |
Tiêu đề: |
Adam: a testbed for exploring the use of data mining in intrusion detection |
|
[9] Irvine, KDD Cup Data, October 29, 1999, http://kdd.ics.uci.edu/ databases/kddcup99/kddcup99.html |
Sách, tạp chí |
|
[10] Remco R.Bouckaert, Documentation Weka, The University of Waikato, July 14, 2008 |
Sách, tạp chí |
Tiêu đề: |
Documentation Weka |
|
[11] Mrs. Ghatge Dipali D, Network Traffic Intrusion Detection System using Decision Tree & K-Means Clustering Algorithm, International Journal of Emerging Trends & Technology in Computer Science, Volume 2, Issue 5, September – October 2013 |
Sách, tạp chí |
Tiêu đề: |
Network Traffic Intrusion Detection System using Decision Tree & K-Means Clustering Algorithm |
|
[12] Richa, Saurabh Mittal, Data Mining Approach IDS K-Mean using Weka Environment, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, issure 8, August 2014 |
Sách, tạp chí |
Tiêu đề: |
Data Mining Approach IDS K-Mean using Weka Environment |
|
[13] P. Divya, R. Priya, Clustering Based Feature Selection and Outlier Analysis, International Journal of Computer Science &Communication Networks, Vol.2 (6), p647-652 |
Sách, tạp chí |
Tiêu đề: |
Clustering Based Feature Selection and Outlier Analysis |
|
[14] Michel de Hoon, Clustering 3.0 for Windows, Mac OS X, Linux, Unix, Human Goneme Center, University of Tokyo, November 5, 2002 |
Sách, tạp chí |
Tiêu đề: |
Clustering 3.0 for Windows, Mac OS X, Linux, Unix |
|
[15] AJ Saldanha, Java TreeView User’s Manual, National Center for Biotechnology Information, The United States National Library of Medicine, 2004 |
Sách, tạp chí |
Tiêu đề: |
Java TreeView User’s Manual |
|
[16] A.M.Riad, Ibrahim Elhenawy, Ahmed Hassan and Nancy Awadallah: Visualize network anomaly Detection by using k-means clustering algorithm, international Journal of Computer Network & Communications, Vol.5, No.5, September 2013 |
Sách, tạp chí |
Tiêu đề: |
Visualize network anomaly Detection by using k-means clustering algorithm |
|