The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2017
DOI: 10.1016/j.procs.2017.12.214
|View full text |Cite
|
Sign up to set email alerts
|

Network Intrusion Detection Systems Analysis using Frequent Item Set Mining Algorithm FP-Max and Apriori

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…The Apriori algorithm is the most classic algorithm for mining frequent item sets, which can extract association rules from large data sets (Zhang, 2016;Hidayanto et al, 2017). Algorithm steps (Han and Kamber, 2001;Yu, 2004;Li et al, 2020) are shown in Figure 2 below.…”
Section: Establishment Of Weight Model Based On Apriori Algorithmmentioning
confidence: 99%
“…The Apriori algorithm is the most classic algorithm for mining frequent item sets, which can extract association rules from large data sets (Zhang, 2016;Hidayanto et al, 2017). Algorithm steps (Han and Kamber, 2001;Yu, 2004;Li et al, 2020) are shown in Figure 2 below.…”
Section: Establishment Of Weight Model Based On Apriori Algorithmmentioning
confidence: 99%
“…In addition, Equation (6) shows an equation for calculating the Fmeasure using accuracy and recall. The performance evaluation uses the proposed miningbased mutual information (MbMI), existing mining-based word frequency (MbWF) [37,38], word concurrence frequency (WCoF) [39,40] in the document to find the relationship between words. It performs performance evaluation while repeatedly changing minimum support.…”
Section: B Performance Evaluationmentioning
confidence: 99%
“…Since different subsystem implements variable functions, they have unique rules of their own. The computational load is closely related to the size of the database [42]. Thus, each subsystem can manipulate its own database and mine association rules individually.…”
Section: The Detection Model Based On Device Statesmentioning
confidence: 99%