{"title":"基于数据挖掘方法的网络攻击检测","authors":"Orzikul Shukurov, Bobir Shirinov","doi":"10.1109/ICISCT55600.2022.10147014","DOIUrl":null,"url":null,"abstract":"In article, the detection of above pounce upon supported on collections Mining undergrounds was studied, including the detection of pounce upon using a clandestine Markov model, detection of pounce upon using theorem networks, detection of pounce upon using bunch methods, detection of pounce upon using the facilitate agent method, detection of pounce upon using neuronal networks, detection of pounce upon using transmissible algorithms, detection of pounce upon using fleecy scientific reasoning rules. The pointers of tone-beginning detection in indefinite studies are precondition in the table.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Network Attack Detection Based on Data Mining Methods\",\"authors\":\"Orzikul Shukurov, Bobir Shirinov\",\"doi\":\"10.1109/ICISCT55600.2022.10147014\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In article, the detection of above pounce upon supported on collections Mining undergrounds was studied, including the detection of pounce upon using a clandestine Markov model, detection of pounce upon using theorem networks, detection of pounce upon using bunch methods, detection of pounce upon using the facilitate agent method, detection of pounce upon using neuronal networks, detection of pounce upon using transmissible algorithms, detection of pounce upon using fleecy scientific reasoning rules. The pointers of tone-beginning detection in indefinite studies are precondition in the table.\",\"PeriodicalId\":332984,\"journal\":{\"name\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCT55600.2022.10147014\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT55600.2022.10147014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Network Attack Detection Based on Data Mining Methods
In article, the detection of above pounce upon supported on collections Mining undergrounds was studied, including the detection of pounce upon using a clandestine Markov model, detection of pounce upon using theorem networks, detection of pounce upon using bunch methods, detection of pounce upon using the facilitate agent method, detection of pounce upon using neuronal networks, detection of pounce upon using transmissible algorithms, detection of pounce upon using fleecy scientific reasoning rules. The pointers of tone-beginning detection in indefinite studies are precondition in the table.