Finding interesting rules from large sets of discovered association rules
CIKM '94 Proceedings of the third international conference on Information and knowledge management
Fast Algorithms for Mining Association Rules in Large Databases
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Hi-index | 0.00 |
Aiming at the security problems take place inside E-government systems, this paper present an auditingsystem’s configuration, which is based on securityauditing, and invading detection system. According to thecharacters about security problems inside E-governmentsystems, I present the viewpoint to built the personalcredit information about system’s inner staffer, and haveit as the condition about invading detection. To invadingdetection system, I combine abusing detecting techniqueand abnormal detecting technique, make auditing data asexercising data to built invading detection models, andaccomplish the real-time conduct at auditing informationinside information system finally.