| 期刊論文1. | Kamsu-Foguem, B.、Rigal, F.、Mauget, F.(2013)。Mining association rules for the quality improvement of the production process。Expert Systems with Applications,40(4),1034-1045。 | 2. | Chen, M. C.、Chiu, A. L.、Chang, H. H.(2005)。Mining changes in customer behavior in retail marketing。Expert Systems with Applications,28(4),773-781。 | 3. | 李瑞庭、楊富丞、李偉誠(20120100)。Mining Closed Multi-Dimensional Interval Patterns。資訊管理學報,19(1),161-184。 延伸查詢 | 4. | 翁政雄(20111000)。從購買意願資料中挖掘高度相關性的關聯規則。資訊管理學報,18(4),119-138。 延伸查詢 | 5. | 鄭麗珍、李麗美(20140400)。探勘不平衡資料集中之突顯樣式--以國道事故資料為實證研究。資訊管理學報,21(2),161-183。 延伸查詢 | 6. | 龔旭陽、林美賢、林靖祐、賴威光(20100100)。針對重要稀少性資料之一種有效率關聯式探勘方法設計。資訊管理學報,17(1),133-155。 延伸查詢 | 7. | Agrawal, R.、Imieliński, T.、Swami, A.(1993)。Mining association rules between sets of items in large databases。ACM SIGMOD Record,22(2),207-216。 | 8. | Ahn, K. I.(2012)。Effective product assignment based on association rule mining in retail。Expert Systems with Applications,39(16),12551-12556。 | 9. | Al Abdulmohsin, I. M.(2009)。Techniques and algorithms for access control list optimization。Computers & Electrical Engineering,35(4),556-566。 | 10. | Böttcher, M.、Spott, M.、Nauck, D.、Kruse, R.(2009)。Mining changing customer segments in dynamic markets。Expert Systems with Applications,36(1),155-164。 | 11. | Chang, Ray-i、Chang, Keng-wei(20091200)。C-SWF Incremental Mining Algorithm for Firewall Policy Management。資訊、科技與社會學報,16,45-61。 | 12. | Dam, H. K.、Ghose, A.(2015)。Mining version histories for change impact analysis in business process model repositories。Computers in Industry,67,72-85。 | 13. | Feng, W.、Zhang, Q.、Hu, G.、Huang, J. X.(2014)。Mining network data for intrusion detection through combining SVMs with ant colony networks。Future Generation Computer Systems,37,127-140。 | 14. | Hamed, H.、Al-Shaer, E.(2006)。On autonomic optimization of firewall policy organization。Journal of High Speed Networks,15(3),209-227。 | 15. | Hamed, H.、El-Atawy, A.、Al-Shaer, E.(2006)。On dynamic optimization of packet matching in high-speed firewalls。IEEE Journal on Selected Areas in Communications,24(10),1817-1830。 | 16. | Hanguang, L.、Yu, N.(2012)。Intrusion detection technology research based on apriori algorithm。Physics Procedia,24,1615-1620。 | 17. | Hossain, S. M. S.、Rahman, S. M.、Kabir, M. F.(2012)。Network proxy log mining: association rule based security and performance enhancement for proxy server。Computer Science and Engineering,49,9852-9857。 | 18. | Hu, H.、Ahn, G. J.、Kulkarni, K.(2012)。Detecting and resolving firewall policy anomalies。IEEE Transactions on Dependable and Secure Computing,9(3),318-331。 | 19. | Huang, T. C. K.(2012)。Mining the change of customer behavior in fuzzy time-interval sequential patterns。Applied Soft Computing,12(3),1068-1086。 | 20. | Huang, Z.、Gan, C.、Lu, X.、Huan, H.(2013)。Mining the changes of medical behaviors for clinical pathways。Studies in Health Technology and Informatics,192,117-121。 | 21. | Kim, J. K.、Song, H. S.、Kim, H. K.(2005)。Detecting the change of customer behavior based on decision tree analysis。Expert Systems,22(4),193-205。 | 22. | Li, C.、Reichert, M.、Wombacher, A.(2011)。Mining business process variants: Challenges, scenarios, algorithms。Data & Knowledge Engineering,70(5),409-434。 | 23. | Li, G.、Law, R.、Vu, H. Q.、Rong, J.、Zhao, X. R.(2015)。Identifying emerging hotel preferences using Emerging Pattern Mining technique。Tourism Management,46,311-321。 | 24. | Li, J.、Wong, L.(2002)。Identifying good diagnostic gene groups from gene expression profiles using the concept of emerging patterns。Bioinformatics,18(5),725-734。 | 25. | Mohammad, M. N.、Sulaiman, N.、Muhsin, O. A.(2011)。A novel intrusion detection system by using intelligent data mining in weka environment。Procedia Computer Science,3,1237-1242。 | 26. | Rao, C. S.、Rama, B. R.、Mani K. N.(2011)。Firewall policy management through sliding window filtering method using data mining techniques。International Journal of Computer Science & Engineering Survey,2(2),39-55。 | 27. | Salah, K.、Elbadawi, K.、Boutaba, R.(2012)。Performance modeling and analysis of network firewalls。IEEE Transactions on Network and Service Management,9(1),12-21。 | 28. | Sherhod, R.、Gillet, V. J.、Judson, P. N.、Vessey, J. D.(2012)。Automating knowledge discovery for toxicity prediction using jumping emerging pattern mining。Journal of Chemical Information and Modeling,52(11),3074-3087。 | 29. | Shie, B. E.、Yu, P. S.、Tseng, V. S.(2013)。Mining interesting user behavior patterns in mobile commerce environments。Applied Intelligence,38(3),418-435。 | 30. | Shih, M. J.、Liu, D. R.、Hsu, M. L.(2010)。Discovering competitive intelligence by mining changes in patent trends。Expert Systems with Applications,37(4),2882-2890。 | 31. | Sreelaja, N. K.、Pai, G. A.(2010)。Ant Colony Optimization based approach for efficient packet filtering in firewall。Applied Soft Computing,10(4),1222-1236。 | 32. | Tsai, C. Y.、Shieh, Y. C.(2009)。A change detection method for sequential patterns。Decision Support Systems,46(2),501-511。 | 33. | Wang, G.、Zhao, Y.、Zhao, X.、Wang, B.、Qiao, B.(2010)。Efficiently mining local conserved clusters from gene expression data。Neurocomputing,73,7-9。 | 34. | 黃仁鵬、藍國誠(20070400)。高效率探勘關聯規則之演算法--EFI。資訊管理學報,14(2),139-167。 延伸查詢 | 35. | Chang, R. I.、Lai, L. B.、Su, W. D.、Wang, J. C.、Kouh, J. S.(2007)。Intrusion detection by backpropagation neural networks with sample-query and attribute-query。International Journal of Computational Intelligence Research,3(1),6-10。 | 36. | Song, H. S.、kyeong Kim, J.、Kim, S. H.(2001)。Mining the change of customer behavior in an internet shopping mall。Expert Systems with Applications,21(3),157-168。 | 會議論文1. | Ceci, M.、Appice, A.、Caruso, C.、Malerba. D.(2008)。Discovering emerging patterns for anomaly detection in network connection data。The 17th International Symposium,(會議日期: May 20-23)。Toronto。179-188。 | 2. | Al-Shaer, E. S.、Hamed, H. H.(2003)。Firewall policy advisor for anomaly discovery and rule editing。IFIP/IEEE Eighth International Symposium on Integrated Network Management,(會議日期: March 24-28)。Colorado Springs, USA。17-30。 | 3. | Casado, M.、Garfinkel, T.、Akella, A.、Freedman, M. J.、Boneh, D.、McKeown, N.、Shenker, S.(2006)。SANE: a protection architecture for enterprise networks。The 15th USENIX Security Symposium,(會議日期: July 31-Aug 4)。Vancouver, B.C.。137-151。 | 4. | Al-Shaer, E. S.、Hamed, H. H.(2004)。Discovery of policy anomalies in distributed firewalls。Twenty-third AnnualJoint Conference of the IEEE Computer and Communications Societies,(會議日期: March 7-11)。Hong Kong, China。2605-2616。 | 5. | Bailey, J.、Manoukian, T.、Ramamohanarao, K.(2003)。A fast algorithm for computing hypergraph transversals and its application in mining emerging patterns。The Third IEEE International Conference on Data Mining,(會議日期: November 19-22)。Melbourne, Florida。485。 | 6. | Dong, G.、Li, J.(1999)。Efficient mining of emerging patterns: discovering trends and differences。The Fifth ACM Sigkdd International Conference on Knowledge Discovery and Data Mining,(會議日期: 1999/08/15-08/18)。San Diego, California。43-52。 | 7. | El-Atawy, A.、Samak, T.、Wali, Z.、Al-Shaer, E.(2007)。An automated framework for validating firewall policy enforcement。The Eighth IEEE International Workshop on Policies for Distributed Systems and Networks,(會議日期: June 13-15)。Bologna。151-160。 | 8. | Ganti, V.、Gehrke, J.、Ramakrishnan, R.(1999)。CACTUS: clustering categorical data using summaries。The fifth ACM SIGKDD international conference on Knowledge discovery and data mining,(會議日期: August 15-18)。San Diego, CA。73-83。 | 9. | Golnabi, K.、Min, R. K.、Khan, L.、Al-Shaer, E.(2006)。Analysis of firewall policy rules using data mining techniques。The 10th IEEE/IFIP Network Operations and Management Symposium,(會議日期: April 3-7)。Vancouver, Canada。305-315。 | 10. | Hamed, H.、Al-Shaer, E.(2006)。Dynamic rule-ordering optimization for high-speed firewall filtering。The 2006 ACM Symposium on Information, Computer and Communications Security,(會議日期: March 21-24)。Taipei。332-342。 | 11. | Jeffrey, A.、Samak, T.(2009)。Model checking firewall policy configurations。The IEEE International Symposium on Policies for Distributed Systems and Networks,(會議日期: July 20-22)。London。60-67。 | 12. | Katic, T.、Pale, P.(2007)。Optimization of firewall rules。The 29th International Conference on Information Technology Interfaces,(會議日期: June 25-28)。Cavtat/Dubrovnik, Croatia。685-690。 | 13. | Masud, M. M.、Mustafa, U.、Trabelsi, Z.(2014)。A data driven firewall for faster packet filtering。The International Conference on Communications and Networking,(會議日期: March 19-22)。Hammamet, Tunisia。1-5。 | 14. | Liu, A. X.、Torng, E.、Meiners, C. R.(2008)。Firewall compressor: an algorithm for minimizing firewall policies。The 27th Conference on Computer Communications,(會議日期: April 13-18)。Phoenix, AZ。691-699。 | 15. | Lubna, K.、Cyiac, R.、Karun, K.(2013)。Firewall log analysis and dynamic rule re-ordering in firewall policy anomaly management framework。The International Conference on Green Computing, Communication and Conservation of Energy,(會議日期: December 12-14)。Chennai。853-856。 | 16. | Mustafa, U.、Masud, M. M.、Trabelsi, Z.、Wood, T.、Al Harthi, Z.(2013)。Firewall performance optimization using data mining techniques。The 9th International Wireless Communications and Mobile Computing Conference,(會議日期: July 1-5)。Cagliari, Sardinia。934-940。 | 17. | Park, J. H.、Lee, H. G.、Park, J. H.(2010)。Real-time diagnosis system using incremental emerging pattern mining。The 5th International Conference on Ubiquitous Information Technologies and Applications,(會議日期: December 16-18)。Sanya, Hainan。1-5。 | 18. | Saboori, E.、Parsazad, S.、Sanatkhani, Y.(2010)。Automatic firewall rules generator for anomaly detection systems with Apriori algorithm。The 3rd International Conference on Advanced Computer Theory and Engineering,(會議日期: August 20-22)。Chengdu。57-60。 | 19. | Vaarandi, R.(2013)。Detecting anomalous network traffic in organizational private networks。IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support,(會議日期: February 25-28)。San Diego, CA。285-292。 | 20. | Winding, R.、Wright, T.、Chapple, M.(2006)。System anomaly detection: mining firewall logs。Securecomm and Workshops,(會議日期: August 29-September 1)。Baltimore, MD。1-5。 | 21. | Yuan, L.、Chen, H.、Mai, J.、Chuah, C. N.、Su, Z.、Mohapatra, P.(2006)。FIREMAN: a toolkit for firewall modeling and analysis。IEEE Symposium on Security and Privacy,(會議日期: May 21-24)。Oakland, CA。199-213。 | 22. | Lee, W.、Stolfo, S. J.(1998)。Data mining approaches for intrusion detection。The 7th USENIX Security Symposium,(會議日期: January 26-29)。San Antonio, Texas。79-94。 | 23. | Wu, R. C.、Chen, R. S.、Chen, C. C.(2005)。Data mining application in customer relationship management of credit card business。The 29th Annual International Computer Software and Applications Conference,(會議日期: July 26-28)。Edinburgh。39-40。 | 24. | Agrawal, Rakesh、Srikant, Ramakrishnan(1994)。Fast algorithms for mining association rules。The 20th International Conference on Very Large Data Bases,487-499。 | 圖書1. | Zwicky, E. D.、Cooper, S.、Chapman, D. B.(2000)。Building internet firewalls。O'Reilly Media, Inc.。 | 其他1. | CSI(2011)。Computer Crime and Security Survey 2011,http://www.ncxgroup.com/wp-content/uploads/2012/02/CSIsurvey2010.pdf, 2013/12/07。 | 2. | US-GAO(2013)。CYBERSECURITY: National strategy, roles, and responsibilities need to be better defined and more effectively implemented,http://www.gao.gov/assets/660/652170.pdf, 2013/12/07。 | |
| |