J4 ›› 2010, Vol. 23 ›› Issue (5): 33-36.

• Content • Previous Articles     Next Articles

Research on Association Rules Mining Based Network Security Audit Technology

 GUO Hong-Yan, WEI Yong-Qing, LV Tao-Xia   

  1. 1. School of Information Science and Engineering, Shandong Normal University 2. Shandong Police College
  • Received:2010-06-12 Published:2010-10-20 Online:2010-10-20

CLC Number: 

  • TP393

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License (CC BY-NC 4.0), which permits third parties to freely share (i.e., copy and redistribute the material in any medium or format) and adapt (i.e., remix, transform, or build upon the material) the articles published in this journal, provided that appropriate credit is given, a link to the license is provided, and any changes made are indicated. The material may not be used for commercial purposes. For details of the CC BY-NC 4.0 license, please visit: https://creativecommons.org/licenses/by-nc/4.0