[1]
Y. Li, Research on Network Security Situation Awareness Based on Association Rule, Proc. IEEE Symp. Internet Technology and Applications, Wuhan, Aug. 2010, p.1 – 4, doi: 10. 1109/ITAPP. 2010. 5566194.
Google Scholar
[2]
T. Hu, H. Chen, L. Huang, and X. Zhu, A Survey of Mass Data Mining Based on Cloud computing, Proc. IEEE Symp. Anti-Counterfeiting, Security and Identification (ASlD), Taipei, august 2012, pp.1-4, doi: 10. 1109/ICASID. 2012. 6325353.
DOI: 10.1109/icasid.2012.6325353
Google Scholar
[3]
W. Chen, Mining weighted association rules based on weighted Fp tree, Proc. IEEE Symp. E -Business and E -Government (ICEE), Shanghai, May 2011, pp.1-4, doi: 10. 1109/ ICEBEG. 2011. 5884502.
DOI: 10.1109/icebeg.2011.5884502
Google Scholar
[4]
B. He, Fast Mining Algorithm of Global Maximum Frequent Itemsets, Springer Berlin Heidelberg: Advances in Intelligent and Soft Computing(AISC), Heidelberg, 2012, pp.199-204, doi: 10. 1007/978-3-642-27951-5_30.
DOI: 10.1007/978-3-642-27951-5_30
Google Scholar
[5]
Y. Ye, and C. Chiang, AParallel Apriori Algorithm for Frequent Itemsets Mining, Proc. IEEE Symp. Software Engineering Research, Management and Applications, Seattle, Aug. 2006, pp.87-94, doi: 10. 1109/SERA. 2006. 6.
DOI: 10.1109/sera.2006.6
Google Scholar
[6]
H.G. Li, and Y. Ni, IntrusionDetection TechnologyResearch Based on Apriori Algorithm, Elsevier: Applied Physics and Industrial Engineering, Beijing, Vol. 24, Part. C, 2012, pp.1615-1620, doi: 10. 1016/j. phpro. 2012. 02. 238.
Google Scholar
[7]
N. Padhy, P. Mishra, and R. Panigrahi, The Survey of Data Mining Applications And Feature Scope, IJCSEIT, Vol. 2, No. 3, June 2012, pp.48-53, doi: 10. 5121/ijcseit. 2012. 2303.
DOI: 10.5121/ijcseit.2012.2303
Google Scholar
[8]
J. Singh, H. Ram, and J.S. Sodh, Improving Efficiency of Apriori Algorithm Using Transaction Reduction, International Journal of Scientific and Research Publications, Vol. 3, Issue. 1, January 2013, pp.1-4.
Google Scholar
[9]
Y.B. Jia, G.H. Xia, An Improved Apriori Algorithm Based on Association Analysis, Proc. IEEE Symp. Networking and Distributed Computing (ICNDC), Hangzhou, Oct. 2012, pp.208-211, doi: 10. 1109/ICNDC. 2012. 56.
DOI: 10.1109/icndc.2012.8
Google Scholar