[1]
Q.F. Xu, B. Xiao and J. Guo. The method of mining telecommunication alarm association rules. Journal of Beijing University of Posts and Telecommunications, 2011, 34(2): 86-89. In Chinese.
Google Scholar
[2]
H. Mannila, H. Toivonen and A. I. Verkamo. Discovery of frequent episodes in event sequences[J]. Data Mining and Knowledge Discovery 1, 1997: 259–289.
DOI: 10.1023/a:1009748302351
Google Scholar
[3]
Agrawal R. Mining association rules between sets of items in large databases [C] . Proceedings of the 1993 ACM SIG MOD Conference . Washington , D C : [ s. n. ] , 1993 : 207-216.
DOI: 10.1145/170036.170072
Google Scholar
[4]
Z.T. Li, A.F. Zhang and J. Lei. Real-time correlation of network security alerts[C]. IEEE International Conference on Digital Object Identifier, 2007: 73-80.
Google Scholar
[5]
S. Lagzian,F. Amiri and A. Enayati. Frequent item set mining-based alert correlation for extracting multi-stage attack scenarios[C]. 2012 Sixth International Symposium on Digital Object Identifier, 2012: 1010-1014.
DOI: 10.1109/istel.2012.6483134
Google Scholar
[6]
Z.H. Tian, Y.Z. Zhang and W.Z. Zhang. Adaptive alarm association based on pattern mining and clustering analysis. Journal of Computer Research and Development, 2009 , 46(8) : 1304-1315. In Chinese.
Google Scholar
[7]
J. Wu, X.M. Li. Research on distribute communication network alarm relevance based on association rule. Journal of Computer Science, 2009, 36(11): 204-207, 212. In Chinese.
Google Scholar
[8]
Y. Chen, Q.N. Lin and Z.Y. T. A quantitative analysis of association rules. Journal of communication, 2003, 24(3): 119-123. In Chinese.
Google Scholar
[9]
J.W. Han. Mining frequent patterns without candidate generation [A] . In: Proceedings of the 2000 ACMSIGMOD conference on Management of Data[C], Dallas, TX, 2000 : 1-12.
Google Scholar
[10]
ITU-T Rec G. 783. Characteristics of Synchronous Digit al Hierarchy ( SDH) Equipment Function Blocks[ S ] , (1996).
Google Scholar
[11]
Q.F. Xu, J.J. Kan and Y.C. Li. An algorithm of mining alarm association rules with temporal characteristic. Microelectronics, 2007, 24(3): 23-26. In Chinese.
Google Scholar