[1] 石文昌,孙玉芳.安全操作系统研究的发展[J].计算机科学,2002,29(6):5-12.(SHI W C, SUN Y F. Development of secure operating system research[J]. Computer Science, 2002, 29(6):5-12.) [2] 丁丽萍,周博文,王永吉.基于安全操作系统的电子证据获取与存储[J].软件学报,2007,18(7):1715-1729.(DING L P, ZHOU B W, WANG Y J. Capture and storage of digital evidence based on security operating system[J]. Journal of Software, 2007, 18(7):1715-1729.) [3] 刘海峰,卿斯汉.安全操作系统审计的设计与实现[J].计算机研究与发展,2001,38(10):1262-1268.(LIU H F, QING S H. Design and realization of auditing in secure OS[J]. Journal of Computer Research and Development, 2001, 38(10):1262-1268.) [4] MORADI M, KEYVANPOUR M R. An analytical review of XML association rules mining[J]. Artificial Intelligence Review, 2015, 43(2):277-300. [5] SONG S J, KIM E H, KIM H G, et al. Query-based association rule mining supporting user perspective[J]. Computing, 2011, 93(1):1-25. [6] AGRAWAL R, SRIKANT R. Fast algorithms for mining association rules[C]//Proceedings of the 20th International Conference on Very Large Data Bases. San Francisco, CA:Morgan Kaufmann, 1994:21-30. [7] AGRAWAL R, IMIELINSKI T SWAMI A. Mining association rules between sets of items in large databases[J]. ACM SIGMOD Record, 1993, 22(2):207-216. [8] HAN J, PEI J, YIN Y. Mining frequent patterns without candidate generation[J]. ACM SIGMOD Record, 2000, 29(2):1-12. [9] EL-HAJJ M, ZAIANE O R. COFI approach for mining frequent itemsets revisited[C]//Proceedings of the 2004 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery. New York:ACM, 2004:70-75. [10] DONG G L, RYU K S, BASHIR M, et al. Discovering medical knowledge using association rule mining in young adults with acute myocardial infarction[J]. Journal of Medical Systems, 2013, 37(2):1-10. [11] KHALILI A, SAMI A. SysDetect:a systematic approach to critical state determination for industrial intrusion detection systems using Apriori algorithm[J]. Journal of Process Control, 2015, 2776:154-160. [12] SAHOO J, DAS A K, GOSWAMI A. An effective association rule mining scheme using a new generic basis[J]. Knowledge and Information Systems, 2015, 43(1):127-156. [13] KESHAVAMURTHY B N, KHAN A M, TOSHNIWAL D. Privacy preserving association rule mining over distributed databases using genetic algorithm[J]. Neural Computing & Applications, 2013, 22(Supplement 1):351-364. [14] ROZENBERG B, GUDES E. Association rules mining in vertically partitioned databases[J]. Data & Knowledge Engineering, 2006, 59(2):378-396. [15] DING Y, YUAN X, TANG K, et al. A fast malware detection algorithm based on objective-oriented association mining[J]. Computers & Security, 2013, 39(4):315-324. [16] GARCKE J, GRIEBEL M. On the parallelization of the sparse grid approach for data mining[C]//LSSC 2001:Proceedings of the Third International Conference on Large-Scale Scientific Computing, LNCS 2179. Berlin:Springer, 2001:22-32. [17] CZIBULA G, MARIAN Z, CZIBULA I G. Detecting software design defects using relational association rule mining[J]. Knowledge and Information Systems, 2015, 42(3):545-577. [18] HILLS J, BAGNALL A, IGLESIA B D L, et al. BruteSuppres-sion:a size reduction method for Apriori rule sets[J]. Journal of Intelligent Information Systems, 2013, 40(3):431-454. [19] LIPPMANN R, HAINES J W, FRIED D J, et al. The 1999 DARPA off-line intrusion detection evaluation[J]. Computer Networks, 2000, 34(4):579-595. |