共 17 条
- [1] Abraham A, 2007, INT J NETW SECURITY, V4, P328
- [2] Ashoor A.S, 2011, INT J SCI ENG RES, V1, P1
- [3] Chaurasia Shalinee, 2014, INT J COMPUT SCI INF, V5, P2481
- [4] CHEBROLU S, 2004, COMPUTERS SECURITY
- [5] Chou T., 2009, ENSEMBLE MACHINE LEA
- [6] Dongre Snehlata S., 2012, INT J MODELING OPTIM, V2, P488
- [7] Fernando A., 2012, IEEE T SYSTEMS MAN C, V42
- [8] Govindarajan M., 2014, International Journal of Computer Network and Information Security, V6, P45, DOI 10.5815/ijcnis.2014.02.07
- [9] Govindarjan M., 2012, WORLD C ENG COMP SCI, V1
- [10] AdaBoost-based algorithm for network intrusion detection [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS, 2008, 38 (02): : 577 - 583