共 17 条
[1]
Abraham A, 2007, INT J NETW SECURITY, V4, P328
[2]
Ashoor A.S, 2011, INT J SCI ENG RES, V1, P1
[3]
Chaurasia Shalinee, 2014, INT J COMPUT SCI INF, V5, P2481
[4]
CHEBROLU S, 2004, COMPUTERS SECURITY
[5]
Chou T., 2009, ENSEMBLE MACHINE LEA
[6]
Dongre Snehlata S., 2012, INT J MODELING OPTIM, V2, P488
[7]
Fernando A., 2012, IEEE T SYSTEMS MAN C, V42
[8]
Govindarajan M., 2014, International Journal of Computer Network and Information Security, V6, P45, DOI 10.5815/ijcnis.2014.02.07
[9]
Govindarjan M., 2012, WORLD C ENG COMP SCI, V1
[10]
AdaBoost-based algorithm for network intrusion detection
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART B-CYBERNETICS,
2008, 38 (02)
:577-583