共 20 条
[1]
Kaur D., Kaur P., Empirical analysis of Web attacks, Proc. Comput. Sci., 78, pp. 298-306, (2016)
[2]
Islam M.N., Seera M., Loo C.K., A robust incremental clustering-based facial feature tracking, Appl. Soft Comput., 53, 53, pp. 34-44, (2017)
[3]
Jeya P.G., Ravichandran M., Ravichandran C., Efficient classifier for r2l and u2r attacks, Int. J. Comput. Appl., 45, 21, pp. 28-32, (2012)
[4]
Kang J., Oh S., Anomaly intrusion detection based on clustering a data stream, Int. J. Future Comput. Commun., 1, 1, pp. 17-20, (2012)
[5]
Kim G., Lee S., Kim S., A novel hybrid intrusion detection method integrating anomaly detection with misuse detection, Expert Syst. Appl., 41, 4, pp. 1690-1700, (2017)
[6]
Ramasubramanian K., Singh A., Machine Learning Theory and Practices,” Machine Learning Using R, Apress, Berkeley, CA, (2017)
[7]
Feng W., Zhang Q., Hu G., Huang J.X., Mining network data for intrusion detection through combining Svms with ant colony networks, Future Generat. Comput. Syst., 37, pp. 127-140, (2014)
[8]
Muniyandi A.P., Rajeswari R., Rajaram R., Network anomaly detection by cascading k-means clustering and C4.5 decision tree algorithm, Procedia Eng., 30, pp. 174-182, (2012)
[9]
Cheng R., Xu R., Tang X., Sheng V.S., Cai C., An abnormal network flow feature sequence prediction approach for DDoS attacks detection in the big data environment, Comput. Mater. Continua (CMC), 55, 1, pp. 95-119, (2018)
[10]
Depren O., Topallar M., Anarim E., Ciliz M.K., An intelligent intrusion detection system (ids) for anomaly and misuse detection in computer networks, Expert Syst. Appl., 29, 4, pp. 713-722, (2005)