共 25 条
- [1] Evangelista T., Les IDS: Les Systèmes De Détection D’Intrusions Informatiques, (2004)
- [2] Wu S.X., Banzhaf W., The use of computational intelligence in intrusion detection systems., A Review, Applied Soft Computing, 10, 1, pp. 1-35, (2010)
- [3] Scott S.L., A Bayesian paradigm for designing intrusion detection systems, Computational Statistics & Data Analysis, 45, 1, pp. 69-83, (2004)
- [4] Ben-Amor N., Benferhat S., Elouedi Z., Naive Bayes vs decision trees in intrusion detection systems, Proceedings of the 2004 ACM Symposium on Applied Computing, pp. 420-424, (2004)
- [5] Mukkamala S., Janoski G., Sung A., Intrusion detection using neural networks and support vector machines, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290, pp. 1702-1707, (2002)
- [6] Zhang Z., Shen H., Application of online-training SVMs for real-time intrusion detection with different considerations, Computer Communications, 28, 12, pp. 1428-1442, (2005)
- [7] Paek S.H., Oh Y.K., Lee D.H., SIDMG: Small-size intrusion detection model generation of complimenting decision tree classification algorithm, International Workshop on Information Security Applications, pp. 83-99, (2006)
- [8] Borzsony S., Kossmann D., Stocker K., The skyline operator, Proceedings 17th International Conference on Data Engineering, pp. 421-430, (2001)
- [9] Kung H.T., Luccio F., Preparata F.P., On finding the maxima of a set of vectors, Journal of the ACM (JACM), 22, 4, pp. 469-476, (1975)
- [10] Pearl J., Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Reasoning, (1988)