共 34 条
- [1] Kizza J.M., Guide to computer network security, (2009)
- [2] Huang J., Kalbarczyk Z., Nicol D.M., Knowledge discovery from big data for intrusion detection using LDA, In Big data (BigData Congress), 2014 IEEE international congress on, Anchorage, Alaska: IEEE, pp. 760-761, (2014)
- [3] Raiyn J., A survey of cyber attack detection strategies, Int J Secur Appl, 8, 1, pp. 247-256, (2014)
- [4] Han J., Pei J., Kamber M., Data mining: concepts and techniques, (2011)
- [5] Kabir E., Hu J., Wang H., Et al., A novel statistical technique for intrusion detection systems, Future Gener Comput Syst, 79, pp. 303-318, (2018)
- [6] Sharma S., Gupta R.K., Intrusion detection system: A review, Int J Secur Appl, 9, 5, pp. 69-76, (2015)
- [7] Shone N., Ngoc T.N., Phai V.D., Et al., A deep learning approach to network intrusion detection, IEEE Trans Emerging Top Comput Intell, 2, 1, pp. 41-50, (2018)
- [8] Sperotto A., Aiko P., Flow-based intrusion detection, In Integrated Network Management (IM), 2011 IFIP/IEEE International Symposium on, pp. 958-963, (2011)
- [9] Raut A.S., Singh K.R., Anomaly based intrusion detection-a review, Int J Network Secur, 5, 3, (2014)
- [10] Hu J., Yu X., Qiu D., Et al., A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection, IEEE Network, 23, 1, pp. 42-47, (2009)