共 20 条
[1]
Li X., Jia L., Wang S., Li Y., A Rapid Hybrid Distributed Intrusion Detection Scheme for Large Scale Data Set, International Journal of Digital Content Technology and its Applications, 7, 5, pp. 287-295, (2013)
[2]
Hu L., Wang W., Zhao K., The Design and Implementation of Trusted Communication Protocol for Intrustion Prevention System, Journal of Convergence Information Technology, 6, 3, pp. 55-62, (2011)
[3]
Bahrololum M., Salahi E., Khaleghi M., An Improved Intrusion Detection Technique based on two Strategies Using Decision Tree and Neural Network, Journal of Convergence Information Technology, 4, 4, pp. 96-101, (2009)
[4]
Yan C., Ai-dong C., A FCM Algorithm Based on Weighted Intuitionistic Fuzzy Set, International Journal of Digital Content Technology and its Applications, 6, 11, pp. 95-101, (2012)
[5]
Bin S., Sun G., An Algorithm for Detecting Community Structure of Complex Networks based on Clustering, International Journal of Digital Content Technology and its Applications, 5, 7, pp. 326-334, (2011)
[6]
Shihua L., Li J., Silicon Content Prediction Using the Hybrid Model by Fuzzy C-means Clustering and Artificial Neural Networks, Advances in Information Sciences and Service Sciences, 3, 8, pp. 78-84, (2011)
[7]
Ma Y., Niu P., Zhao Y., Ma X., Adaptive Particle Swarm-Based Fuzzy Clustering Algorithm in the Application of Steam Drum Pulverized Coal Fired Boiler, International Journal of Advancements in Computing Technology, 3, 11, pp. 444-452, (2011)
[8]
Xiao-Ming C., Research on the Network Intrusion Detection Model with neural network parameters optimized by ant-colony algorithm, Journal of Convergence Information Technology, 8, 5, pp. 619-627, (2013)
[9]
Lu-ping Z., Bing-rong L., The study on the Intrusion Detection Algorithm Analysis using the Improved Genetic Optimized Neural Network, Journal of Convergence Information Technology, 8, 5, pp. 571-577, (2013)
[10]
Yi X., Wu P., Dai D., Liu L., He X., Intrusion Detection Using BP Optimized by PSO, International Journal of Advancements in Computing Technology, 4, 2, pp. 268-274, (2012)