共 16 条
[11]
Wang T.H., Chen J.T., Survey of research on kernel selection, Computer Engineering and Design, 33, 3, pp. 1181-1186, (2012)
[12]
KDDCup99KDDdataset, (2011)
[13]
Li Y., Xia J., Zhang S., Et al., An efficient intrusion detection system based on support vector machines and gradually feature removal method, Expert Systems with Applications, 39, 1, pp. 424-430, (2012)
[14]
Xue.q Z., Chun.h G., Jia J.L., Intrusion detection system based on feature selection and support vector machine, Communications and Networking in China, ChinaCom'06, First International Conference on, pp. 1-5, (2006)
[15]
Xian J., Pei Y.L., Wei G., Et al., An algorithm application in intrusion forensics based on improved information gain, Web Society (SWS), 2011 3rd Symposium on, pp. 100-104, (2011)
[16]
Burges C.J.C., A tutorial on support vector machines for pattern recognition, Data Mining and Knowledge Discovery, 2, 2, pp. 121-167, (1998)