共 25 条
[1]
Luo J.-Z., Han Z.-G., Wang L.-M., Trustworthy and controllable network architecture and protocol framework, Chinese Journal of Computers, 32, 3, pp. 391-404, (2009)
[2]
Lin C., Lei L., Research on next generation Internet architecture, Chinese Journal of Computers, 30, 5, pp. 693-711, (2007)
[3]
Chauhan A., Mishra G., Kumar G., Survey on data mining techniques in intrusion detection, International Journal of Scientific & Engineering Research, 2, 7, pp. 1-4, (2011)
[4]
Xie M., Hu J., Han S., Chen H.-H., Scalable hyper-grid k -NN-based online anomaly detection in wireless sensor networks, IEEE Transactions on Parallel and Distributed Systems, 24, 8, pp. 1661-1670, (2012)
[5]
Zhao J.-H., Li W.-H., Intrusion detection based on improved SOM with optimized GA, Journal of Computers, 8, 6, pp. 1456-1463, (2013)
[6]
Jain R., Abouzakhar N.S., Hidden Markov model based anomaly intrusion detection, Proceedings of the International Conferece for Internet Technology and Secured Transactions, pp. 528-533, (2012)
[7]
Eid H.F., Darwish A., Hassanien A.E., Kim T.-H., Intelligent hybrid anomaly network intrusion detection system, Communications in Computer and Information Science, 265, pp. 209-218, (2012)
[8]
Sivatha Sindhu S.S., Geetha S., Kannan A., Decision tree based light weight intrusion detection using a wrapper approach, Expert Systems with Applications, 39, 1, pp. 129-141, (2012)
[9]
Sangkatsanee P., Wattanapongsakorn N., Charnsripinyo C., Practical real-time intrusion detection using machine learning approaches, Computer Communications, 34, 18, pp. 2227-2235, (2011)
[10]
Horng S.-J., Su M.-Y., Chen Y.-H., Et al., A novel intrusion detection system based on hierarchical clustering and support vector machines, Expert Systems with Applications, 38, 1, pp. 306-313, (2011)