共 35 条
[1]
Wang G., Et al., A new approach to intrusion detection using artificial neural networks and fuzzy clustering, Expert Syst. Appl., 37, pp. 6225-6232, (2010)
[2]
Wang W., Battiti R., Identifying intrusions in computer networks with principal Component analysis, Proceedings of the First International Conference on Availability Reliability and Security (ARES'06), pp. 270-279, (2006)
[3]
Shafi K., Abbass H.A., An adaptive genetic based signature learning system intrusion detection, Expert Syst. Appl., 36, 10, pp. 12036-12043, (2009)
[4]
Srinoy S., Et al., Anomaly based intrusion detection using fuzzy rough clustering, Paper Presented at the International Conference on Hybrid Information Technology (ICHIT'06), pp. 329-334, (2006)
[5]
Khan L., Et al., A new intrusion detection system using support vector machines and hierarchial clustering, Journal on very large databases, 16, 4, pp. 507-521, (2007)
[6]
Mahoney M.V., Chan P.K., Learning non stationary models of normal network traffic for detecting network attacks, Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining KDD'02, pp. 61-72
[7]
Mahoney M., Chan P., Learning models of network traffic for detecting novel attacks, (2002)
[8]
Weijun L., Zhenyu L., A method of SVM with normalization in intrusion detection, Procedia Environmental Sciences, pp. 256-262, (2011)
[9]
Catania A.C., Et al., An Autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection, Expert Systems with Applications, pp. 1822-1829, (2012)
[10]
Kumar C.A., Analysis of Unsupervised Dimensionality Reduction Techniques, Computer Science and Information Systems, 6, 2, pp. 217-227, (2009)