共 10 条
- [1] Feng X., Ma M.Y., Zhao T.L., Et al., Intrusion detection system based on hybrid immune algorithm, Computer Science, 41, 12, pp. 43-47, (2014)
- [2] Yang B., Wang X., Du J., Adaptive network intrusion detection method based on rough set, Computer Application and Software, 31, 11, pp. 318-320, (2014)
- [3] Wang Y., Xiong Y., Gong X.D., Et al., Based on chaos PSO algorithm optimize RBF network intrusion detection, Computer Engineering and Applications, 49, 10, pp. 84-87, (2013)
- [4] Sun X., Xu C.X., Gao Y., Research of android abnormal intrusion detection based on feature-weighted K-nearest-neighbor SVM, Computer Science, 42, 4, pp. 116-118, (2015)
- [5] Bace R., Intrusion Detection, (2000)
- [6] Verwoerd T., Hunt R., Intrusion detection techniques and approaches, Computer Communications, 25, 15, pp. 1356-1365, (2002)
- [7] Endorf C., Schultz E., Mellander J., Intrusion Detection & Prevention, (2004)
- [8] Barker M., Rayens W., Partial least squares for discrimination, J of Chemometrics, 17, pp. 166-173, (2003)
- [9] Tsang I.W., Kwok J.T., Cheung P.M., Core vector machines: Fast SVMtraining on very large data sets, J of Machine Learning Research, 6, pp. 363-392, (2005)
- [10] Chu C.S., Tsang I.W., Kwok J.T., Scaling up support vector data description by using core sets, Proc of IEEE Int Joint Conf on Neural Networks, pp. 425-430, (2004)