共 10 条
[1]
Luo Z.Y., You B., Xu J.Z., Et al., Attack graph algorithm in the application of intrusion detection system, International Journal of Security and its Applications, 9, pp. 249-256, (2013)
[2]
Luo Z.Y., You B., Yu G.H., Et al., Research of intrusive intention self-recognition algorithm based on three-tier attack graph, ICIC Express Letters, Part B: Applications, 1, pp. 1575-1580, (2015)
[3]
Yang S.L., Yang Y.H., Shen Q.N., Et al., A method of intrusion detection based on semi-supervised GHSOM, Journal of Computer Research and Development, 50, 11, pp. 2375-2382, (2013)
[4]
Yang Y.H., Jiang D.B., Shen Q.N., Et al., Research on intrusion detection based on an improved GHSOM, Journal on Communications, 32, 1, pp. 121-126, (2011)
[5]
Zell A., Bayer H., Bauknecht H., Similarity analysis of molecules with self-organizing surfaces-an extension of the self-organizing map, Proceedings of the International Conference on Neural Networks, pp. 719-724, (1994)
[6]
Deng D., Kasabov N., ESOM: An algorithm to evolve selforganizing maps from on-line data streams, Proceedings of the International Joint Conference on Neural Networks, (2000)
[7]
Yang Y.H., Huang H.Z., Shen Q.N., Et al., Research on intrusion detection based on incremental GHSOM, Chinese Journal of Computers, 37, 5, pp. 1216-1224, (2014)
[8]
Li L.L., Ma D.J., Wang C.S., Et al., New method for conflict evidence processing in DS theory, Application Research of Computers, 28, 12, pp. 4528-4531, (2011)
[9]
Qiu W.R., Liu X.D., Fuzzy time series model for forecasting based on Dempster-Shafer theory, Control and Decision, 27, 1, pp. 99-103, (2012)
[10]
Du Y.W., Shi F.Y., Yang N., Construction method for Bayesian network based on Dempster-Shafer/analytic hierarchy process, Journal of Computer Applications, 35, 1, (2015)