共 20 条
- [1] Fan W., Miller M., Stolfo S.J., Lee W., Chan P.K., Using artificial anomalies to detect unknown and known network intrusions, pp. 123-130, (2001)
- [2] Sarasamma S.T., Zhu Q.A., Huff J., Hierarchical Kohonenen net for anomaly detection in network security, IEEE Trans. Syst., Man, Cybern. B, Cybern., IEEE Computational Intelligence Society, pp. 302-312, (2005)
- [3] Liu Y.G., Chen K.F., Liao X.F., Zhang W., A genetic clustering method for intrusion detection, Pattern Recognition, Elsevier, pp. 927-942, (2004)
- [4] Hu W.M., Hu W., Maybank S., AdaBoost-Based Algorithm for Network Intrusion Detection, IEEE IEEE Trans. Syst., Man, Cybern. B, Cybern, IEEE Computational Intelligence Society, pp. 577-583, (2008)
- [5] Steinwart I., Hush D., Scovel C., A Classification Framework for Anomaly Detection, Journal of Machine Learning Research, pp. 211-232, (2005)
- [6] Ben-David S., Lindenbaum M., Learning distributions by their density levels: A paradigm for learning without a teacher, Journal of Computer and System Sciences, Elsevier, pp. 171-182, (1997)
- [7] Scholkopf B., Williamsonx R., Support Vector Method for Novelty Detection, Journal of Machine Learning Research, pp. 582-588, (2000)
- [8] Chen S., Cowan C.F., Grant P.M., Orthogonal least squares learning algorithms for redial basis function networks, IEEE Trans. Neural Networks, IEEE Computational Intelligence Society, pp. 302-309
- [9] Mao K.Z., Huang G.B., Neuron Selection for RBF Neural Network Classifier Based on Data Structure Preserving Criterion, IEEE Trans. Neural Networks, IEEE Computational Intelligence Society, pp. 1531-1540, (2005)
- [10] Huang G.B., Saratchandran P., A Generalized Growing and Pruning RBF (GGAP-RBF) Neural Network for Function Approximation, IEEE Trans. Neural Networks, IEEE Computational Intelligence Society, pp. 57-67, (2005)