共 40 条
[1]
Axelsson S., The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security (TISSEC), 3, 3, pp. 186-201, (2000)
[2]
Back T., Eiben A.E., van der Vaart N.A.L., An empirical study on GAs without parameters, Lecture Notes in Computer Science, 1917, pp. 315-324, (2000)
[3]
Blake C.L., Merz C.J., UCI Repository of Machine Learning Databases, (1998)
[4]
Breunig M.M., Kriegel H.P., Ng R.T., Sander J., LOF: Identifying density-based local outliers, Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, pp. 93-104, (2000)
[5]
Burbeck K., Nadjm-Tehrani S., ADWICE - anomaly detection with real-time incremental clustering, Lecture Notes in Computer Science, 3506, pp. 407-424, (2005)
[6]
Chimphlee W., Abdullah A.H., Md Sap M.N., Chimphlee S., Srinoy S., Integrating genetic algorithms and fuzzy c-means for anomaly detection, Proceedings of IEEE INDICON 2005, pp. 575-579, (2005)
[7]
Chimphlee W., Abdullah A.H., Md Sap M.N., Srinoy S., Chimphlee S., Anomaly-based intrusion detection using fuzzy rough clustering, Proceedings of International Conference on Hybrid Information Technology, 1, pp. 329-334, (2006)
[8]
Dempster A.P., Laird N.M., Rubin D.B., Maximum likelihood from incomplete data via the EM algorithm (with discussion), Journal of the Royal Statistical Society B, 39, pp. 1-38, (1977)
[9]
Dubes R.C., Cluster analysis and related issues, Handbook of Pattern Recognition and Computer Vision, pp. 3-32, (1993)
[10]
Emran S.M., Ye N., Robustness of Canberra Metric in computer intrusion detection, Proceedings of the IEEE Workshop on Information Assurance and Security, pp. 80-84, (2001)