共 41 条
[1]
Denning D.E., An intrusion detection model, IEEE Transactions on Software Engineering, (1987)
[2]
Axelsson S., Intrusion Detection Systems: A Survey and Taxonomy, (2000)
[3]
Feng H.H., Kolesnikov O.M., Fogla P., Lee W., Gong W., Anomaly Detection Using Call Stack Information, In: IEEE Symposium on Security and Privacy, pp. 62-75, (2003)
[4]
Lee W., Stolfo S.J., Data mining approaches for intrusion detection, 7th USENIX Security Symposium, pp. 79-94, (1998)
[5]
Lane T., Brodley C.E., An Application of Machine Learning to Anomaly Detection, Proceedings of the 20th National Information Systems Security Conference, pp. 366-377, (1997)
[6]
Breiman L., Random Forests. Machine Learning, 45, pp. 5-32, (2001)
[7]
Jidiga G.R., Sammulal P., Foundations of Intrusion Detection Systems: Focus on Role of Anomaly Detection using Machine Learning, In: ICACM-2013 Elsevier 2nd International Conference
[8]
Jidiga G.R., Sammulal P., The Need of Awareness in Cyber Security with a Case Study, Proceedings of the 4th IEEE Conference (ICCCNT), (2013)
[9]
Kass G.V., An Exploratory Technique for Investigating Large Quantities of Categorical Data, Applied Statistics, 29, 2, pp. 119-127, (1980)
[10]
Quinlan J.R., Induction of decision trees, Machine Learning 1, pp. 81-106, (1986)