共 15 条
[1]
Weidong C., Zhenghua W., Xiai Y., The Research and Realization Based on Integrating Neural Network IDS, CS: Computer Simulation, pp. 134-137, (2007)
[2]
Xuexiao L., Weimin, The Research of Classification Method on Intrusion Detection, CEA: Computing Engineering and Application, pp. 98-100, (2010)
[3]
Haijun X., Fan H., Zhaoli Z., Junguo L., The Intrusion Detection Research Based on Fusion Classification and SVM, CS: Computer Simulation, pp. 130-132, (2008)
[4]
Di W., Yaping Z., He G., Intrusion Detection New Method Based on Rough Set Theory and BP Neural Network, CRD: Computer Research and Development, pp. 437-441, (2006)
[5]
Ma H., Jinfeng S., Xin Y., IDS of Mixed Neural Network on Genetic Algorithm Optimization, CT: Communication Technology, pp. 106-108, (2009)
[6]
Wenli W., Limin H., Intrusion Detection Based on Rough Set, SM: Sensor and Microsystem, pp. 36-41, (2010)
[7]
Zhijun Y., The Comprehensive Research of IDS, CED: Computer Engineering and Design, pp. 2199-2223, (2006)
[8]
Ge S., Qiao Y., The Application on Abnormal Detection in Neural Network, CEA: Computer Engineering and Application, pp. 146-148, (2002)
[9]
Li H., Xiaotong Z., Lizhu L., Optimization Design Method of RBF Neural Network Based on Genetic Algorithm, CS: Computer Simulation, pp. 67-69, (2003)
[10]
Qi Y., Zhuang Y., Shi J., An Evolutionary MAC Protocol based on FPRP for Decreasing Delay, JDCTA: International Journal of Digital Content Technology and Its Applications, 4, 9, pp. 194-200, (2010)