共 26 条
[1]
Abbes T., Bouhoula A., Rusinowitch M., Efficient decision tree for protocol analysis in intrusion detection, Int J. of Security and Networks, 5, 4, pp. 220-235, (2010)
[2]
Axelsson S., Intrusion detection systems: A survey and taxonomy, Technical Report 99-15, (2000)
[3]
Breiman L., Random forests, Machine Learning, 45, 1, pp. 5-32, (2001)
[4]
Cannady J., Artificial neural networks for misuse detection, Proceedings of the 21st National Information Systems Security Conference, pp. 368-381, (1998)
[5]
Chimphlee W., Addullah A.H., Sap M.N.M., Srinoy S., Chimphlee S., Anomaly-based intrusion detection using fuzzy rough clustering ICHIT '06: Proceedings of the 2006 International Conference on Hybrid i nformation Technology, IEEE Computer Society Washington, 1, pp. 329-334, (2006)
[6]
Cohen W., Fast effective rule induction ICML 1995, Proceedings of the 12th International Conference on Machine Learning, pp. 115-123, (1995)
[7]
Cole E., Krutz R., Conley J., Network Security Bible, (2005)
[8]
Debar H., Dacier M., Wespi A., A revised taxonomy for intrusion detection systems, Annals of Telecommunications, 55, 7-8, pp. 361-378, (2000)
[9]
Gogoi P., Bhattacharyya D.K., Kalita J.K., A rough set -based effective rule generation method for classification with an application in intrusion detection' , Int, J. of Security and Networks, 8, 2, pp. 61-71, (2013)
[10]
Huhn J., Hullermeier E., FURIA: An algorithm for unordered fuzzy rule induction, Data Mining and Knowledge Discovery, 19, 3, pp. 293-319, (2009)