共 50 条
- [1] Survey of anomaly intrusion detection research Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2009, 38 (05): : 587 - 596
- [3] Survey and Research Directions on Intrusion Detection in UNIX Environment INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (12): : 69 - 74
- [4] A research survey in stepping-stone intrusion detection EURASIP Journal on Wireless Communications and Networking, 2018
- [5] The Research of Intrusion Detection Technology Based on Genetic Algorithms NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 248 - +
- [6] Research on Intrusion Detection Technology Based on Immune Algorithm KAM: 2008 INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, PROCEEDINGS, 2008, : 759 - 762
- [7] Intrusion Detection Technology Research Based on Apriori Algorithm INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT C, 2012, 24 : 1615 - 1620
- [8] Research on Intrusion Detection Technology based on The Grey Theory EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5393 - +
- [9] Research of Intrusion Detection Technology Based on Association Rules FIFTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2013), 2013, 8878
- [10] Research on Wireless Sensor Network Intrusion Detection Technology 2016 INTERNATIONAL CONFERENCE ON ELECTRONIC, INFORMATION AND COMPUTER ENGINEERING, 2016, 44