共 27 条
[1]
Lee W., Stolfo S.J., Data mining approaches for intrusion detection, Proc of the 7th USENIX Security Symposium, pp. 79-93, (1998)
[2]
Li C., Tian X., Xiao X., Et al., Anomaly detection of user behavior based on shell commands and co-occurrence matrix, Journal of Computer Research and Development, 49, 9, pp. 1982-1990, (2012)
[3]
Denatious D.K., John A., Survey on data mining techniques to enhance intrusion detection, Proc of the 2012 Int Conf on Computer Communication and Informatics, pp. 1-5, (2012)
[4]
Chitrakar R., Huang C., Anomaly detection using support vector machine classification with K-medoids clustering, Proc of the 3rd Asian Himalayas Int Conf on Internet, pp. 1-5, (2012)
[5]
Srinoy S., Kurutach W., Chimphlee W., Et al., Intrusion detection via independent component analysis based on rough fuzzy, WSEAS Trans on Computers, 5, 1, pp. 43-48, (2006)
[6]
Rose K., Gurewitz E., Fox G.C., Constrained clustering as optimization method, IEEE Trans on Pattern Analysis and Machine Intelligence, 15, 8, pp. 785-794, (1993)
[7]
Zhang X., Fuzzy C-means clustering algorithm with two stages, Journal of Circuits and System, 10, 2, pp. 117-121, (2005)
[8]
Berget I., Mevik B.H., New modifications and applications of fuzzy C-means methodology, Computational Statistics and Data Analysis, 52, 5, pp. 2403-2418, (2008)
[9]
Wang Z., Liu Z., Chen D., Research of PSO-based fuzzy C-means clustering algorithm, Computer Science, 39, 9, pp. 166-169, (2012)
[10]
Chen Y., Cheng X., Li Y., Et al., Lightweight intrusion detection system based on feature selection, Journal of Software, 18, 7, pp. 1639-1651, (2007)