共 25 条
- [11] CONDENSED NEAREST NEIGHBOR RULE [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1968, 14 (03) : 515 - +
- [13] On issues of instance selection [J]. DATA MINING AND KNOWLEDGE DISCOVERY, 2002, 6 (02) : 115 - 130
- [14] Secure virtualization for cloud computing [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2011, 34 (04) : 1113 - 1122
- [15] Mehra P., 2012, INT J ADV RES COMPUT, V1, P383
- [16] Bro: a system for detecting network intruders in real-time [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 1999, 31 (23-24): : 2435 - 2463
- [17] Raghav I., 2013, INT J COMPUT APPL, V68, P7, DOI DOI 10.5120/11725-7304
- [19] Singh Swarnpreet, 2012, International Journal of Computer Science & Information Technology, V4, P17, DOI 10.5121/ijcsit.2012.4202
- [20] Tavallaee M., 2009, IEEE S COMPUTATIONAL, P1, DOI [DOI 10.1109/CISDA.2009.5356528, 10.1109/CISDA.2009.5356528]