共 19 条
- [1] Visualizing network data for intrusion detection [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 100 - 108
- [2] Anderberg M.R., 1973, CLUSTER ANAL APPL, DOI DOI 10.1016/C2013-0-06161-0
- [3] [Anonymous], 1988, Technometrics, DOI DOI 10.2307/1268876
- [4] [Anonymous], ACM COMPUTING SURVEY
- [5] Computer Security Threat Monitoring and Surveillance, 1980, TECHNICAL REPORT
- [6] Corchado E, 2004, LECT NOTES COMPUT SC, V3190, P141
- [10] AN INTRUSION-DETECTION MODEL [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 222 - 232