共 19 条
[11]
Hoang XD, 2003, ICON 2003: 11TH IEEE INTERNATIONAL CONFERENCE ON NETWORKS, P531
[12]
Joshi S., 2005, Proceedings of the 43rd annual Southeast regional conference-Volume, P98
[13]
Lee W., 2000, ACM Transactions on Information and Systems Security, V3, P227, DOI 10.1145/382912.382914
[14]
Ourston D., 2002, P 36 HAW INT C SYST, V9, P334
[16]
Handling nominal features in anomaly intrusion detection problems
[J].
15th International Workshop on Research Issues in Data Engineering: Stream Data Mining and Applications, Proceedings,
2005,
:55-62
[17]
Anomaly Detection via Feature-Aided Tracking and Hidden Markov Models
[J].
IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS,
2009, 39 (01)
:144-159
[19]
UCI KDD Archive, KDD CUP 1999 DAT