共 50 条
[41]
Anomaly detection schemes in network intrusion detection
[J].
Soft Computing with Industrial Applications, Vol 17,
2004, 17
:309-313
[42]
The Construction Research of Security Computer Network System Based on the Distributed Intrusion Detection Technology
[J].
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS,
2014, 8 (06)
:185-196
[43]
Research on Network Intrusion Detection Technology based on IPv6 Protocol Analysis
[J].
2011 INTERNATIONAL CONFERENCE ON FUTURE COMPUTER SCIENCE AND APPLICATION (FCSA 2011), VOL 3,
2011,
:208-211
[46]
Intrusion detection system alerts fusion based on fuzzy comprehensive evaluation and immune evolution
[J].
Journal of Computational Information Systems,
2013, 9 (04)
:1509-1516
[48]
Neural network ensembles for intrusion detection
[J].
IDAACS 2007: PROCEEDINGS OF THE 4TH IEEE WORKSHOP ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS: TECHNOLOGY AND APPLICATIONS,
2007,
:578-583
[49]
Integrating intrusion detection and network management
[J].
NOMS 2002: IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM: MANAGEMENT SOLUTIONS FOR THE NEW COMMUNICATIONS WORLD,
2002,
:329-344
[50]
Applying neural network to intrusion detection
[J].
2007 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE & TECHNOLOGY, PROCEEDINGS,
2007,
:273-276